{"api_version":"1","generated_at":"2026-04-23T09:41:03+00:00","cve":"CVE-2022-46377","urls":{"html":"https://cve.report/CVE-2022-46377","api":"https://cve.report/api/cve/CVE-2022-46377.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-46377","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-46377"},"summary":{"title":"CVE-2022-46377","description":"An out-of-bounds read vulnerability exists in the PORT command parameter extraction functionality of Weston Embedded uC-FTPs v 1.98.00. A specially-crafted set of network packets can lead to denial of service. An attacker can send packets to trigger this vulnerability.This vulnerability occurs when no IP address argument is provided to the `PORT` command.","state":"PUBLIC","assigner":"talos-cna@cisco.com","published_at":"2023-05-10 16:15:00","updated_at":"2023-05-18 21:23:00"},"problem_types":["CWE-125"],"metrics":[],"references":[{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681","name":"https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681","refsource":"MISC","tags":[],"title":"TALOS-2022-1681 ||  Cisco Talos Intelligence Group - Comprehensive Threat Intelligence","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/weston-embedded/uC-FTPs/pull/2","name":"https://github.com/weston-embedded/uC-FTPs/pull/2","refsource":"MISC","tags":[],"title":"Patched DoS vulnerabilities CVE-2022-46377 and CVE-2022-46378 / TALOS-2022-1681. by yasosa305 · Pull Request #2 · weston-embedded/uC-FTPs · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-46377","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-46377","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"46377","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"weston-embedded","cpe5":"uc-ftps","cpe6":"1.98.00","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-46377","ASSIGNER":"talos-cna@cisco.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"An out-of-bounds read vulnerability exists in the PORT command parameter extraction functionality of Weston Embedded uC-FTPs v 1.98.00. A specially-crafted set of network packets can lead to denial of service. An attacker can send packets to trigger this vulnerability.This vulnerability occurs when no IP address argument is provided to the `PORT` command."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-823: Use of Out-of-range Pointer Offset","cweId":"CWE-823"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Weston Embedded","product":{"product_data":[{"product_name":"uC-FTPs","version":{"version_data":[{"version_affected":"=","version_value":"v 1.98.00"}]}}]}}]}},"references":{"reference_data":[{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681","refsource":"MISC","name":"https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681"},{"url":"https://github.com/weston-embedded/uC-FTPs/pull/2","refsource":"MISC","name":"https://github.com/weston-embedded/uC-FTPs/pull/2"}]},"credits":[{"lang":"en","value":"Discovered by Kelly Leuschner of Cisco Talos."}],"impact":{"cvss":[{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":6.5,"baseSeverity":"MEDIUM"}]}},"nvd":{"publishedDate":"2023-05-10 16:15:00","lastModifiedDate":"2023-05-18 21:23:00","problem_types":["CWE-125"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:weston-embedded:uc-ftps:1.98.00:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}