Vulnerabilites related to Facebook - Hermes
Vulnerability from fkie_nvd
Published
2023-05-18 22:15
Modified
2025-01-31 14:15
Summary
An error in BigInt conversion to Number in Hermes prior to commit a6dcafe6ded8e61658b40f5699878cd19a481f80 could have been used by a malicious attacker to execute arbitrary code due to an out-of-bound write. Note that this bug is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
facebook hermes *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:facebook:hermes:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0B18E12-1694-49FF-881C-4BC5A8C847D7",
                     versionEndExcluding: "2023-02-02",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An error in BigInt conversion to Number in Hermes prior to commit a6dcafe6ded8e61658b40f5699878cd19a481f80 could have been used by a malicious attacker to execute arbitrary code due to an out-of-bound write. Note that this bug is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.",
      },
   ],
   id: "CVE-2023-23556",
   lastModified: "2025-01-31T14:15:29.200",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-05-18T22:15:09.487",
   references: [
      {
         source: "cve-assign@fb.com",
         tags: [
            "Patch",
         ],
         url: "https://github.com/facebook/hermes/commit/a6dcafe6ded8e61658b40f5699878cd19a481f80",
      },
      {
         source: "cve-assign@fb.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2023-23556",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://github.com/facebook/hermes/commit/a6dcafe6ded8e61658b40f5699878cd19a481f80",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2023-23556",
      },
   ],
   sourceIdentifier: "cve-assign@fb.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-10-08 19:15
Modified
2024-11-21 05:11
Severity ?
Summary
A logic vulnerability when handling the SaveGeneratorLong instruction in Facebook Hermes prior to commit b2021df620824627f5a8c96615edbd1eb7fdddfc allows attackers to potentially read out of bounds or theoretically execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
facebook hermes *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:facebook:hermes:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B207EF9-C6DF-4130-9607-BF7D986FE1AA",
                     versionEndExcluding: "2020-10-01",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A logic vulnerability when handling the SaveGeneratorLong instruction in Facebook Hermes prior to commit b2021df620824627f5a8c96615edbd1eb7fdddfc allows attackers to potentially read out of bounds or theoretically execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad lógica al manejar la instrucción SaveGeneratorLong en Facebook Hermes antes del commit b2021df620824627f5a8c96615edbd1eb7fdddfc, permite a atacantes leer potencialmente fuera de límites o, teóricamente, ejecutar código arbitrario por medio de JavaScript diseñado. Tome en cuenta que esto solo es explotable si la aplicación que utiliza Hermes permite una evaluación de un JavaScript que no es confiable. Por lo tanto, la mayoría de las aplicaciones React Native no están afectadas",
      },
   ],
   id: "CVE-2020-1914",
   lastModified: "2024-11-21T05:11:36.147",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-10-08T19:15:12.080",
   references: [
      {
         source: "cve-assign@fb.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/facebook/hermes/commit/b2021df620824627f5a8c96615edbd1eb7fdddfc",
      },
      {
         source: "cve-assign@fb.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2020-1914",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/facebook/hermes/commit/b2021df620824627f5a8c96615edbd1eb7fdddfc",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2020-1914",
      },
   ],
   sourceIdentifier: "cve-assign@fb.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-670",
            },
         ],
         source: "cve-assign@fb.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-670",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-05-18 22:15
Modified
2025-01-21 21:15
Summary
A bytecode optimization bug in Hermes prior to commit e6ed9c1a4b02dc219de1648f44cd808a56171b81 could be used to cause an use-after-free and obtain arbitrary code execution via a carefully crafted payload. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
facebook hermes -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:facebook:hermes:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA8E037E-6A33-4EA0-A5C1-55F29A30F900",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A bytecode optimization bug in Hermes prior to commit e6ed9c1a4b02dc219de1648f44cd808a56171b81 could be used to cause an use-after-free and obtain arbitrary code execution via a carefully crafted payload. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.",
      },
   ],
   id: "CVE-2023-28081",
   lastModified: "2025-01-21T21:15:09.707",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-05-18T22:15:09.807",
   references: [
      {
         source: "cve-assign@fb.com",
         tags: [
            "Patch",
         ],
         url: "https://github.com/facebook/hermes/commit/e6ed9c1a4b02dc219de1648f44cd808a56171b81",
      },
      {
         source: "cve-assign@fb.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2023-28081",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://github.com/facebook/hermes/commit/e6ed9c1a4b02dc219de1648f44cd808a56171b81",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2023-28081",
      },
   ],
   sourceIdentifier: "cve-assign@fb.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-10-11 02:15
Modified
2024-11-21 07:20
Severity ?
Summary
An integer conversion error in Hermes bytecode generation, prior to commit 6aa825e480d48127b480b08d13adf70033237097, could have been used to perform Out-Of-Bounds operations and subsequently execute arbitrary code. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
facebook hermes *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:facebook:hermes:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "451DE6BE-B59A-48A8-BB8D-462144D9BBBB",
                     versionEndExcluding: "2022-09-27",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An integer conversion error in Hermes bytecode generation, prior to commit 6aa825e480d48127b480b08d13adf70033237097, could have been used to perform Out-Of-Bounds operations and subsequently execute arbitrary code. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.",
      },
      {
         lang: "es",
         value: "Un error de conversión de enteros en la generación de bytecode de Hermes, anterior al commit 6aa825e480d48127b480b08d13adf70033237097, podría haber sido usado para llevar a cabo operaciones Fuera de Límites y posteriormente ejecutar código arbitrario. Tenga en cuenta que esto sólo es explotable en los casos en que Hermes es usado para ejecutar JavaScript no confiable. Por lo tanto, la mayoría de las aplicaciones React Native no están afectadas",
      },
   ],
   id: "CVE-2022-40138",
   lastModified: "2024-11-21T07:20:57.487",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-10-11T02:15:08.857",
   references: [
      {
         source: "cve-assign@fb.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/facebook/hermes/commit/6aa825e480d48127b480b08d13adf70033237097",
      },
      {
         source: "cve-assign@fb.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/CVE-2022-40138",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/facebook/hermes/commit/6aa825e480d48127b480b08d13adf70033237097",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/CVE-2022-40138",
      },
   ],
   sourceIdentifier: "cve-assign@fb.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-681",
            },
         ],
         source: "cve-assign@fb.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-681",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-06-15 22:15
Modified
2024-11-21 05:52
Severity ?
Summary
A use after free in hermes, while emitting certain error messages, prior to commit d86e185e485b6330216dee8e854455c694e3a36e allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
facebook hermes *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:facebook:hermes:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EBBC19B-7D47-40AC-A446-A0C971A5884B",
                     versionEndExcluding: "0.8.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A use after free in hermes, while emitting certain error messages, prior to commit d86e185e485b6330216dee8e854455c694e3a36e allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.",
      },
      {
         lang: "es",
         value: "Un uso de la memoria previamente liberada en hermes, mientras se emiten determinados mensajes de error, antes del commit d86e185e485b6330216dee8e854455c694e3a36e permite a atacantes ejecutar potencialmente código arbitrario por medio de JavaScript diseñado. Tome en cuenta que esto sólo es explotable si la aplicación que usa Hermes permite la evaluación de JavaScript no confiable. Por lo tanto, la mayoría de las aplicaciones React Native no están afectadas",
      },
   ],
   id: "CVE-2021-24037",
   lastModified: "2024-11-21T05:52:15.493",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-06-15T22:15:08.680",
   references: [
      {
         source: "cve-assign@fb.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/facebook/hermes/commit/d86e185e485b6330216dee8e854455c694e3a36e",
      },
      {
         source: "cve-assign@fb.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/CVE-2021-24037",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/facebook/hermes/commit/d86e185e485b6330216dee8e854455c694e3a36e",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/CVE-2021-24037",
      },
   ],
   sourceIdentifier: "cve-assign@fb.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "cve-assign@fb.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-02-02 07:15
Modified
2024-11-21 05:11
Severity ?
