Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-46176 |
CWE-ID | CWE-347 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Cargo / Rust Programming Language Universal components / Libraries / Programming Languages & Components |
Vendor |
The Rust Programming Language Rust Team |
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU71491
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2022-46176
CWE-ID:
CWE-347 - Improper Verification of Cryptographic Signature
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform MitM attack.
The vulnerability exists due to Cargo does not perform SSH host key verification when cloning indexes and dependencies via SSH. A remote attacker can perform MitM attack.
Install updates from vendor's website.
Vulnerable software versionsCargo: 0.0.1-pre - 0.67.0
Rust Programming Language: 1.0.0 - 1.66.0
http://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2022-46176
http://github.com/rust-lang/cargo/security/advisories/GHSA-r5w3-xm58-jv6j
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?