7.5
CVE-2022-24950
- EPSS 0.57%
- Veröffentlicht 16.08.2022 01:15:12
- Zuletzt bearbeitet 21.11.2024 06:51:26
- Quelle cve-assign@fb.com
- CVE-Watchlists
- Unerledigt
A race condition exists in Eternal Terminal prior to version 6.2.0 that allows an authenticated attacker to hijack other users' SSH authorization socket, enabling the attacker to login to other systems as the targeted users. The bug is in UserTerminalRouter::getInfoForId().
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Eternal Terminal Project ≫ Eternal Terminal Version < 6.2.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.57% | 0.682 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.5 | 1.6 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.