Summary
A stack overflow vulnerability in Facebook Hermes 'builtin apply' prior to commit 86543ac47e59c522976b5632b8bf9a2a4583c7d2 (https://github.com/facebook/hermes/commit/86543ac47e59c522976b5632b8bf9a2a4583c7d2) allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
facebook hermes *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:facebook:hermes:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD236EB4-8261-478C-8244-5E4646753E44",
                     versionEndExcluding: "0.5.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A stack overflow vulnerability in Facebook Hermes 'builtin apply' prior to commit 86543ac47e59c522976b5632b8bf9a2a4583c7d2 (https://github.com/facebook/hermes/commit/86543ac47e59c522976b5632b8bf9a2a4583c7d2) allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de desbordamiento de la pila en Facebook Hermes 'builtin apply' anterior al commit 86543ac47e59c522976b5632b8bf9a2a4583c7d2 (https://github.com/facebook/hermes/commit/86543ac47e59c522976b5632b8bf9a2a4583c7d2) permite ejecutar un JavaScript potencialmente arbitrario. Tome en cuenta que esto solo es explotable si la aplicación que usa Hermes permite una evaluación de JavaScript no confiable. Por lo tanto, la mayoría de las aplicaciones React Native no están afectadas",
      },
   ],
   id: "CVE-2020-1896",
   lastModified: "2024-11-21T05:11:34.030",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-02-02T07:15:13.333",
   references: [
      {
         source: "cve-assign@fb.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/facebook/hermes/commit/86543ac47e59c522976b5632b8bf9a2a4583c7d2",
      },
      {
         source: "cve-assign@fb.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2020-1896",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/facebook/hermes/commit/86543ac47e59c522976b5632b8bf9a2a4583c7d2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2020-1896",
      },
   ],
   sourceIdentifier: "cve-assign@fb.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-121",
            },
         ],
         source: "cve-assign@fb.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-10-11 02:15
Modified
2024-11-21 07:11
Severity ?
Summary
A write-what-where condition in hermes caused by an integer overflow, prior to commit 5b6255ae049fa4641791e47fad994e8e8c4da374 allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
facebook hermes *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:facebook:hermes:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD57D241-3E0D-490F-B160-C3E8FDD0BCBE",
                     versionEndExcluding: "0.12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A write-what-where condition in hermes caused by an integer overflow, prior to commit 5b6255ae049fa4641791e47fad994e8e8c4da374 allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.",
      },
      {
         lang: "es",
         value: "Una condición write-what-where en Hermes causada por un desbordamiento de enteros, versiones anteriores al commit 5b6255ae049fa4641791e47fad994e8e8c4da374 permite a atacantes ejecutar potencialmente código arbitrario por medio de JavaScript diseñado. Tenga en cuenta que esto sólo es explotable si la aplicación que usa Hermes permite la evaluación de JavaScript no confiable. Por lo tanto, la mayoría de las aplicaciones React Native no están afectadas",
      },
   ],
   id: "CVE-2022-35289",
   lastModified: "2024-11-21T07:11:03.127",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-10-11T02:15:08.787",
   references: [
      {
         source: "cve-assign@fb.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/facebook/hermes/commit/5b6255ae049fa4641791e47fad994e8e8c4da374",
      },
      {
         source: "cve-assign@fb.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/CVE-2022-35289",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/facebook/hermes/commit/5b6255ae049fa4641791e47fad994e8e8c4da374",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/CVE-2022-35289",
      },
   ],
   sourceIdentifier: "cve-assign@fb.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-680",
            },
         ],
         source: "cve-assign@fb.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-190",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-01-15 01:15
Modified
2024-11-21 05:52
Severity ?
Summary
By passing invalid javascript code where await and yield were called upon non-async and non-generator getter/setter functions, Hermes would invoke generator functions and error out on invalid await/yield positions. This could result in segmentation fault as a consequence of type confusion error, with a low chance of RCE. This issue affects Hermes versions prior to v0.10.0.
Impacted products
Vendor Product Version
facebook hermes *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:facebook:hermes:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A6510A9-5178-4595-8EF6-622998CDB1F3",
                     versionEndExcluding: "0.10.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "By passing invalid javascript code where await and yield were called upon non-async and non-generator getter/setter functions, Hermes would invoke generator functions and error out on invalid await/yield positions. This could result in segmentation fault as a consequence of type confusion error, with a low chance of RCE. This issue affects Hermes versions prior to v0.10.0.",
      },
      {
         lang: "es",
         value: "Al pasar código javascript no válido en el que era llamado a await y yield sobre funciones getter/setter no asíncronas y no generadoras, Hermes invocaba funciones generadoras y daba error en posiciones await/yield no válidas. Esto podría resultar en un fallo de segmentación como consecuencia de un error de confusión de tipos, con una baja probabilidad de RCE. Este problema afecta a Hermes versiones anteriores a v0.10.0",
      },
   ],
   id: "CVE-2021-24044",
   lastModified: "2024-11-21T05:52:16.290",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-01-15T01:15:07.943",
   references: [
      {
         source: "cve-assign@fb.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2021-24044",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2021-24044",
      },
   ],
   sourceIdentifier: "cve-assign@fb.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-843",
            },
         ],
         source: "cve-assign@fb.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-843",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-09-09 19:15
Modified
2024-11-21 05:11
Summary
An out-of-bounds read/write vulnerability when executing lazily compiled inner generator functions in Facebook Hermes prior to commit 091835377369c8fd5917d9b87acffa721ad2a168 allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
facebook hermes *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:facebook:hermes:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3895EA2-1ACF-4DBB-AEE6-DE4EFF62F6D0",
                     versionEndIncluding: "0.4.3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An out-of-bounds read/write vulnerability when executing lazily compiled inner generator functions in Facebook Hermes prior to commit 091835377369c8fd5917d9b87acffa721ad2a168 allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de lectura/escritura fuera de límites cuando se ejecutan funciones inner generator compiladas perezosamente en Facebook Hermes anterior del commit 091835377369c8fd5917d9b87acffa721ad2a168, permite a atacantes ejecutar potencialmente código arbitrario por medio de un JavaScript diseñado. Tome en cuenta que esto solo es explotable si la aplicación que utiliza Hermes permite la evaluación de JavaScript que no es de confianza. Por lo tanto, la mayoría de las aplicaciones React Native no están afectadas.",
      },
   ],
   id: "CVE-2020-1912",
   lastModified: "2024-11-21T05:11:35.917",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.1,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.2,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-09-09T19:15:20.850",
   references: [
      {
         source: "cve-assign@fb.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/facebook/hermes/commit/091835377369c8fd5917d9b87acffa721ad2a168",
      },
      {
         source: "cve-assign@fb.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2020-1912",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/facebook/hermes/commit/091835377369c8fd5917d9b87acffa721ad2a168",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2020-1912",
      },
   ],
   sourceIdentifier: "cve-assign@fb.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "cve-assign@fb.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-10-11 01:15
Modified
2024-11-21 07:05
Severity ?
Summary
An out of bounds write in hermes, while handling large arrays, prior to commit 06eaec767e376bfdb883d912cb15e987ddf2bda1 allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
facebook hermes *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:facebook:hermes:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD57D241-3E0D-490F-B160-C3E8FDD0BCBE",
                     versionEndExcluding: "0.12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An out of bounds write in hermes, while handling large arrays, prior to commit 06eaec767e376bfdb883d912cb15e987ddf2bda1 allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.",
      },
      {
         lang: "es",
         value: "Una escritura fuera de límites en Hermes, mientras son manejados arrays grandes, antes del commit 06eaec767e376bfdb883d912cb15e987ddf2bda1 permite a atacantes ejecutar potencialmente código arbitrario por medio de JavaScript diseñado. Tenga en cuenta que esto sólo es explotable si la aplicación que usa Hermes permite la evaluación de JavaScript no confiable. Por lo tanto, la mayoría de las aplicaciones React Native no están afectadas",
      },
   ],
   id: "CVE-2022-32234",
   lastModified: "2024-11-21T07:05:58.767",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-10-11T01:15:08.893",
   references: [
      {
         source: "cve-assign@fb.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/facebook/hermes/commit/06eaec767e376bfdb883d912cb15e987ddf2bda1",
      },
      {
         source: "cve-assign@fb.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/CVE-2022-32234",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/facebook/hermes/commit/06eaec767e376bfdb883d912cb15e987ddf2bda1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/CVE-2022-32234",
      },
   ],
   sourceIdentifier: "cve-assign@fb.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "cve-assign@fb.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-09-04 03:15
Modified
2024-11-21 05:11
Severity ?
