CVE-2022-2048
moderate-risk
Published 2022-07-07
In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.
Do I need to act?
~
1.3% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (10)
Management Services For Element Software And Netapp Hci
References (10)
Third Party Advisory
https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j
Third Party Advisory
https://security.netapp.com/advisory/ntap-20220901-0006/
Third Party Advisory
https://www.debian.org/security/2022/dsa-5198
Third Party Advisory
https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j
Third Party Advisory
https://security.netapp.com/advisory/ntap-20220901-0006/
Third Party Advisory
https://www.debian.org/security/2022/dsa-5198
46
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
4/34 · Minimal
Exposure
16/34 · Moderate