7

CVE-2022-26488

In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.

Data is provided by the National Vulnerability Database (NVD)
PythonPython Version <= 3.7.12
   MicrosoftWindows Version-
PythonPython Version >= 3.8.0 <= 3.8.12
   MicrosoftWindows Version-
PythonPython Version >= 3.9.0 <= 3.9.10
   MicrosoftWindows Version-
PythonPython Version >= 3.10.0 <= 3.10.2
   MicrosoftWindows Version-
PythonPython Version3.11.0 Updatealpha1
   MicrosoftWindows Version-
PythonPython Version3.11.0 Updatealpha2
   MicrosoftWindows Version-
PythonPython Version3.11.0 Updatealpha3
   MicrosoftWindows Version-
PythonPython Version3.11.0 Updatealpha4
   MicrosoftWindows Version-
PythonPython Version3.11.0 Updatealpha5
   MicrosoftWindows Version-
PythonPython Version3.11.0 Updatealpha6
   MicrosoftWindows Version-
NetappActive Iq Unified Manager Version- SwPlatformwindows
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 1.61% 0.812
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7 1 5.9
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 4.4 3.4 6.4
AV:L/AC:M/Au:N/C:P/I:P/A:P
CWE-426 Untrusted Search Path

The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.