Summary
A type confusion vulnerability when resolving properties of JavaScript objects with specially-crafted prototype chains in Facebook Hermes prior to commit fe52854cdf6725c2eaa9e125995da76e6ceb27da allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
facebook hermes *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:facebook:hermes:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A050D3EF-B82D-4B22-8504-42B384E738B9",
                     versionEndExcluding: "0.4.3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A type confusion vulnerability when resolving properties of JavaScript objects with specially-crafted prototype chains in Facebook Hermes prior to commit fe52854cdf6725c2eaa9e125995da76e6ceb27da allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de confusión de tipos al resolver propiedades de objetos JavaScript con cadenas de prototipos especialmente diseñadas en Facebook Hermes versiones anteriores al commit fe52854cdf6725c2eaa9e125995da76e6ceb27da, permite a atacantes ejecutar potencialmente código arbitrario por medio de un JavaScript diseñado. Tome en cuenta que esto solo se puede explotar si la aplicación que usa Hermes permite una evaluación de JavaScript que no es confiable. Por lo tanto, la mayoría de las aplicaciones React Native no están afectadas",
      },
   ],
   id: "CVE-2020-1911",
   lastModified: "2024-11-21T05:11:35.797",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-09-04T03:15:09.700",
   references: [
      {
         source: "cve-assign@fb.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/facebook/hermes/commit/fe52854cdf6725c2eaa9e125995da76e6ceb27da",
      },
      {
         source: "cve-assign@fb.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2020-1911",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/facebook/hermes/commit/fe52854cdf6725c2eaa9e125995da76e6ceb27da",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2020-1911",
      },
   ],
   sourceIdentifier: "cve-assign@fb.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-843",
            },
         ],
         source: "cve-assign@fb.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-843",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-09-09 19:15
Modified
2024-11-21 05:11
Summary
An Integer signedness error in the JavaScript Interpreter in Facebook Hermes prior to commit 2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6 allows attackers to cause a denial of service attack or a potential RCE via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
facebook hermes *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:facebook:hermes:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3895EA2-1ACF-4DBB-AEE6-DE4EFF62F6D0",
                     versionEndIncluding: "0.4.3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An Integer signedness error in the JavaScript Interpreter in Facebook Hermes prior to commit 2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6 allows attackers to cause a denial of service attack or a potential RCE via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.",
      },
      {
         lang: "es",
         value: "Un error en la propiedad signedness de Enteros en el intérprete de JavaScript en Facebook Hermes anterior al commit 2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6, permite a atacantes causar un ataque de denegación de servicio o una potencial RCE por medio de un JavaScript diseñado. Tome en cuenta que esto solo es explotable si la aplicación que utiliza Hermes permite la evaluación del JavaScript que no es de confianza. Por lo tanto, la mayoría de las aplicaciones React Native no están afectadas.",
      },
   ],
   id: "CVE-2020-1913",
   lastModified: "2024-11-21T05:11:36.037",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.1,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.2,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-09-09T19:15:21.007",
   references: [
      {
         source: "cve-assign@fb.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/facebook/hermes/commit/2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6",
      },
      {
         source: "cve-assign@fb.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2020-1913",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/facebook/hermes/commit/2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2020-1913",
      },
   ],
   sourceIdentifier: "cve-assign@fb.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-195",
            },
         ],
         source: "cve-assign@fb.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-681",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-10-26 21:15
Modified
2024-11-21 05:11
Summary
An out-of-bounds read in the JavaScript Interpreter in Facebook Hermes prior to commit 8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0 allows attackers to cause a denial of service attack or possible further memory corruption via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
facebook hermes *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:facebook:hermes:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "77CAD963-CD06-4E04-89C0-86B1EEB63268",
                     versionEndExcluding: "2020-09-25",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An out-of-bounds read in the JavaScript Interpreter in Facebook Hermes prior to commit 8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0 allows attackers to cause a denial of service attack or possible further memory corruption via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.",
      },
      {
         lang: "es",
         value: "Una lectura fuera de límites en el intérprete de JavaScript en Facebook Hermes anterior al commit 8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0, permite a atacantes causar un ataque de denegación de servicio o una posible corrupción adicional de la memoria por medio de un JavaScript diseñado. Tome en cuenta que esto solo puede ser aprovechado si la aplicación que usa Hermes permite la evaluación de un JavaScript que no es confiable. Por consiguiente, la mayoría de las aplicaciones React Native no están afectadas",
      },
   ],
   id: "CVE-2020-1915",
   lastModified: "2024-11-21T05:11:36.263",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-10-26T21:15:12.193",
   references: [
      {
         source: "cve-assign@fb.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/facebook/hermes/commit/8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0",
      },
      {
         source: "cve-assign@fb.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2020-1915",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/facebook/hermes/commit/8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2020-1915",
      },
   ],
   sourceIdentifier: "cve-assign@fb.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "cve-assign@fb.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-05-18 22:15
Modified
2025-01-21 21:15
Summary
A null pointer dereference bug in Hermes prior to commit 5cae9f72975cf0e5a62b27fdd8b01f103e198708 could have been used by an attacker to crash an Hermes runtime where the EnableHermesInternal config option was set to true. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
facebook hermes *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:facebook:hermes:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9CFBF04-A11B-41F8-90FC-A22210504373",
                     versionEndExcluding: "2023-01-31",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A null pointer dereference bug in Hermes prior to commit 5cae9f72975cf0e5a62b27fdd8b01f103e198708 could have been used by an attacker to crash an Hermes runtime where the EnableHermesInternal config option was set to true. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.",
      },
   ],
   id: "CVE-2023-24832",
   lastModified: "2025-01-21T21:15:09.160",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-05-18T22:15:09.650",
   references: [
      {
         source: "cve-assign@fb.com",
         tags: [
            "Patch",
         ],
         url: "https://github.com/facebook/hermes/commit/5cae9f72975cf0e5a62b27fdd8b01f103e198708",
      },
      {
         source: "cve-assign@fb.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2023-24832",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://github.com/facebook/hermes/commit/5cae9f72975cf0e5a62b27fdd8b01f103e198708",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2023-24832",
      },
   ],
   sourceIdentifier: "cve-assign@fb.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-10-06 20:15
Modified
2024-11-21 06:56
Summary
It was possible to trigger an infinite recursion condition in the error handler when Hermes executed specific maliciously formed JavaScript. This condition was only possible to trigger in dev-mode (when asserts were enabled). This issue affects Hermes versions prior to v0.12.0.
