CVE-2022-40674
moderate-risk
Published 2022-09-14
libexpat before 2.4.9 has a use-after-free in the doContent function in xmlparse.c.
Do I need to act?
~
1.1% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.1/10
High
NETWORK
/ HIGH complexity
Affected Products (6)
Affected Vendors
References (24)
Issue Tracking
https://github.com/libexpat/libexpat/pull/629
Issue Tracking
https://github.com/libexpat/libexpat/pull/640
Third Party Advisory
https://security.gentoo.org/glsa/202209-24
Third Party Advisory
https://security.gentoo.org/glsa/202211-06
Third Party Advisory
https://security.netapp.com/advisory/ntap-20221028-0008/
Third Party Advisory
https://www.debian.org/security/2022/dsa-5236
Issue Tracking
https://github.com/libexpat/libexpat/pull/629
Issue Tracking
https://github.com/libexpat/libexpat/pull/640
and 4 more references
40
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
3/34 · Minimal
Exposure
13/34 · Low