← Retour aux CVEs
CVE-2022-22995
CRITICAL10.0
Description
The combination of primitives offered by SMB and AFP in their default configuration allows the arbitrary writing of files. By exploiting these combination of primitives, an attacker can execute arbitrary code.
Details CVE
Score CVSS v3.110.0
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie3/25/2022
Derniere modification11/3/2025
Sourcenvd
Observations honeypot0
Produits affectes
fedoraproject:fedoranetatalk:netatalkwesterndigital:my_cloudwesterndigital:my_cloud_dl2100westerndigital:my_cloud_dl2100_firmwarewesterndigital:my_cloud_dl4100westerndigital:my_cloud_dl4100_firmwarewesterndigital:my_cloud_ex2100westerndigital:my_cloud_ex2100_firmwarewesterndigital:my_cloud_ex2_ultrawesterndigital:my_cloud_ex2_ultra_firmwarewesterndigital:my_cloud_ex4100westerndigital:my_cloud_ex4100_firmwarewesterndigital:my_cloud_firmwarewesterndigital:my_cloud_homewesterndigital:my_cloud_home_firmwarewesterndigital:my_cloud_mirror_gen_2westerndigital:my_cloud_mirror_gen_2_firmwarewesterndigital:my_cloud_pr2100westerndigital:my_cloud_pr2100_firmwarewesterndigital:my_cloud_pr4100westerndigital:my_cloud_pr4100_firmwarewesterndigital:wd_cloudwesterndigital:wd_cloud_firmware
Faiblesses (CWE)
CWE-59CWE-59
References
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/55ROUJI22SHZX5EM23QAILZHI67EZQKW/(psirt@wdc.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5CZZLFOTUP3QYHGHSDUNENGSLPJ6KGO/(psirt@wdc.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XO34FWOIJI6V6PH2XY52WNBBARVWPJG2/(psirt@wdc.com)
https://security.gentoo.org/glsa/202311-02(psirt@wdc.com)
https://www.westerndigital.com/support/product-security/wdc-22005-netatalk-security-vulnerabilities(psirt@wdc.com)
https://lists.debian.org/debian-lts-announce/2024/01/msg00000.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2024/11/msg00026.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/55ROUJI22SHZX5EM23QAILZHI67EZQKW/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5CZZLFOTUP3QYHGHSDUNENGSLPJ6KGO/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XO34FWOIJI6V6PH2XY52WNBBARVWPJG2/(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202311-02(af854a3a-2127-422b-91ae-364da2661108)
https://www.westerndigital.com/support/product-security/wdc-22005-netatalk-security-vulnerabilities(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.