CVE-2022-22576
Published on: Not Yet Published
Last Modified on: 01/05/2023 06:10:00 PM UTC
Certain versions of Fabric Operating System from Brocade contain the following vulnerability:
An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).
- CVE-2022-22576 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
CVSS3 Score: 8.1 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | LOW | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | NONE |
CVSS2 Score: 5.5 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | LOW | SINGLE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | PARTIAL | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
curl: Multiple Vulnerabilities (GLSA 202212-01) — Gentoo security | security.gentoo.org text/html |
![]() |
HackerOne | hackerone.com text/html |
![]() |
Debian -- Security Information -- DSA-5197-1 curl | www.debian.org Depreciated Link text/html |
![]() |
[SECURITY] [DLA 3085-1] curl security update | lists.debian.org text/html |
![]() |
May 2022 Libcurl Vulnerabilities in NetApp Products | NetApp Product Security | security.netapp.com text/html |
![]() |
Related QID Numbers
- 159919 Oracle Enterprise Linux Security Update for curl (ELSA-2022-5313)
- 159933 Oracle Enterprise Linux Security Update for curl (ELSA-2022-5245)
- 180909 Debian Security Update for curl (DSA 5197-1)
- 180969 Debian Security Update for curl (DLA 3085-1)
- 198759 Ubuntu Security Notification for curl Vulnerabilities (USN-5397-1)
- 240502 Red Hat Update for curl (RHSA-2022:5245)
- 240504 Red Hat Update for curl (RHSA-2022:5313)
- 282695 Fedora Security Update for curl (FEDORA-2022-3d8f00cde2)
- 282723 Fedora Security Update for curl (FEDORA-2022-3517572083)
- 282754 Fedora Security Update for curl (FEDORA-2022-8277bef335)
- 296082 Oracle Solaris 11.4 Support Repository Update (SRU) 48.126.1 Missing (CPUJUL2022)
- 353292 Amazon Linux Security Advisory for curl : ALAS2-2022-1792
- 354255 Amazon Linux Security Advisory for curl : ALAS-2022-1646
- 354277 Amazon Linux Security Advisory for curl : ALAS2022-2022-055
- 354292 Amazon Linux Security Advisory for curl : ALAS2022-2022-206
- 354341 Amazon Linux Security Advisory for curl : ALAS2022-2022-065
- 354587 Amazon Linux Security Advisory for curl : ALAS-2022-206
- 355207 Amazon Linux Security Advisory for curl : ALAS2023-2023-083
- 377351 Alibaba Cloud Linux Security Update for curl (ALINUX3-SA-2022:0142)
- 500138 Alpine Linux Security Update for curl
- 501954 Alpine Linux Security Update for curl
- 502212 Alpine Linux Security Update for curl
- 591406 Siemens SIMATIC S7-1500 CPU GNU/Linux subsystem Multiple Vulnerabilities (SSB-439005, ICSA-22-104-13)
- 671910 EulerOS Security Update for curl (EulerOS-SA-2022-1961)
- 671934 EulerOS Security Update for curl (EulerOS-SA-2022-1991)
- 671963 EulerOS Security Update for curl (EulerOS-SA-2022-2153)
- 671972 EulerOS Security Update for curl (EulerOS-SA-2022-2128)
- 672064 EulerOS Security Update for curl (EulerOS-SA-2022-2217)
- 690855 Free Berkeley Software Distribution (FreeBSD) Security Update for curl (92a4d881-c6cf-11ec-a06f-d4c9ef517024)
- 710693 Gentoo Linux curl Multiple Vulnerabilities (GLSA 202212-01)
- 752123 SUSE Enterprise Linux Security Update for curl (SUSE-SU-2022:1657-1)
- 752137 SUSE Enterprise Linux Security Update for curl (SUSE-SU-2022:1680-1)
- 902146 Common Base Linux Mariner (CBL-Mariner) Security Update for curl (9855)
- 902149 Common Base Linux Mariner (CBL-Mariner) Security Update for curl (9855-1)
- 940598 AlmaLinux Security Update for curl (ALSA-2022:5313)
- 960152 Rocky Linux Security Update for curl (RLSA-2022:5313)
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Operating System | Brocade | Fabric Operating System | - | All | All | All |
Operating System | Debian | Debian Linux | 10.0 | All | All | All |
Operating System | Debian | Debian Linux | 11.0 | All | All | All |
Application | Haxx | Curl | All | All | All | All |
