Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-24450 |
CWE-ID | CWE-863 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
nats-server Server applications / Other server solutions |
Vendor | NATS - The Cloud Native Messaging System |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU64698
Risk: Medium
CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-24450
CWE-ID:
CWE-863 - Incorrect Authorization
Exploit availability: No
DescriptionThe vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to misusing the "dynamically provisioned sandbox accounts" feature. A remote user can take advantage of its valid account and switch over to another existing account without further authentication to obtain the privileges of the System account.
Install update from vendor's website.
Vulnerable software versionsnats-server: 2.0.0 - 2.7.1
External linkshttp://github.com/nats-io/nats-server/releases/tag/v2.7.2
http://advisories.nats.io/CVE/CVE-2022-24450.txt
http://bugzilla.redhat.com/show_bug.cgi?id=2052573
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.