CVE-2022-23852
high-risk
Published 2022-01-24
Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES.
Do I need to act?
~
1.7% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: 81b89678e200820271b72cacdd45fb5868855765
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (7)
Communications Metasolv Solution
References (16)
Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
Issue Tracking
https://github.com/libexpat/libexpat/pull/550
Third Party Advisory
https://security.gentoo.org/glsa/202209-24
Third Party Advisory
https://security.netapp.com/advisory/ntap-20220217-0001/
Third Party Advisory
https://www.debian.org/security/2022/dsa-5073
Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html
Third Party Advisory
https://www.tenable.com/security/tns-2022-05
Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
Issue Tracking
https://github.com/libexpat/libexpat/pull/550
Third Party Advisory
https://security.gentoo.org/glsa/202209-24
Third Party Advisory
https://security.netapp.com/advisory/ntap-20220217-0001/
Third Party Advisory
https://www.debian.org/security/2022/dsa-5073
Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html
Third Party Advisory
https://www.tenable.com/security/tns-2022-05
50
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
4/34 · Minimal
Exposure
14/34 · Moderate