Impacted products
Vendor Product Version
facebook hermes *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:facebook:hermes:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD57D241-3E0D-490F-B160-C3E8FDD0BCBE",
                     versionEndExcluding: "0.12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "It was possible to trigger an infinite recursion condition in the error handler when Hermes executed specific maliciously formed JavaScript. This condition was only possible to trigger in dev-mode (when asserts were enabled). This issue affects Hermes versions prior to v0.12.0.",
      },
      {
         lang: "es",
         value: "Era posible desencadenar una condición de recursión infinita en el administrador de errores cuando Hermes ejecutaba un JavaScript específico formado de forma maliciosa. Esta condición sólo era posible en el modo de desarrollo (cuando las afirmaciones estaban habilitadas). Este problema afecta a Hermes versiones anteriores a v0.12.0",
      },
   ],
   id: "CVE-2022-27810",
   lastModified: "2024-11-21T06:56:14.037",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-10-06T20:15:17.340",
   references: [
      {
         source: "cve-assign@fb.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2022-27810",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2022-27810",
      },
   ],
   sourceIdentifier: "cve-assign@fb.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-674",
            },
         ],
         source: "cve-assign@fb.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-674",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-05-18 22:15
Modified
2025-01-21 21:15
Summary
A type confusion bug in TypedArray prior to commit e6ed9c1a4b02dc219de1648f44cd808a56171b81 could have been used by a malicious attacker to execute arbitrary code via untrusted JavaScript. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
facebook hermes -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:facebook:hermes:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA8E037E-6A33-4EA0-A5C1-55F29A30F900",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A type confusion bug in TypedArray prior to commit e6ed9c1a4b02dc219de1648f44cd808a56171b81 could have been used by a malicious attacker to execute arbitrary code via untrusted JavaScript. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.",
      },
   ],
   id: "CVE-2023-25933",
   lastModified: "2025-01-21T21:15:09.530",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-05-18T22:15:09.750",
   references: [
      {
         source: "cve-assign@fb.com",
         tags: [
            "Patch",
         ],
         url: "https://github.com/facebook/hermes/commit/e6ed9c1a4b02dc219de1648f44cd808a56171b81",
      },
      {
         source: "cve-assign@fb.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2023-25933",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://github.com/facebook/hermes/commit/e6ed9c1a4b02dc219de1648f44cd808a56171b81",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2023-25933",
      },
   ],
   sourceIdentifier: "cve-assign@fb.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-843",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-843",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-05-18 22:15
Modified
2025-01-21 20:15
Summary
A use-after-free related to unsound inference in the bytecode generation when optimizations are enabled for Hermes prior to commit da8990f737ebb9d9810633502f65ed462b819c09 could have been used by an attacker to achieve remote code execution. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
facebook hermes -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:facebook:hermes:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA8E037E-6A33-4EA0-A5C1-55F29A30F900",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A use-after-free related to unsound inference in the bytecode generation when optimizations are enabled for Hermes prior to commit da8990f737ebb9d9810633502f65ed462b819c09 could have been used by an attacker to achieve remote code execution. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.",
      },
   ],
   id: "CVE-2023-30470",
   lastModified: "2025-01-21T20:15:29.637",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-05-18T22:15:09.930",
   references: [
      {
         source: "cve-assign@fb.com",
         tags: [
            "Patch",
         ],
         url: "https://github.com/facebook/hermes/commit/da8990f737ebb9d9810633502f65ed462b819c09",
      },
      {
         source: "cve-assign@fb.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2023-30470",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://github.com/facebook/hermes/commit/da8990f737ebb9d9810633502f65ed462b819c09",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2023-30470",
      },
   ],
   sourceIdentifier: "cve-assign@fb.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-05-18 22:15
Modified
2025-01-21 21:15
Summary
A use-after-free in BigIntPrimitive addition in Hermes prior to commit a6dcafe6ded8e61658b40f5699878cd19a481f80 could have been used by an attacker to leak raw data from Hermes VM’s heap. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
facebook hermes *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:facebook:hermes:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0B18E12-1694-49FF-881C-4BC5A8C847D7",
                     versionEndExcluding: "2023-02-02",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A use-after-free in BigIntPrimitive addition in Hermes prior to commit a6dcafe6ded8e61658b40f5699878cd19a481f80 could have been used by an attacker to leak raw data from Hermes VM’s heap. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.",
      },
   ],
   id: "CVE-2023-24833",
   lastModified: "2025-01-21T21:15:09.350",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-05-18T22:15:09.700",
   references: [
      {
         source: "cve-assign@fb.com",
         tags: [
            "Patch",
         ],
         url: "https://github.com/facebook/hermes/commit/a6dcafe6ded8e61658b40f5699878cd19a481f80",
      },
      {
         source: "cve-assign@fb.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2023-24833",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://github.com/facebook/hermes/commit/a6dcafe6ded8e61658b40f5699878cd19a481f80",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2023-24833",
      },
   ],
   sourceIdentifier: "cve-assign@fb.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-12-13 21:15
Modified
2024-11-21 05:52
Severity ?
Summary
A type confusion vulnerability could be triggered when resolving the "typeof" unary operator in Facebook Hermes prior to v0.10.0. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
facebook hermes *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:facebook:hermes:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A6510A9-5178-4595-8EF6-622998CDB1F3",
                     versionEndExcluding: "0.10.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A type confusion vulnerability could be triggered when resolving the \"typeof\" unary operator in Facebook Hermes prior to v0.10.0. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de confusión de tipo podría ser desencadenada al resolver el operador unario \"typeof\" en Facebook Hermes versiones anteriores a v0.10.0. Tenga en cuenta que esto sólo es explotable si la aplicación que usa Hermes permite una evaluación de JavaScript no confiable. Por lo tanto, la mayoría de las aplicaciones React Native no están afectadas",
      },
   ],
   id: "CVE-2021-24045",
   lastModified: "2024-11-21T05:52:16.420",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-12-13T21:15:08.923",
   references: [
      {
         source: "cve-assign@fb.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/facebook/hermes/commit/55e1b2343f4deb1a1b5726cfe1e23b2068217ff2",
      },
      {
         source: "cve-assign@fb.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2021-24045",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/facebook/hermes/commit/55e1b2343f4deb1a1b5726cfe1e23b2068217ff2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2021-24045",
      },
   ],
   sourceIdentifier: "cve-assign@fb.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-843",
            },
         ],
         source: "cve-assign@fb.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-843",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-05-18 22:15
Modified
2025-01-21 22:15
Summary
An error in Hermes' algorithm for copying objects properties prior to commit a00d237346894c6067a594983be6634f4168c9ad could be used by a malicious attacker to execute arbitrary code via type confusion. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
facebook hermes *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:facebook:hermes:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3F86788-10E5-4DD4-99DA-865FDD9C7FD8",
                     versionEndExcluding: "2023-01-10",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An error in Hermes' algorithm for copying objects properties prior to commit a00d237346894c6067a594983be6634f4168c9ad could be used by a malicious attacker to execute arbitrary code via type confusion. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.",
      },
   ],
   id: "CVE-2023-23557",
   lastModified: "2025-01-21T22:15:09.520",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-05-18T22:15:09.540",
   references: [
      {
         source: "cve-assign@fb.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://github.com/facebook/hermes/commit/a00d237346894c6067a594983be6634f4168c9ad",
      },
      {
         source: "cve-assign@fb.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2023-23557",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://github.com/facebook/hermes/commit/a00d237346894c6067a594983be6634f4168c9ad",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.facebook.com/security/advisories/cve-2023-23557",
      },
   ],
   sourceIdentifier: "cve-assign@fb.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-843",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-843",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

cve-2023-25933
Vulnerability from cvelistv5
Published
2023-05-18 21:24
Modified
2025-01-21 20:20
Severity ?
Summary
A type confusion bug in TypedArray prior to commit e6ed9c1a4b02dc219de1648f44cd808a56171b81 could have been used by a malicious attacker to execute arbitrary code via untrusted JavaScript. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
Facebook Hermes Version: 0   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T11:39:05.316Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.facebook.com/security/advisories/cve-2023-25933",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/facebook/hermes/commit/e6ed9c1a4b02dc219de1648f44cd808a56171b81",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 9.8,
                     baseSeverity: "CRITICAL",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-25933",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-21T20:19:56.002268Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-843",
                        description: "CWE-843 Access of Resource Using Incompatible Type ('Type Confusion')",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-21T20:20:00.366Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Hermes",
               vendor: "Facebook",
               versions: [
                  {
                     lessThan: "e6ed9c1a4b02dc219de1648f44cd808a56171b81",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         dateAssigned: "2023-02-16T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A type confusion bug in TypedArray prior to commit e6ed9c1a4b02dc219de1648f44cd808a56171b81 could have been used by a malicious attacker to execute arbitrary code via untrusted JavaScript. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')",
                     lang: "en",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-05-18T21:24:58.365Z",
            orgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
            shortName: "facebook",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.facebook.com/security/advisories/cve-2023-25933",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/facebook/hermes/commit/e6ed9c1a4b02dc219de1648f44cd808a56171b81",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
      assignerShortName: "facebook",
      cveId: "CVE-2023-25933",
      datePublished: "2023-05-18T21:24:58.365Z",
      dateReserved: "2023-02-16T19:48:39.503Z",
      dateUpdated: "2025-01-21T20:20:00.366Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-40138
Vulnerability from cvelistv5
Published
2022-10-11 00:00
Modified
2024-08-03 12:14
Severity ?
