Risk | Low |
Patch available | NO |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-27820 |
CWE-ID | CWE-295 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software Subscribe |
ZAP Client/Desktop applications / Software for system administration |
Vendor | OWASP |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU61607
Risk: Low
CVSSv3.1: 3.9 [CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:U/RC:C]
CVE-ID: CVE-2022-27820
CWE-ID:
CWE-295 - Improper Certificate Validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform MitM attack.
The vulnerability exists due to missing TLS certificate chain validation. A remote attacker can perform MitM attack and intercept communication between the ZAP proxy and the server.
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsZAP: 1.0.0 - w2022-03-21
External linkshttp://www.openwall.com/lists/oss-security/2022/03/23/1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.