CVE-2022-27903
moderate-risk
Published 2022-05-04
An OS Command Injection vulnerability in the configuration parser of Eve-NG Professional through 4.0.1-65 and Eve-NG Community through 2.0.3-112 allows a remote authenticated attacker to execute commands as root by editing virtualization command parameters of imported UNL files.
Do I need to act?
~
5.8% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (2)
Eve-Ng
Eve-Ng
Affected Vendors
References (4)
Vendor Advisory
https://www.eve-ng.net/
Vendor Advisory
https://www.eve-ng.net/
46
/ 100
moderate-risk
Severity
30/34 · Critical
Exploitability
9/34 · Low
Exposure
7/34 · Low