CVE-2022-21810
low-risk
Published 2023-01-26
All versions of the package smartctl are vulnerable to Command Injection via the info method due to improper input sanitization.
Do I need to act?
-
0.35% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.4/10
High
LOCAL
/ HIGH complexity
Affected Products (1)
Smartctl
Affected Vendors
References (4)
25
/ 100
low-risk
Severity
19/34 · Moderate
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal