7.2

CVE-2022-29257

Electron is a framework for writing cross-platform desktop applications using JavaScript (JS), HTML, and CSS. A vulnerability in versions prior to 18.0.0-beta.6, 17.2.0, 16.2.6, and 15.5.5 allows attackers who have control over a given apps update server / update storage to serve maliciously crafted update packages that pass the code signing validation check but contain malicious code in some components. This kind of attack would require significant privileges in a potential victim's own auto updating infrastructure and the ease of that attack entirely depends on the potential victim's infrastructure security. Electron versions 18.0.0-beta.6, 17.2.0, 16.2.6, and 15.5.5 contain a fix for this issue. There are no known workarounds.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ElectronjsElectron Version < 15.5.0
ElectronjsElectron Version >= 16.0.1 < 16.2.0
ElectronjsElectron Version >= 17.0.1 < 17.2.0
ElectronjsElectron Version16.0.0 Updatebeta1
ElectronjsElectron Version16.0.0 Updatebeta2
ElectronjsElectron Version16.0.0 Updatebeta3
ElectronjsElectron Version16.0.0 Updatebeta4
ElectronjsElectron Version16.0.0 Updatebeta5
ElectronjsElectron Version16.0.0 Updatebeta6
ElectronjsElectron Version16.0.0 Updatebeta7
ElectronjsElectron Version16.0.0 Updatebeta8
ElectronjsElectron Version16.0.0 Updatebeta9
ElectronjsElectron Version17.0.0 Updatebeta1
ElectronjsElectron Version17.0.0 Updatebeta2
ElectronjsElectron Version17.0.0 Updatebeta3
ElectronjsElectron Version17.0.0 Updatebeta4
ElectronjsElectron Version17.0.0 Updatebeta5
ElectronjsElectron Version17.0.0 Updatebeta6
ElectronjsElectron Version17.0.0 Updatebeta7
ElectronjsElectron Version17.0.0 Updatebeta8
ElectronjsElectron Version17.0.0 Updatebeta9
ElectronjsElectron Version18.0.0 Updatebeta1
ElectronjsElectron Version18.0.0 Updatebeta2
ElectronjsElectron Version18.0.0 Updatebeta3
ElectronjsElectron Version18.0.0 Updatebeta4
ElectronjsElectron Version18.0.0 Updatebeta5
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.45% 0.629
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.2 1.2 5.9
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 6.5 8 6.4
AV:N/AC:L/Au:S/C:P/I:P/A:P
security-advisories@github.com 6.6 0.7 5.9
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.