Vulnerability Details : CVE-2022-26563
An issue was discovered in Tildeslash Monit before 5.31.0, allows remote attackers to gain escilated privlidges due to improper PAM-authorization.
Products affected by CVE-2022-26563
- cpe:2.3:a:tildeslash:monit:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-26563
0.18%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 56 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-26563
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2022-26563
-
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-26563
-
https://man7.org/linux/man-pages/man3/pam_acct_mgmt.3.html
pam_acct_mgmt(3) - Linux manual pageThird Party Advisory
-
https://bitbucket.org/tildeslash/monit/commits/6ecaab1d375f33165fe98d06d92f36c949c0ea11
tildeslash / monit / Commit 6ecaab1d375f — BitbucketPatch
Jump to