Vulnerability Details : CVE-2022-37454
The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.
Vulnerability category: OverflowExecute code
Threat overview for CVE-2022-37454
Top countries where our scanners detected CVE-2022-37454
Top open port discovered on systems with this issue
80
IPs affected by CVE-2022-37454 796,134
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2022-37454!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2022-37454
Probability of exploitation activity in the next 30 days: 1.41%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 86 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2022-37454
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2022-37454
-
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-37454
-
https://csrc.nist.gov/projects/hash-functions/sha-3-project
Hash Functions | CSRCThird Party Advisory;US Government Resource
-
https://news.ycombinator.com/item?id=33281106
SHA-3 Buffer Overflow | Hacker NewsIssue Tracking;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2022/11/msg00000.html
[SECURITY] [DLA 3175-1] python3.7 security updateMailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2022/10/msg00041.html
[SECURITY] [DLA 3174-1] pysha3 security updateMailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMIEXLMTW5GO36HTFFWIPB3OHZXCT3G4/
[SECURITY] Fedora 35 Update: php-8.0.25-1.fc35 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://news.ycombinator.com/item?id=35050307
A Vulnerability in Implementations of SHA-3, Shake, EdDSA | Hacker News
-
https://security.gentoo.org/glsa/202305-02
Python, PyPy3: Multiple Vulnerabilities (GLSA 202305-02) — Gentoo security
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ALQ6BDDPX5HU5YBQOBMDVAA2TSGDKIJ/
[SECURITY] Fedora 36 Update: php-8.1.12-1.fc36 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://github.com/XKCP/XKCP/security/advisories/GHSA-6w4m-2xhg-2658
Buffer overflow in sponge queue functions · Advisory · XKCP/XKCP · GitHubPatch;Third Party Advisory
-
https://eprint.iacr.org/2023/331
A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithm
-
https://www.debian.org/security/2022/dsa-5267
Debian -- Security Information -- DSA-5267-1 pysha3Third Party Advisory
-
https://www.debian.org/security/2022/dsa-5269
Debian -- Security Information -- DSA-5269-1 pypy3Third Party Advisory
-
https://mouha.be/sha-3-buffer-overflow/
SHA-3 Buffer Overflow – Nicky MouhaExploit;Third Party Advisory
Products affected by CVE-2022-37454
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
- cpe:2.3:a:extended_keccak_code_package_project:extended_keccak_code_package:-:*:*:*:*:*:*:*
- cpe:2.3:a:sha3_project:sha3:*:*:*:*:*:ruby:*:*
- cpe:2.3:a:pysha3_project:pysha3:*:*:*:*:*:*:*:*
- cpe:2.3:a:pypy:pypy:*:*:*:*:*:*:*:*