{"api_version":"1","generated_at":"2026-04-22T21:27:15+00:00","cve":"CVE-2022-0675","urls":{"html":"https://cve.report/CVE-2022-0675","api":"https://cve.report/api/cve/CVE-2022-0675.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-0675","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-0675"},"summary":{"title":"CVE-2022-0675","description":"In certain situations it is possible for an unmanaged rule to exist on the target system that has the same comment as the rule specified in the manifest. This could allow for unmanaged rules to exist on the target system and leave the system in an unsafe state.","state":"PUBLIC","assigner":"security@puppet.com","published_at":"2022-03-02 21:15:00","updated_at":"2022-03-09 20:53:00"},"problem_types":["CWE-20"],"metrics":[],"references":[{"url":"https://puppet.com/security/cve/CVE-2022-0675","name":"https://puppet.com/security/cve/CVE-2022-0675","refsource":"MISC","tags":[],"title":"CVE-2022-0675 - Puppet Firewall Module","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-0675","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0675","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"675","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"puppet","cpe5":"firewall","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-0675","qid":"183682","title":"Debian Security Update for puppet-module-puppetlabs-firewall (CVE-2022-0675)"},{"cve":"CVE-2022-0675","qid":"240491","title":"Red Hat Update for OpenStack Platform 16.2 (RHSA-2022:5116)"},{"cve":"CVE-2022-0675","qid":"240991","title":"Red Hat Update for OpenStack Platform 16.1.9 (RHSA-2022:8869)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@puppet.com","ID":"CVE-2022-0675","STATE":"PUBLIC","TITLE":"Puppet Firewall Module May Leave Unmanaged Rules"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Firewall Module","version":{"version_data":[{"version_affected":"<","version_name":"prior to 3.4.0","version_value":"3.4.0"}]}}]},"vendor_name":"Puppet"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In certain situations it is possible for an unmanaged rule to exist on the target system that has the same comment as the rule specified in the manifest. This could allow for unmanaged rules to exist on the target system and leave the system in an unsafe state."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":5.6,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-1289"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://puppet.com/security/cve/CVE-2022-0675","name":"https://puppet.com/security/cve/CVE-2022-0675"}]},"source":{"discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-03-02 21:15:00","lastModifiedDate":"2022-03-09 20:53:00","problem_types":["CWE-20"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:puppet:firewall:*:*:*:*:*:*:*:*","versionEndExcluding":"3.4.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}