{"api_version":"1","generated_at":"2026-04-23T00:42:22+00:00","cve":"CVE-2022-2226","urls":{"html":"https://cve.report/CVE-2022-2226","api":"https://cve.report/api/cve/CVE-2022-2226.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-2226","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-2226"},"summary":{"title":"CVE-2022-2226","description":"An OpenPGP digital signature includes information about the date when the signature was created. When displaying an email that contains a digital signature, the email's date will be shown. If the dates were different, then Thunderbird didn't report the email as having an invalid signature. If an attacker performed a replay attack, in which an old email with old contents are resent at a later time, it could lead the victim to believe that the statements in the email are current. Fixed versions of Thunderbird will require that the signature's date roughly matches the displayed date of the email. This vulnerability affects Thunderbird < 102 and Thunderbird < 91.11.","state":"PUBLIC","assigner":"security@mozilla.org","published_at":"2022-12-22 20:15:00","updated_at":"2023-01-05 13:52:00"},"problem_types":["CWE-294"],"metrics":[],"references":[{"url":"https://www.mozilla.org/security/advisories/mfsa2022-26/","name":"https://www.mozilla.org/security/advisories/mfsa2022-26/","refsource":"MISC","tags":[],"title":"Security Vulnerabilities fixed in Thunderbird 91.11 and Thunderbird 102 — Mozilla","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1775441","name":"https://bugzilla.mozilla.org/show_bug.cgi?id=1775441","refsource":"MISC","tags":[],"title":"Access Denied","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-2226","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2226","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"2226","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"thunderbird","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"2226","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"thunderbird","cpe6":"101.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-2226","qid":"159952","title":"Oracle Enterprise Linux Security Update for thunderbird (ELSA-2022-5480)"},{"cve":"CVE-2022-2226","qid":"159954","title":"Oracle Enterprise Linux Security Update for thunderbird (ELSA-2022-5470)"},{"cve":"CVE-2022-2226","qid":"159964","title":"Oracle Enterprise Linux Security Update for thunderbird (ELSA-2022-5482)"},{"cve":"CVE-2022-2226","qid":"180807","title":"Debian Security Update for thunderbird (DSA 5175-1)"},{"cve":"CVE-2022-2226","qid":"183189","title":"Debian Security Update for thunderbird (CVE-2022-2226)"},{"cve":"CVE-2022-2226","qid":"198859","title":"Ubuntu Security Notification for Thunderbird Vulnerabilities (USN-5512-1)"},{"cve":"CVE-2022-2226","qid":"240507","title":"Red Hat Update for thunderbird (RHSA-2022:5473)"},{"cve":"CVE-2022-2226","qid":"240515","title":"Red Hat Update for thunderbird (RHSA-2022:5470)"},{"cve":"CVE-2022-2226","qid":"240519","title":"Red Hat Update for thunderbird (RHSA-2022:5480)"},{"cve":"CVE-2022-2226","qid":"240525","title":"Red Hat Update for thunderbird (RHSA-2022:5475)"},{"cve":"CVE-2022-2226","qid":"240526","title":"Red Hat Update for thunderbird (RHSA-2022:5482)"},{"cve":"CVE-2022-2226","qid":"257175","title":"CentOS Security Update for thunderbird (CESA-2022:5480)"},{"cve":"CVE-2022-2226","qid":"376707","title":"Mozilla Thunderbird Multiple Vulnerabilities (MFSA2022-26)"},{"cve":"CVE-2022-2226","qid":"502406","title":"Alpine Linux Security Update for thunderbird"},{"cve":"CVE-2022-2226","qid":"502957","title":"Alpine Linux Security Update for thunderbird"},{"cve":"CVE-2022-2226","qid":"502958","title":"Alpine Linux Security Update for thunderbird"},{"cve":"CVE-2022-2226","qid":"505823","title":"Alpine Linux Security Update for thunderbird"},{"cve":"CVE-2022-2226","qid":"505824","title":"Alpine Linux Security Update for thunderbird"},{"cve":"CVE-2022-2226","qid":"710585","title":"Gentoo Linux Mozilla Thunderbird Multiple Vulnerabilities (GLSA 202208-14)"},{"cve":"CVE-2022-2226","qid":"753189","title":"SUSE Enterprise Linux Security Update for MozillaThunderbird (SUSE-SU-2022:3281-1)"},{"cve":"CVE-2022-2226","qid":"753371","title":"SUSE Enterprise Linux Security Update for MozillaThunderbird (SUSE-SU-2022:2320-1)"},{"cve":"CVE-2022-2226","qid":"940630","title":"AlmaLinux Security Update for thunderbird (ALSA-2022:5482)"},{"cve":"CVE-2022-2226","qid":"960153","title":"Rocky Linux Security Update for thunderbird (RLSA-2022:5470)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2022-2226","ASSIGNER":"security@mozilla.org","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Mozilla","product":{"product_data":[{"product_name":"Thunderbird","version":{"version_data":[{"version_value":"102","version_affected":"<"},{"version_value":"91.11","version_affected":"<"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"An email with a mismatching OpenPGP signature date was accepted as valid"}]}]},"references":{"reference_data":[{"url":"https://www.mozilla.org/security/advisories/mfsa2022-26/","refsource":"MISC","name":"https://www.mozilla.org/security/advisories/mfsa2022-26/"},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1775441","refsource":"MISC","name":"https://bugzilla.mozilla.org/show_bug.cgi?id=1775441"}]},"description":{"description_data":[{"lang":"eng","value":"An OpenPGP digital signature includes information about the date when the signature was created. When displaying an email that contains a digital signature, the email's date will be shown. If the dates were different, then Thunderbird didn't report the email as having an invalid signature. If an attacker performed a replay attack, in which an old email with old contents are resent at a later time, it could lead the victim to believe that the statements in the email are current. Fixed versions of Thunderbird will require that the signature's date roughly matches the displayed date of the email. This vulnerability affects Thunderbird < 102 and Thunderbird < 91.11."}]}},"nvd":{"publishedDate":"2022-12-22 20:15:00","lastModifiedDate":"2023-01-05 13:52:00","problem_types":["CWE-294"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","versionEndExcluding":"91.11","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:thunderbird:101.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}