CVE-2022-22963
critical-risk
Published 2022-04-01
In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.
Do I need to act?
!
94.5% chance of exploitation in next 30 days
EPSS score — higher than 6% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (20)
Banking Liquidity Management
Banking Liquidity Management
References (13)
Third Party Advisory
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005
Vendor Advisory
https://tanzu.vmware.com/security/cve-2022-22963
Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-j...
Third Party Advisory
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005
Vendor Advisory
https://tanzu.vmware.com/security/cve-2022-22963
Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-j...
US Government Resource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-...
84
/ 100
critical-risk
Severity
32/34 · Critical
Exploitability
27/34 · High
Exposure
25/34 · High