Operating System | Netapp | Bootstrap Os | - | All | All | All |
Application | Netapp | Clustered Data Ontap | - | All | All | All |
Application | Netapp | Element Software | - | All | All | All |
Hardware
| Netapp | H300s | - | All | All | All |
Operating System | Netapp | H300s Firmware | - | All | All | All |
Hardware
| Netapp | H410s | - | All | All | All |
Operating System | Netapp | H410s Firmware | - | All | All | All |
Hardware
| Netapp | H500s | - | All | All | All |
Operating System | Netapp | H500s Firmware | - | All | All | All |
Hardware
| Netapp | H700s | - | All | All | All |
Operating System | Netapp | H700s Firmware | - | All | All | All |
Hardware
| Netapp | Hci Compute Node | - | All | All | All |
Application | Netapp | Hci Management Node | - | All | All | All |
Application | Netapp | Solidfire | - | All | All | All |
Application | Netapp | Solidfire | - | All | All | All |
Application | Netapp | Solidfire Hci Management Node | - | All | All | All |
Application | Netapp | Solidfire Hci Storage Node | - | All | All | All |
- cpe:2.3:o:brocade:fabric_operating_system:-:*:*:*:*:*:*:*:
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*:
- cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*:
- cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*:
- cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*:
- cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*:
- cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*:
- cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*:
- cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*:
- cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*:
- cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*:
- cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*:
- cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*:
- cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*:
- cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*:
- cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*:
- cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*:
- cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*:
- cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*:
- cpe:2.3:a:netapp:solidfire_\&_hci_management_node:-:*:*:*:*:*:*:*:
- cpe:2.3:a:netapp:solidfire_\&_hci_storage_node:-:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
@jonashrem Sorry, CVE-2022-22576 is not a joke and will be published on April 27 | 2022-04-10 13:20:45 |
![]() |
CVE-2022-22576 is an OAUTH2 bearer bypass in connection re-use. curl could reuse an existing connection wrongly eve… twitter.com/i/web/status/1… | 2022-04-27 06:32:41 |
![]() |
[email protected] changed net/curl: net/curl: security update to 7.83.0 Includes fixes for CVE-2022-22576: OAUTH2 bearer bypas… twitter.com/i/web/status/1… | 2022-04-27 19:55:21 |
![]() |
OPENBSD_7_1 [email protected] changed net/curl: net/curl: security update to 7.83.0 Includes fixes for CVE-2022-22576: OAUTH2… twitter.com/i/web/status/1… | 2022-04-27 20:55:17 |
![]() |
OPENBSD_7_1 [email protected] changed net/curl: net/curl: security update to 7.83.0 Includes fixes for CVE-2022-22576: OAUTH2… twitter.com/i/web/status/1… | 2022-04-27 20:55:17 |
![]() |
HackerOne Bug Bounty Disclosure: cve-2022-22576:-oauth2-bearer-bypass-in-connection-re-usebymonnerat - redpacketsecurity.com/hackerone-bugb… | 2022-04-29 17:01:39 |
![]() |
CVE-2022-22576 : An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might… twitter.com/i/web/status/1… | 2022-05-26 17:08:04 |
![]() |
Seems Like OPNsense 22.1.6 Really Needs an Update Soon... | 2022-05-05 18:58:28 |
![]() |
CVE-2022-22576 | 2022-05-26 18:38:57 |
![]() |
DSM Version: 7.1.1-42951 (Release Candidate) | 2022-08-10 06:07:14 |
![]() |
Has anyone seen the release notes for the latest DSM 7.1.1 Release Candidate. Fixes a scary amount of CVEs. | 2022-08-16 14:26:29 |
![]() |
DSM 7.1.1-42962 released! | 2022-09-05 11:39:36 |