Summary
An integer conversion error in Hermes bytecode generation, prior to commit 6aa825e480d48127b480b08d13adf70033237097, could have been used to perform Out-Of-Bounds operations and subsequently execute arbitrary code. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
Facebook Hermes Version: unspecified   < commit prior to 6aa825e480d48127b480b08d13adf70033237097
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T12:14:39.797Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/facebook/hermes/commit/6aa825e480d48127b480b08d13adf70033237097",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.facebook.com/security/advisories/CVE-2022-40138",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Hermes",
               vendor: "Facebook",
               versions: [
                  {
                     lessThan: "commit prior to 6aa825e480d48127b480b08d13adf70033237097",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         dateAssigned: "2022-09-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An integer conversion error in Hermes bytecode generation, prior to commit 6aa825e480d48127b480b08d13adf70033237097, could have been used to perform Out-Of-Bounds operations and subsequently execute arbitrary code. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-681",
                     description: "CWE-681: Incorrect Conversion between Numeric Types",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-10-11T00:00:00",
            orgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
            shortName: "facebook",
         },
         references: [
            {
               url: "https://github.com/facebook/hermes/commit/6aa825e480d48127b480b08d13adf70033237097",
            },
            {
               url: "https://www.facebook.com/security/advisories/CVE-2022-40138",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
      assignerShortName: "facebook",
      cveId: "CVE-2022-40138",
      datePublished: "2022-10-11T00:00:00",
      dateReserved: "2022-09-06T00:00:00",
      dateUpdated: "2024-08-03T12:14:39.797Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-24832
Vulnerability from cvelistv5
Published
2023-05-18 21:24
Modified
2025-01-21 20:23
Summary
A null pointer dereference bug in Hermes prior to commit 5cae9f72975cf0e5a62b27fdd8b01f103e198708 could have been used by an attacker to crash an Hermes runtime where the EnableHermesInternal config option was set to true. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T11:03:19.354Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.facebook.com/security/advisories/cve-2023-24832",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/facebook/hermes/commit/5cae9f72975cf0e5a62b27fdd8b01f103e198708",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 7.5,
                     baseSeverity: "HIGH",
                     confidentialityImpact: "NONE",
                     integrityImpact: "NONE",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-24832",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-21T20:23:31.123449Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-21T20:23:54.785Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Hermes",
               vendor: "Facebook",
               versions: [
                  {
                     lessThan: "5cae9f72975cf0e5a62b27fdd8b01f103e198708",
                     status: "affected",
                     version: "0",
                     versionType: "git",
                  },
               ],
            },
         ],
         dateAssigned: "2023-01-30T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A null pointer dereference bug in Hermes prior to commit 5cae9f72975cf0e5a62b27fdd8b01f103e198708 could have been used by an attacker to crash an Hermes runtime where the EnableHermesInternal config option was set to true. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "CWE-476: NULL Pointer Dereference",
                     lang: "en",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-05-18T21:24:01.747Z",
            orgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
            shortName: "facebook",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.facebook.com/security/advisories/cve-2023-24832",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/facebook/hermes/commit/5cae9f72975cf0e5a62b27fdd8b01f103e198708",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
      assignerShortName: "facebook",
      cveId: "CVE-2023-24832",
      datePublished: "2023-05-18T21:24:01.747Z",
      dateReserved: "2023-01-30T21:12:47.476Z",
      dateUpdated: "2025-01-21T20:23:54.785Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-23556
Vulnerability from cvelistv5
Published
2023-05-18 21:16
Modified
2025-01-31 13:49
Severity ?
Summary
An error in BigInt conversion to Number in Hermes prior to commit a6dcafe6ded8e61658b40f5699878cd19a481f80 could have been used by a malicious attacker to execute arbitrary code due to an out-of-bound write. Note that this bug is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T10:35:32.836Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.facebook.com/security/advisories/cve-2023-23556",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/facebook/hermes/commit/a6dcafe6ded8e61658b40f5699878cd19a481f80",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 9.8,
                     baseSeverity: "CRITICAL",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-23556",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-21T20:07:03.536721Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-31T13:49:25.972Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Hermes",
               vendor: "Facebook",
               versions: [
                  {
                     lessThan: "a6dcafe6ded8e61658b40f5699878cd19a481f80",
                     status: "affected",
                     version: "0",
                     versionType: "git",
                  },
               ],
            },
         ],
         dateAssigned: "2023-01-12T00:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "An error in BigInt conversion to Number in Hermes prior to commit a6dcafe6ded8e61658b40f5699878cd19a481f80 could have been used by a malicious attacker to execute arbitrary code due to an out-of-bound write. Note that this bug is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "CWE-787: Out-of-bounds Write",
                     lang: "en",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-05-18T21:19:26.192Z",
            orgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
            shortName: "facebook",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.facebook.com/security/advisories/cve-2023-23556",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/facebook/hermes/commit/a6dcafe6ded8e61658b40f5699878cd19a481f80",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
      assignerShortName: "facebook",
      cveId: "CVE-2023-23556",
      datePublished: "2023-05-18T21:16:43.874Z",
      dateReserved: "2023-01-12T23:36:42.921Z",
      dateUpdated: "2025-01-31T13:49:25.972Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-24045
Vulnerability from cvelistv5
Published
2021-12-13 20:30
Modified
2024-08-03 19:21
Severity ?
Summary
A type confusion vulnerability could be triggered when resolving the "typeof" unary operator in Facebook Hermes prior to v0.10.0. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
Facebook Hermes Patch: 0.10.0
Version: unspecified   < 0.10.0
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T19:21:17.287Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.facebook.com/security/advisories/cve-2021-24045",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/facebook/hermes/commit/55e1b2343f4deb1a1b5726cfe1e23b2068217ff2",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Hermes",
               vendor: "Facebook",
               versions: [
                  {
                     lessThan: "unspecified",
                     status: "unaffected",
                     version: "0.10.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "0.10.0",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         dateAssigned: "2021-10-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A type confusion vulnerability could be triggered when resolving the \"typeof\" unary operator in Facebook Hermes prior to v0.10.0. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-843",
                     description: "CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-12-13T20:30:11",
            orgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
            shortName: "facebook",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.facebook.com/security/advisories/cve-2021-24045",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/facebook/hermes/commit/55e1b2343f4deb1a1b5726cfe1e23b2068217ff2",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve-assign@fb.com",
               DATE_ASSIGNED: "2021-10-13",
               ID: "CVE-2021-24045",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Hermes",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "!>=",
                                          version_value: "0.10.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "0.10.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Facebook",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A type confusion vulnerability could be triggered when resolving the \"typeof\" unary operator in Facebook Hermes prior to v0.10.0. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.facebook.com/security/advisories/cve-2021-24045",
                     refsource: "CONFIRM",
                     url: "https://www.facebook.com/security/advisories/cve-2021-24045",
                  },
                  {
                     name: "https://github.com/facebook/hermes/commit/55e1b2343f4deb1a1b5726cfe1e23b2068217ff2",
                     refsource: "MISC",
                     url: "https://github.com/facebook/hermes/commit/55e1b2343f4deb1a1b5726cfe1e23b2068217ff2",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
      assignerShortName: "facebook",
      cveId: "CVE-2021-24045",
      datePublished: "2021-12-13T20:30:11",
      dateReserved: "2021-01-13T00:00:00",
      dateUpdated: "2024-08-03T19:21:17.287Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-32234
Vulnerability from cvelistv5
Published
2022-10-11 00:00
Modified
2024-08-03 07:39
Severity ?
