CVE-2022-28734
moderate-risk
Published 2023-07-20
Out-of-bounds write when handling split HTTP headers; When handling split HTTP headers, GRUB2 HTTP code accidentally moves its internal data buffer point by one position. This can lead to a out-of-bound write further when parsing the HTTP request, writing a NULL byte past the buffer. It's conceivable that an attacker controlled set of packets can lead to corruption of the GRUB2's internal memory metadata.
Do I need to act?
-
0.14% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.1/10
High
NETWORK
/ HIGH complexity
Affected Products (2)
References (6)
Third Party Advisory
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28734
Third Party Advisory
https://security.netapp.com/advisory/ntap-20230825-0002/
Third Party Advisory
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28734
Third Party Advisory
https://security.netapp.com/advisory/ntap-20230825-0002/
32
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
1/34 · Minimal
Exposure
7/34 · Low