Vulnerability Details : CVE-2022-30295
uClibc-ng through 1.0.40 and uClibc through 0.9.33.2 use predictable DNS transaction IDs that may lead to DNS cache poisoning. This is related to a reset of a value to 0x2.
Products affected by CVE-2022-30295
- cpe:2.3:a:uclibc-ng_project:uclibc-ng:*:*:*:*:*:*:*:*
- cpe:2.3:a:uclibc:uclibc:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-30295
6.77%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 91 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-30295
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:N |
4.9
|
4.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N |
2.2
|
4.2
|
NIST |
References for CVE-2022-30295
-
https://www.nozominetworks.com/blog/nozomi-networks-discovers-unpatched-dns-bug-in-popular-c-standard-library-putting-iot-at-risk/
Nozomi Networks Discovers Unpatched DNS Bug in Popular C Standard Library Putting IoT at RiskThird Party Advisory
-
https://www.kb.cert.org/vuls/id/473698
VU#473698 - uClibc, uClibc-ng libraries have monotonically increasing DNS transaction IDThird Party Advisory;US Government Resource
Jump to