{"api_version":"1","generated_at":"2026-04-18T07:55:59+00:00","cve":"CVE-2022-1714","urls":{"html":"https://cve.report/CVE-2022-1714","api":"https://cve.report/api/cve/CVE-2022-1714.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-1714","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-1714"},"summary":{"title":"CVE-2022-1714","description":"Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.","state":"PUBLIC","assigner":"security@huntr.dev","published_at":"2022-05-13 15:15:00","updated_at":"2023-06-29 09:15:00"},"problem_types":["CWE-125"],"metrics":[],"references":[{"url":"https://huntr.dev/bounties/1c22055b-b015-47a8-a57b-4982978751d0","name":"https://huntr.dev/bounties/1c22055b-b015-47a8-a57b-4982978751d0","refsource":"CONFIRM","tags":[],"title":"huntr – Security Bounties for any GitHub repository","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"https://github.com/radareorg/radare2/commit/3ecdbf8e21186a9c5a4d3cfa3b1e9fd27045340e","name":"https://github.com/radareorg/radare2/commit/3ecdbf8e21186a9c5a4d3cfa3b1e9fd27045340e","refsource":"MISC","tags":[],"title":"Fix 4 byte oobread in msp430 disassembler ##crash · radareorg/radare2@3ecdbf8 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-1714","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1714","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"1714","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"radare","cpe5":"radare2","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-1714","qid":"503257","title":"Alpine Linux Security Update for radare2"},{"cve":"CVE-2022-1714","qid":"506230","title":"Alpine Linux Security Update for radare2"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@huntr.dev","ID":"CVE-2022-1714","STATE":"PUBLIC","TITLE":"Out-of-bounds Read in radareorg/radare2"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"radareorg/radare2","version":{"version_data":[{"version_affected":"<","version_value":"5.7.0"}]}}]},"vendor_name":"radareorg"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"LOW","baseScore":7.9,"baseSeverity":"HIGH","confidentialityImpact":"LOW","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:L","version":"3.0"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-125 Out-of-bounds Read"}]}]},"references":{"reference_data":[{"name":"https://huntr.dev/bounties/1c22055b-b015-47a8-a57b-4982978751d0","refsource":"CONFIRM","url":"https://huntr.dev/bounties/1c22055b-b015-47a8-a57b-4982978751d0"},{"name":"https://github.com/radareorg/radare2/commit/3ecdbf8e21186a9c5a4d3cfa3b1e9fd27045340e","refsource":"MISC","url":"https://github.com/radareorg/radare2/commit/3ecdbf8e21186a9c5a4d3cfa3b1e9fd27045340e"}]},"source":{"advisory":"1c22055b-b015-47a8-a57b-4982978751d0","discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2022-05-13 15:15:00","lastModifiedDate":"2023-06-29 09:15:00","problem_types":["CWE-125"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.1,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.2},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:P","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"PARTIAL","baseScore":3.6},"severity":"LOW","exploitabilityScore":3.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*","versionEndExcluding":"5.7.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}