Summary
An out of bounds write in hermes, while handling large arrays, prior to commit 06eaec767e376bfdb883d912cb15e987ddf2bda1 allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
Facebook Hermes Version: unspecified   < prior to commit 06eaec767e376bfdb883d912cb15e987ddf2bda1
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T07:39:49.627Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/facebook/hermes/commit/06eaec767e376bfdb883d912cb15e987ddf2bda1",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.facebook.com/security/advisories/CVE-2022-32234",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Hermes",
               vendor: "Facebook",
               versions: [
                  {
                     lessThan: "prior to commit 06eaec767e376bfdb883d912cb15e987ddf2bda1",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         dateAssigned: "2022-06-02T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An out of bounds write in hermes, while handling large arrays, prior to commit 06eaec767e376bfdb883d912cb15e987ddf2bda1 allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-787",
                     description: "CWE-787: Out-of-Bounds Write",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-10-11T00:00:00",
            orgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
            shortName: "facebook",
         },
         references: [
            {
               url: "https://github.com/facebook/hermes/commit/06eaec767e376bfdb883d912cb15e987ddf2bda1",
            },
            {
               url: "https://www.facebook.com/security/advisories/CVE-2022-32234",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
      assignerShortName: "facebook",
      cveId: "CVE-2022-32234",
      datePublished: "2022-10-11T00:00:00",
      dateReserved: "2022-06-02T00:00:00",
      dateUpdated: "2024-08-03T07:39:49.627Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-1912
Vulnerability from cvelistv5
Published
2020-09-09 18:50
Modified
2024-08-04 06:54
Severity ?
Summary
An out-of-bounds read/write vulnerability when executing lazily compiled inner generator functions in Facebook Hermes prior to commit 091835377369c8fd5917d9b87acffa721ad2a168 allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
Facebook Hermes Version: commit prior to 091835377369c8fd5917d9b87acffa721ad2a168
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:54:00.338Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.facebook.com/security/advisories/cve-2020-1912",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/facebook/hermes/commit/091835377369c8fd5917d9b87acffa721ad2a168",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Hermes",
               vendor: "Facebook",
               versions: [
                  {
                     status: "affected",
                     version: "commit prior to 091835377369c8fd5917d9b87acffa721ad2a168",
                  },
               ],
            },
         ],
         dateAssigned: "2020-09-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An out-of-bounds read/write vulnerability when executing lazily compiled inner generator functions in Facebook Hermes prior to commit 091835377369c8fd5917d9b87acffa721ad2a168 allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-787",
                     description: "CWE-787: Out-of-bounds Write, CWE-125: Out-of-bounds Read",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-09-09T18:50:17",
            orgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
            shortName: "facebook",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.facebook.com/security/advisories/cve-2020-1912",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/facebook/hermes/commit/091835377369c8fd5917d9b87acffa721ad2a168",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve-assign@fb.com",
               DATE_ASSIGNED: "2020-09-09",
               ID: "CVE-2020-1912",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Hermes",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "commit prior to 091835377369c8fd5917d9b87acffa721ad2a168",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Facebook",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An out-of-bounds read/write vulnerability when executing lazily compiled inner generator functions in Facebook Hermes prior to commit 091835377369c8fd5917d9b87acffa721ad2a168 allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-787: Out-of-bounds Write, CWE-125: Out-of-bounds Read",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.facebook.com/security/advisories/cve-2020-1912",
                     refsource: "CONFIRM",
                     url: "https://www.facebook.com/security/advisories/cve-2020-1912",
                  },
                  {
                     name: "https://github.com/facebook/hermes/commit/091835377369c8fd5917d9b87acffa721ad2a168",
                     refsource: "CONFIRM",
                     url: "https://github.com/facebook/hermes/commit/091835377369c8fd5917d9b87acffa721ad2a168",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
      assignerShortName: "facebook",
      cveId: "CVE-2020-1912",
      datePublished: "2020-09-09T18:50:17",
      dateReserved: "2019-12-02T00:00:00",
      dateUpdated: "2024-08-04T06:54:00.338Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-1913
Vulnerability from cvelistv5
Published
2020-09-09 19:00
Modified
2024-08-04 06:53
Severity ?
Summary
An Integer signedness error in the JavaScript Interpreter in Facebook Hermes prior to commit 2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6 allows attackers to cause a denial of service attack or a potential RCE via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
Facebook Hermes Version: commit prior to 2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:53:59.912Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.facebook.com/security/advisories/cve-2020-1913",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/facebook/hermes/commit/2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Hermes",
               vendor: "Facebook",
               versions: [
                  {
                     status: "affected",
                     version: "commit prior to 2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6",
                  },
               ],
            },
         ],
         dateAssigned: "2020-09-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An Integer signedness error in the JavaScript Interpreter in Facebook Hermes prior to commit 2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6 allows attackers to cause a denial of service attack or a potential RCE via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-195",
                     description: "CWE-195: Signed to Unsigned Conversion Error",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-09-09T19:00:19",
            orgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
            shortName: "facebook",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.facebook.com/security/advisories/cve-2020-1913",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/facebook/hermes/commit/2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve-assign@fb.com",
               DATE_ASSIGNED: "2020-09-09",
               ID: "CVE-2020-1913",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Hermes",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "commit prior to 2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Facebook",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An Integer signedness error in the JavaScript Interpreter in Facebook Hermes prior to commit 2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6 allows attackers to cause a denial of service attack or a potential RCE via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-195: Signed to Unsigned Conversion Error",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.facebook.com/security/advisories/cve-2020-1913",
                     refsource: "CONFIRM",
                     url: "https://www.facebook.com/security/advisories/cve-2020-1913",
                  },
                  {
                     name: "https://github.com/facebook/hermes/commit/2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6",
                     refsource: "CONFIRM",
                     url: "https://github.com/facebook/hermes/commit/2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
      assignerShortName: "facebook",
      cveId: "CVE-2020-1913",
      datePublished: "2020-09-09T19:00:19",
      dateReserved: "2019-12-02T00:00:00",
      dateUpdated: "2024-08-04T06:53:59.912Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-28081
Vulnerability from cvelistv5
Published
2023-05-18 21:26
Modified
2025-01-21 20:16
Severity ?
Summary
A bytecode optimization bug in Hermes prior to commit e6ed9c1a4b02dc219de1648f44cd808a56171b81 could be used to cause an use-after-free and obtain arbitrary code execution via a carefully crafted payload. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T12:30:23.821Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.facebook.com/security/advisories/cve-2023-28081",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/facebook/hermes/commit/e6ed9c1a4b02dc219de1648f44cd808a56171b81",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 9.8,
                     baseSeverity: "CRITICAL",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-28081",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-21T20:15:58.665210Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-416",
                        description: "CWE-416 Use After Free",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-21T20:16:02.965Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Hermes",
               vendor: "Facebook",
               versions: [
                  {
                     lessThan: "e6ed9c1a4b02dc219de1648f44cd808a56171b81",
                     status: "affected",
                     version: "0",
                     versionType: "git",
                  },
               ],
            },
         ],
         dateAssigned: "2023-03-10T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A bytecode optimization bug in Hermes prior to commit e6ed9c1a4b02dc219de1648f44cd808a56171b81 could be used to cause an use-after-free and obtain arbitrary code execution via a carefully crafted payload. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "CWE-416: Use After Free",
                     lang: "en",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-05-18T21:26:49.822Z",
            orgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
            shortName: "facebook",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.facebook.com/security/advisories/cve-2023-28081",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/facebook/hermes/commit/e6ed9c1a4b02dc219de1648f44cd808a56171b81",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
      assignerShortName: "facebook",
      cveId: "CVE-2023-28081",
      datePublished: "2023-05-18T21:26:49.822Z",
      dateReserved: "2023-03-10T14:38:22.869Z",
      dateUpdated: "2025-01-21T20:16:02.965Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-24833
Vulnerability from cvelistv5
Published
2023-05-18 21:24
Modified
2025-01-21 20:21
Summary
A use-after-free in BigIntPrimitive addition in Hermes prior to commit a6dcafe6ded8e61658b40f5699878cd19a481f80 could have been used by an attacker to leak raw data from Hermes VM’s heap. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T11:03:19.301Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.facebook.com/security/advisories/cve-2023-24833",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/facebook/hermes/commit/a6dcafe6ded8e61658b40f5699878cd19a481f80",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "NONE",
                     baseScore: 7.5,
                     baseSeverity: "HIGH",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "NONE",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-24833",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-21T20:21:00.350735Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-21T20:21:32.835Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Hermes",
               vendor: "Facebook",
               versions: [
                  {
                     lessThan: "a6dcafe6ded8e61658b40f5699878cd19a481f80",
                     status: "affected",
                     version: "0",
                     versionType: "git",
                  },
               ],
            },
         ],
         dateAssigned: "2023-01-30T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A use-after-free in BigIntPrimitive addition in Hermes prior to commit a6dcafe6ded8e61658b40f5699878cd19a481f80 could have been used by an attacker to leak raw data from Hermes VM’s heap. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "CWE-125: Out-of-bounds Read",
                     lang: "en",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-05-18T21:24:11.057Z",
            orgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
            shortName: "facebook",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.facebook.com/security/advisories/cve-2023-24833",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/facebook/hermes/commit/a6dcafe6ded8e61658b40f5699878cd19a481f80",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
      assignerShortName: "facebook",
      cveId: "CVE-2023-24833",
      datePublished: "2023-05-18T21:24:11.057Z",
      dateReserved: "2023-01-30T21:50:00.539Z",
      dateUpdated: "2025-01-21T20:21:32.835Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-1896
Vulnerability from cvelistv5
Published
2021-02-02 06:50
Modified
2024-08-04 06:53
Severity ?
