Vulnerability Details : CVE-2022-22364
IBM Cognos Controller 10.4.1, 10.4.2, and 11.0.0 is vulnerable to external service interaction attack, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability to induce the application to perform server-side DNS lookups or HTTP requests to arbitrary domain names. By submitting suitable payloads, an attacker can cause the application server to attack other systems that it can interact with. IBM X-Force ID: 220903.
Products affected by CVE-2022-22364
- cpe:2.3:a:ibm:cognos_controller:10.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:cognos_controller:10.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:cognos_controller:11.0.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-22364
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 18 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-22364
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
3.9
|
1.4
|
NIST | 2025-01-07 |
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
3.9
|
1.4
|
IBM Corporation | 2024-05-03 |
CWE ids for CVE-2022-22364
-
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.Assigned by: nvd@nist.gov (Primary)
-
The product performs reverse DNS resolution on an IP address to obtain the hostname and make a security decision, but it does not properly ensure that the IP address is truly associated with the hostname.Assigned by: psirt@us.ibm.com (Secondary)
References for CVE-2022-22364
-
https://www.ibm.com/support/pages/node/7149876
Security Bulletin: IBM Controller has addressed multiple vulnerabilitiesVendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/220903
IBM Cognos Controller security bypass CVE-2022-22364 Vulnerability ReportVendor Advisory
Jump to