CVE-2022-24809

Severity
6.5MEDIUM
EPSS
0.1%
top 66.79%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 16

Description

net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-only credentials can use a malformed OID in a `GET-NEXT` to the `nsVacmAccessTable` to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP addres

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages4 packages

CVEListV5net-snmp/net-snmp< 5.9.2
NVDnet-snmp/net-snmp< 5.9.2
Debiannet-snmp< 5.9+dfsg-4+deb11u1+3

Also affects: Debian Linux 10.0, 11.0, Fedora 36, Enterprise Linux 9.0, 9.2, 9.4

Patches

🔴Vulnerability Details

2
CVEList
net-snmp: A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference2024-04-16
OSV
CVE-2022-24809: net-snmp provides various tools relating to the Simple Network Management Protocol2024-04-16

📋Vendor Advisories

4
Ubuntu
Net-SNMP vulnerabilities2023-01-16
Ubuntu
Net-SNMP vulnerabilities2022-08-01
Red Hat
net-snmp: A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference.2022-07-01
Debian
CVE-2022-24809: net-snmp - net-snmp provides various tools relating to the Simple Network Management Protoc...2022