Summary
A stack overflow vulnerability in Facebook Hermes 'builtin apply' prior to commit 86543ac47e59c522976b5632b8bf9a2a4583c7d2 (https://github.com/facebook/hermes/commit/86543ac47e59c522976b5632b8bf9a2a4583c7d2) allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
Facebook Hermes Version: commit prior to 86543ac47e59c522976b5632b8bf9a2a4583c7d2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:53:59.880Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.facebook.com/security/advisories/cve-2020-1896",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/facebook/hermes/commit/86543ac47e59c522976b5632b8bf9a2a4583c7d2",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Hermes",
               vendor: "Facebook",
               versions: [
                  {
                     status: "affected",
                     version: "commit prior to 86543ac47e59c522976b5632b8bf9a2a4583c7d2",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A stack overflow vulnerability in Facebook Hermes 'builtin apply' prior to commit 86543ac47e59c522976b5632b8bf9a2a4583c7d2 (https://github.com/facebook/hermes/commit/86543ac47e59c522976b5632b8bf9a2a4583c7d2) allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-121",
                     description: "CWE-121: Stack-based Buffer Overflow",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-03-11T14:25:42",
            orgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
            shortName: "facebook",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.facebook.com/security/advisories/cve-2020-1896",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/facebook/hermes/commit/86543ac47e59c522976b5632b8bf9a2a4583c7d2",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve-assign@fb.com",
               DATE_ASSIGNEDE: "2021-02-01",
               ID: "CVE-2020-1896",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Hermes",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "commit prior to 86543ac47e59c522976b5632b8bf9a2a4583c7d2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Facebook",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A stack overflow vulnerability in Facebook Hermes 'builtin apply' prior to commit 86543ac47e59c522976b5632b8bf9a2a4583c7d2 (https://github.com/facebook/hermes/commit/86543ac47e59c522976b5632b8bf9a2a4583c7d2) allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-121: Stack-based Buffer Overflow",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.facebook.com/security/advisories/cve-2020-1896",
                     refsource: "CONFIRM",
                     url: "https://www.facebook.com/security/advisories/cve-2020-1896",
                  },
                  {
                     name: "https://github.com/facebook/hermes/commit/86543ac47e59c522976b5632b8bf9a2a4583c7d2",
                     refsource: "CONFIRM",
                     url: "https://github.com/facebook/hermes/commit/86543ac47e59c522976b5632b8bf9a2a4583c7d2",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
      assignerShortName: "facebook",
      cveId: "CVE-2020-1896",
      datePublished: "2021-02-02T06:50:11",
      dateReserved: "2019-12-02T00:00:00",
      dateUpdated: "2024-08-04T06:53:59.880Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-1915
Vulnerability from cvelistv5
Published
2020-10-26 20:20
Modified
2024-08-04 06:53
Severity ?
Summary
An out-of-bounds read in the JavaScript Interpreter in Facebook Hermes prior to commit 8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0 allows attackers to cause a denial of service attack or possible further memory corruption via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
Facebook Hermes Version: commit prior to 8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:53:59.849Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.facebook.com/security/advisories/cve-2020-1915",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/facebook/hermes/commit/8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Hermes",
               vendor: "Facebook",
               versions: [
                  {
                     status: "affected",
                     version: "commit prior to 8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0",
                  },
               ],
            },
         ],
         dateAssigned: "2020-10-26T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An out-of-bounds read in the JavaScript Interpreter in Facebook Hermes prior to commit 8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0 allows attackers to cause a denial of service attack or possible further memory corruption via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-125",
                     description: "CWE-125: Out-of-bounds Read",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-10-26T20:20:13",
            orgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
            shortName: "facebook",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.facebook.com/security/advisories/cve-2020-1915",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/facebook/hermes/commit/8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve-assign@fb.com",
               DATE_ASSIGNED: "2020-10-26",
               ID: "CVE-2020-1915",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Hermes",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "commit prior to 8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Facebook",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An out-of-bounds read in the JavaScript Interpreter in Facebook Hermes prior to commit 8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0 allows attackers to cause a denial of service attack or possible further memory corruption via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-125: Out-of-bounds Read",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.facebook.com/security/advisories/cve-2020-1915",
                     refsource: "CONFIRM",
                     url: "https://www.facebook.com/security/advisories/cve-2020-1915",
                  },
                  {
                     name: "https://github.com/facebook/hermes/commit/8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0",
                     refsource: "CONFIRM",
                     url: "https://github.com/facebook/hermes/commit/8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
      assignerShortName: "facebook",
      cveId: "CVE-2020-1915",
      datePublished: "2020-10-26T20:20:13",
      dateReserved: "2019-12-02T00:00:00",
      dateUpdated: "2024-08-04T06:53:59.849Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-24037
Vulnerability from cvelistv5
Published
2021-06-15 22:00
Modified
2024-08-03 19:21
Severity ?
Summary
A use after free in hermes, while emitting certain error messages, prior to commit d86e185e485b6330216dee8e854455c694e3a36e allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
Facebook Hermes Version: commit prior to d86e185e485b6330216dee8e854455c694e3a36e
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T19:21:17.277Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/facebook/hermes/commit/d86e185e485b6330216dee8e854455c694e3a36e",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.facebook.com/security/advisories/CVE-2021-24037",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Hermes",
               vendor: "Facebook",
               versions: [
                  {
                     status: "affected",
                     version: "commit prior to d86e185e485b6330216dee8e854455c694e3a36e",
                  },
               ],
            },
         ],
         dateAssigned: "2021-06-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A use after free in hermes, while emitting certain error messages, prior to commit d86e185e485b6330216dee8e854455c694e3a36e allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-416",
                     description: "CWE-416: Use After Free",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-06-15T22:00:11",
            orgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
            shortName: "facebook",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/facebook/hermes/commit/d86e185e485b6330216dee8e854455c694e3a36e",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.facebook.com/security/advisories/CVE-2021-24037",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve-assign@fb.com",
               DATE_ASSIGNED: "2021-06-15",
               ID: "CVE-2021-24037",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Hermes",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "commit prior to d86e185e485b6330216dee8e854455c694e3a36e",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Facebook",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A use after free in hermes, while emitting certain error messages, prior to commit d86e185e485b6330216dee8e854455c694e3a36e allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-416: Use After Free",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://github.com/facebook/hermes/commit/d86e185e485b6330216dee8e854455c694e3a36e",
                     refsource: "CONFIRM",
                     url: "https://github.com/facebook/hermes/commit/d86e185e485b6330216dee8e854455c694e3a36e",
                  },
                  {
                     name: "https://www.facebook.com/security/advisories/CVE-2021-24037",
                     refsource: "CONFIRM",
                     url: "https://www.facebook.com/security/advisories/CVE-2021-24037",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
      assignerShortName: "facebook",
      cveId: "CVE-2021-24037",
      datePublished: "2021-06-15T22:00:11",
      dateReserved: "2021-01-13T00:00:00",
      dateUpdated: "2024-08-03T19:21:17.277Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-1914
Vulnerability from cvelistv5
Published
2020-10-08 18:50
Modified
2024-08-04 06:53
Severity ?
