Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-3787

EPSS 0.06% · P17
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-3787

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability was found in the device-mapper-multipath. The device-mapper-multipath allows local users to obtain root access, exploited alone or in conjunction with CVE-2022-41973. Local users that are able to write to UNIX domain sockets can bypass access controls and manipulate the multipath setup. This issue occurs because an attacker can repeat a keyword, which is mishandled when arithmetic ADD is used instead of bitwise OR. This could lead to local privilege escalation to root.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
授权机制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
device-mapper-multipath 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Red Hat device-mapper-multipath是美国红帽(Red Hat)公司的一个设备映射器多路径。允许您将服务器节点和存储阵列之间的多个 I/O 路径配置到单个设备中。 device-mapper-multipath存在安全漏洞。攻击者利用该漏洞获得root访问权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-device-mapper-multipath unknown -

II. Public POCs for CVE-2022-3787

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-3787

登录查看更多情报信息。

Same Patch Batch · n/a · 2023-03-29 · 20 CVEs total

CVE-2023-16856.3 MEDIUMHadSky Installation Interface index.php command injection
CVE-2023-16844.7 MEDIUMHadSky unrestricted upload
CVE-2023-28892Malwarebytes AdwCleaner 后置链接漏洞
CVE-2023-27167Suprema BioStar 2 SQL注入漏洞
CVE-2023-26984Peppermint 安全漏洞
CVE-2023-26982Chris Brame Trudesk 跨站脚本漏洞
CVE-2023-26968AtroCore 代码问题漏洞
CVE-2023-1652Linux kernel 资源管理错误漏洞
CVE-2023-0836HAProxy 安全漏洞
CVE-2023-0664QEMU Guest Agent 安全漏洞
CVE-2022-48434FFmpeg 资源管理错误漏洞
CVE-2022-44370NASM 缓冲区错误漏洞
CVE-2022-44369NASM 代码问题漏洞
CVE-2022-44368NASM 代码问题漏洞
CVE-2022-1274Keycloak 跨站脚本漏洞
CVE-2021-41526InstallShield 安全漏洞
CVE-2020-14140Xiaomi router 访问控制错误漏洞
CVE-2019-8963FlexNet Publisher 安全漏洞
CVE-2017-6894Flexera FlexNet Manager Suite 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2022-3787

No comments yet


Leave a comment