Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
Low
Attack Vector
Local
0

CVE-2022-23181

Disclosure Date: January 27, 2022
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

The fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
7.0 High
Impact Score:
5.9
Exploitability Score:
1
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector (AV):
Local
Attack Complexity (AC):
High
Privileges Required (PR):
Low
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High

General Information

Vendors

  • apache,
  • debian,
  • oracle

Products

  • agile engineering data management 6.2.1.0,
  • communications cloud native core policy 1.15.0,
  • debian linux 10.0,
  • debian linux 11.0,
  • financial services crime and compliance management studio 8.0.8.2.0,
  • financial services crime and compliance management studio 8.0.8.3.0,
  • managed file transfer 12.2.1.3.0,
  • managed file transfer 12.2.1.4.0,
  • mysql enterprise monitor,
  • tomcat,
  • tomcat 10.0.0,
  • tomcat 10.1.0
Technical Analysis