CVE-2022-25647
moderate-risk
Published 2022-05-01
The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes, which may lead to DoS attacks.
Do I need to act?
~
2.8% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.7/10
High
NETWORK
/ HIGH complexity
Affected Products (14)
Gson
References (16)
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/09/msg00009.html
Third Party Advisory
https://security.netapp.com/advisory/ntap-20220901-0009/
Third Party Advisory
https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327
Third Party Advisory
https://www.debian.org/security/2022/dsa-5227
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/09/msg00009.html
Third Party Advisory
https://security.netapp.com/advisory/ntap-20220901-0009/
Third Party Advisory
https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327
Third Party Advisory
https://www.debian.org/security/2022/dsa-5227
47
/ 100
moderate-risk
Severity
23/34 · High
Exploitability
6/34 · Minimal
Exposure
18/34 · Moderate