CVE-2022-46393
moderate-risk
Published 2022-12-15
An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.3.0. There is a potential heap-based buffer overflow and heap-based buffer over-read in DTLS if MBEDTLS_SSL_DTLS_CONNECTION_ID is enabled and MBEDTLS_SSL_CID_IN_LEN_MAX > 2 * MBEDTLS_SSL_CID_OUT_LEN_MAX.
Do I need to act?
-
0.81% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Vendors
References (10)
Release Notes
https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2
Release Notes
https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.3.0
Release Notes
https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2
Release Notes
https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.3.0
44
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
3/34 · Minimal
Exposure
9/34 · Low