CVE-2022-21718
moderate-risk
Published 2022-03-22
Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. A vulnerability in versions prior to `17.0.0-alpha.6`, `16.0.6`, `15.3.5`, `14.2.4`, and `13.6.6` allows renderers to obtain access to a bluetooth device via the web bluetooth API if the app has not configured a custom `select-bluetooth-device` event handler. This has been patched and Electron versions `17.0.0-alpha.6`, `16.0.6`, `15.3.5`, `14.2.4`, and `13.6.6` contain the fix. Code from the GitHub Security Advisory can be added to the app to work around the issue.
Do I need to act?
-
0.85% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.4/10
Low
NETWORK
/ LOW complexity
Affected Vendors
References (6)
Issue Tracking
https://github.com/electron/electron/pull/32178
Issue Tracking
https://github.com/electron/electron/pull/32240
Issue Tracking
https://github.com/electron/electron/pull/32178
Issue Tracking
https://github.com/electron/electron/pull/32240
32
/ 100
moderate-risk
Severity
16/34 · Moderate
Exploitability
3/34 · Minimal
Exposure
13/34 · Low