8.8
CVE-2022-42463
- EPSS 0.09%
- Veröffentlicht 14.10.2022 15:16:24
- Zuletzt bearbeitet 21.11.2024 07:25:00
- Quelle scy@openharmony.io
- CVE-Watchlists
- Unerledigt
OpenHarmony-v3.1.2 and prior versions have an authenication bypass vulnerability in a callback handler function of Softbus_server in communication subsystem. Attackers can launch attacks on distributed networks by sending Bluetooth rfcomm packets to any remote device and executing arbitrary commands.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Openharmony ≫ Openharmony Version >= 3.1 <= 3.1.2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.09% | 0.266 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| scy@openharmony.io | 8.3 | 1.6 | 6 |
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
|
CWE-287 Improper Authentication
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.