CVE-2022-40284
moderate-risk
Published 2022-11-06
A buffer overflow was discovered in NTFS-3G before 2022.10.3. Crafted metadata in an NTFS image can cause code execution. A local attacker can exploit this if the ntfs-3g binary is setuid root. A physically proximate attacker can exploit this if NTFS-3G software is configured to execute upon attachment of an external storage device.
Do I need to act?
-
0.04% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (5)
Affected Vendors
References (14)
Third Party Advisory
https://github.com/tuxera/ntfs-3g/releases
Third Party Advisory
https://security.gentoo.org/glsa/202301-01
Third Party Advisory
https://github.com/tuxera/ntfs-3g/releases
Third Party Advisory
https://security.gentoo.org/glsa/202301-01
36
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
0/34 · Minimal
Exposure
12/34 · Low