CVE-2022-46505
Vulnerability from cvelistv5
Published
2023-01-18 00:00
Modified
2024-08-03 14:31
Severity ?
EPSS score ?
Summary
An issue in MatrixSSL 4.5.1-open and earlier leads to failure to securely check the SessionID field, resulting in the misuse of an all-zero MasterSecret that can decrypt secret data.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/SmallTown123/details-for-CVE-2022-46505 | Exploit, Third Party Advisory | |
cve@mitre.org | https://smalltown123.notion.site/MatrixSSL-session-resume-bug-a0 | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/SmallTown123/details-for-CVE-2022-46505 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://smalltown123.notion.site/MatrixSSL-session-resume-bug-a0 | Permissions Required, Vendor Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:46.379Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://smalltown123.notion.site/MatrixSSL-session-resume-bug-a0" }, { "tags": [ "x_transferred" ], "url": "https://github.com/SmallTown123/details-for-CVE-2022-46505" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue in MatrixSSL 4.5.1-open and earlier leads to failure to securely check the SessionID field, resulting in the misuse of an all-zero MasterSecret that can decrypt secret data." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-18T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://smalltown123.notion.site/MatrixSSL-session-resume-bug-a0" }, { "url": "https://github.com/SmallTown123/details-for-CVE-2022-46505" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-46505", "datePublished": "2023-01-18T00:00:00", "dateReserved": "2022-12-05T00:00:00", "dateUpdated": "2024-08-03T14:31:46.379Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-46505\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2023-01-18T16:15:11.320\",\"lastModified\":\"2024-11-21T07:30:40.183\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue in MatrixSSL 4.5.1-open and earlier leads to failure to securely check the SessionID field, resulting in the misuse of an all-zero MasterSecret that can decrypt secret data.\"},{\"lang\":\"es\",\"value\":\"Un problema en MatrixSSL 4.5.1-open y versiones anteriores provoca que no se pueda verificar de forma segura el campo SessionID, lo que resulta en el uso indebido de un MasterSecret completamente cero que puede descifrar datos secretos.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-665\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:matrixssl:matrixssl:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.5.1\",\"matchCriteriaId\":\"5D077B93-95F0-4952-B97A-B62348C6DC04\"}]}]}],\"references\":[{\"url\":\"https://github.com/SmallTown123/details-for-CVE-2022-46505\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://smalltown123.notion.site/MatrixSSL-session-resume-bug-a0\",\"source\":\"cve@mitre.org\",\"tags\":[\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/SmallTown123/details-for-CVE-2022-46505\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://smalltown123.notion.site/MatrixSSL-session-resume-bug-a0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.