Vulnerability Details : CVE-2022-29800
Potential exploit
A time-of-check-time-of-use (TOCTOU) race condition vulnerability was found in networkd-dispatcher. This flaw exists because there is a certain time between the scripts being discovered and them being run. An attacker can abuse this vulnerability to replace scripts that networkd-dispatcher believes to be owned by root with ones that are not.
Products affected by CVE-2022-29800
- cpe:2.3:a:microsoft:windows_defender_for_endpoint:-:*:*:*:*:linux:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-29800
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 18 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-29800
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.7
|
MEDIUM | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N |
1.0
|
3.6
|
NIST |
CWE ids for CVE-2022-29800
-
The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. This can cause the product to perform invalid actions when the resource is in an unexpected state.Assigned by:
- nvd@nist.gov (Primary)
- patrick@puiterwijk.org (Secondary)
References for CVE-2022-29800
-
https://www.microsoft.com/security/blog/2022/04/26/microsoft-finds-new-elevation-of-privilege-linux-vulnerability-nimbuspwn/
Microsoft finds new elevation of privilege Linux vulnerability, Nimbuspwn - Microsoft Security BlogExploit;Technical Description;Vendor Advisory
Jump to