Vulnerability Details : CVE-2022-35289
A write-what-where condition in hermes caused by an integer overflow, prior to commit 5b6255ae049fa4641791e47fad994e8e8c4da374 allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
Vulnerability category: OverflowExecute code
Products affected by CVE-2022-35289
- cpe:2.3:a:facebook:hermes:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-35289
0.30%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 69 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-35289
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2022-35289
-
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.Assigned by: nvd@nist.gov (Primary)
-
The product performs a calculation to determine how much memory to allocate, but an integer overflow can occur that causes less memory to be allocated than expected, leading to a buffer overflow.Assigned by: cve-assign@fb.com (Secondary)
References for CVE-2022-35289
-
https://www.facebook.com/security/advisories/CVE-2022-35289
FacebookVendor Advisory
-
https://github.com/facebook/hermes/commit/5b6255ae049fa4641791e47fad994e8e8c4da374
Re-sync with internal repository (#791) · facebook/hermes@5b6255a · GitHubPatch;Third Party Advisory
Jump to