← Back to CVEs
CVE-2022-29885
HIGH7.5
Description
The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20, 9.0.13 to 9.0.62 and 8.5.38 to 8.5.78 for the EncryptInterceptor incorrectly stated it enabled Tomcat clustering to run over an untrusted network. This was not correct. While the EncryptInterceptor does provide confidentiality and integrity protection, it does not protect against all risks associated with running over any untrusted network, particularly DoS risks.
CVE Details
CVSS v3.1 Score7.5
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published5/12/2022
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
apache:tomcatdebian:debian_linuxoracle:hospitality_cruise_shipboard_property_management_system
Weaknesses (CWE)
CWE-400
References
http://packetstormsecurity.com/files/171728/Apache-Tomcat-10.1-Denial-Of-Service.html(security@apache.org)
https://lists.apache.org/thread/2b4qmhbcyqvc7dyfpjyx54c03x65vhcv(security@apache.org)
https://lists.debian.org/debian-lts-announce/2022/10/msg00029.html(security@apache.org)
https://security.netapp.com/advisory/ntap-20220629-0002/(security@apache.org)
https://www.debian.org/security/2022/dsa-5265(security@apache.org)
https://www.oracle.com/security-alerts/cpujul2022.html(security@apache.org)
http://packetstormsecurity.com/files/171728/Apache-Tomcat-10.1-Denial-Of-Service.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread/2b4qmhbcyqvc7dyfpjyx54c03x65vhcv(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2022/10/msg00029.html(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20220629-0002/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2022/dsa-5265(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujul2022.html(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.