⚠ Actively exploited
Added to CISA KEV on 2022-05-16. Federal agencies required to patch by 2022-06-06. Required action: Apply updates per vendor instructions..
CVE-2022-22947
Severity
10.0CRITICAL
EPSS
94.5%
top < 0.01%
CISA KEV
KEV
Added 2022-05-16
Due 2022-06-06
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedMar 3
KEV addedMay 16
KEV dueJun 6
Latest updateOct 30
CISA Required Action: Apply updates per vendor instructions.
Description
In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:HExploitability: 3.9 | Impact: 6.0
Affected Packages12 packages
▶CVEListV5spring_cloud_gatewaySpring cloud gateway versions 3.1.x prior to 3.1.1+, 3.0.x prior to 3.0.7+ and all old and unsupported versions
Patches
🔴Vulnerability Details
4💥Exploits & PoCs
2Nuclei▶
Spring Cloud Gateway Code Injection
🔍Detection Rules
2📋Vendor Advisories
3🕵️Threat Intelligence
3Unit42▶
Network Security Trends: Recent Exploits Observed in the Wild Include Remote Code Execution, Cross-Site Scripting and More↗2022-08-19