Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-46176 |
CWE-ID | CWE-347 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Cargo / Rust Programming Language Universal components / Libraries / Programming Languages & Components |
Vendor |
The Rust Programming Language Rust Team |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU71491
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2022-46176
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to perform MitM attack.
The vulnerability exists due to Cargo does not perform SSH host key verification when cloning indexes and dependencies via SSH. A remote attacker can perform MitM attack.
Install updates from vendor's website.
Vulnerable software versionsCargo: 0.0.1-pre - 0.67.0
Rust Programming Language: 1.0.0 - 1.66.0
Fixed software versionsCPE2.3 External links
http://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2022-46176
http://github.com/rust-lang/cargo/security/advisories/GHSA-r5w3-xm58-jv6j
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?