Summary
A logic vulnerability when handling the SaveGeneratorLong instruction in Facebook Hermes prior to commit b2021df620824627f5a8c96615edbd1eb7fdddfc allows attackers to potentially read out of bounds or theoretically execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
Facebook Hermes Version: commit prior to b2021df620824627f5a8c96615edbd1eb7fdddfc
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:53:59.745Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.facebook.com/security/advisories/cve-2020-1914",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/facebook/hermes/commit/b2021df620824627f5a8c96615edbd1eb7fdddfc",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Hermes",
               vendor: "Facebook",
               versions: [
                  {
                     status: "affected",
                     version: "commit prior to b2021df620824627f5a8c96615edbd1eb7fdddfc",
                  },
               ],
            },
         ],
         dateAssigned: "2020-10-08T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A logic vulnerability when handling the SaveGeneratorLong instruction in Facebook Hermes prior to commit b2021df620824627f5a8c96615edbd1eb7fdddfc allows attackers to potentially read out of bounds or theoretically execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-670",
                     description: "CWE-670: Always-Incorrect Control Flow Implementation, CWE-1119: Excessive Use of Unconditional Branching",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-10-08T18:50:11",
            orgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
            shortName: "facebook",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.facebook.com/security/advisories/cve-2020-1914",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/facebook/hermes/commit/b2021df620824627f5a8c96615edbd1eb7fdddfc",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve-assign@fb.com",
               DATE_ASSIGNED: "2020-10-08",
               ID: "CVE-2020-1914",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Hermes",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "commit prior to b2021df620824627f5a8c96615edbd1eb7fdddfc",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Facebook",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A logic vulnerability when handling the SaveGeneratorLong instruction in Facebook Hermes prior to commit b2021df620824627f5a8c96615edbd1eb7fdddfc allows attackers to potentially read out of bounds or theoretically execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-670: Always-Incorrect Control Flow Implementation, CWE-1119: Excessive Use of Unconditional Branching",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.facebook.com/security/advisories/cve-2020-1914",
                     refsource: "CONFIRM",
                     url: "https://www.facebook.com/security/advisories/cve-2020-1914",
                  },
                  {
                     name: "https://github.com/facebook/hermes/commit/b2021df620824627f5a8c96615edbd1eb7fdddfc",
                     refsource: "CONFIRM",
                     url: "https://github.com/facebook/hermes/commit/b2021df620824627f5a8c96615edbd1eb7fdddfc",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
      assignerShortName: "facebook",
      cveId: "CVE-2020-1914",
      datePublished: "2020-10-08T18:50:11",
      dateReserved: "2019-12-02T00:00:00",
      dateUpdated: "2024-08-04T06:53:59.745Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-30470
Vulnerability from cvelistv5
Published
2023-05-18 21:27
Modified
2025-01-21 20:09
Severity ?
Summary
A use-after-free related to unsound inference in the bytecode generation when optimizations are enabled for Hermes prior to commit da8990f737ebb9d9810633502f65ed462b819c09 could have been used by an attacker to achieve remote code execution. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T14:28:50.599Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.facebook.com/security/advisories/cve-2023-30470",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/facebook/hermes/commit/da8990f737ebb9d9810633502f65ed462b819c09",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 9.8,
                     baseSeverity: "CRITICAL",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-30470",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-21T20:09:15.278686Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-416",
                        description: "CWE-416 Use After Free",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-21T20:09:25.765Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Hermes",
               vendor: "Facebook",
               versions: [
                  {
                     lessThan: "da8990f737ebb9d9810633502f65ed462b819c09",
                     status: "affected",
                     version: "0",
                     versionType: "git",
                  },
               ],
            },
         ],
         dateAssigned: "2023-04-11T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A use-after-free related to unsound inference in the bytecode generation when optimizations are enabled for Hermes prior to commit da8990f737ebb9d9810633502f65ed462b819c09 could have been used by an attacker to achieve remote code execution. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "CWE-416: Use After Free",
                     lang: "en",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-05-18T21:27:57.350Z",
            orgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
            shortName: "facebook",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.facebook.com/security/advisories/cve-2023-30470",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/facebook/hermes/commit/da8990f737ebb9d9810633502f65ed462b819c09",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
      assignerShortName: "facebook",
      cveId: "CVE-2023-30470",
      datePublished: "2023-05-18T21:27:57.350Z",
      dateReserved: "2023-04-11T11:31:19.815Z",
      dateUpdated: "2025-01-21T20:09:25.765Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-24044
Vulnerability from cvelistv5
Published
2022-01-15 00:35
Modified
2024-08-03 19:21
Severity ?
Summary
By passing invalid javascript code where await and yield were called upon non-async and non-generator getter/setter functions, Hermes would invoke generator functions and error out on invalid await/yield positions. This could result in segmentation fault as a consequence of type confusion error, with a low chance of RCE. This issue affects Hermes versions prior to v0.10.0.
References
Impacted products
Vendor Product Version
Facebook Hermes Patch: 0.10.0
Version: unspecified   < 0.10.0
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T19:21:17.267Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.facebook.com/security/advisories/cve-2021-24044",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Hermes",
               vendor: "Facebook",
               versions: [
                  {
                     lessThan: "unspecified",
                     status: "unaffected",
                     version: "0.10.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "0.10.0",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         dateAssigned: "2021-12-07T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "By passing invalid javascript code where await and yield were called upon non-async and non-generator getter/setter functions, Hermes would invoke generator functions and error out on invalid await/yield positions. This could result in segmentation fault as a consequence of type confusion error, with a low chance of RCE. This issue affects Hermes versions prior to v0.10.0.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-843",
                     description: "CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-01-15T00:35:08",
            orgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
            shortName: "facebook",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.facebook.com/security/advisories/cve-2021-24044",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve-assign@fb.com",
               DATE_ASSIGNED: "2021-12-07",
               ID: "CVE-2021-24044",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Hermes",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "!>=",
                                          version_value: "0.10.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "0.10.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Facebook",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "By passing invalid javascript code where await and yield were called upon non-async and non-generator getter/setter functions, Hermes would invoke generator functions and error out on invalid await/yield positions. This could result in segmentation fault as a consequence of type confusion error, with a low chance of RCE. This issue affects Hermes versions prior to v0.10.0.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.facebook.com/security/advisories/cve-2021-24044",
                     refsource: "CONFIRM",
                     url: "https://www.facebook.com/security/advisories/cve-2021-24044",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
      assignerShortName: "facebook",
      cveId: "CVE-2021-24044",
      datePublished: "2022-01-15T00:35:08",
      dateReserved: "2021-01-13T00:00:00",
      dateUpdated: "2024-08-03T19:21:17.267Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-27810
Vulnerability from cvelistv5
Published
2022-10-06 00:00
Modified
2024-08-03 05:32
Severity ?
Summary
It was possible to trigger an infinite recursion condition in the error handler when Hermes executed specific maliciously formed JavaScript. This condition was only possible to trigger in dev-mode (when asserts were enabled). This issue affects Hermes versions prior to v0.12.0.
Impacted products
Vendor Product Version
Facebook Hermes Patch: 0.12.0
Version: unspecified   < 0.12.0
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T05:32:59.901Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.facebook.com/security/advisories/cve-2022-27810",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Hermes",
               vendor: "Facebook",
               versions: [
                  {
                     lessThan: "unspecified",
                     status: "unaffected",
                     version: "0.12.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "0.12.0",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         dateAssigned: "2022-04-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "It was possible to trigger an infinite recursion condition in the error handler when Hermes executed specific maliciously formed JavaScript. This condition was only possible to trigger in dev-mode (when asserts were enabled). This issue affects Hermes versions prior to v0.12.0.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-674",
                     description: "CWE-674: Uncontrolled Recursion",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-10-11T00:00:00",
            orgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
            shortName: "facebook",
         },
         references: [
            {
               url: "https://www.facebook.com/security/advisories/cve-2022-27810",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
      assignerShortName: "facebook",
      cveId: "CVE-2022-27810",
      datePublished: "2022-10-06T00:00:00",
      dateReserved: "2022-03-23T00:00:00",
      dateUpdated: "2024-08-03T05:32:59.901Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-1911
Vulnerability from cvelistv5
Published
2020-09-04 02:35
Modified
2024-08-04 06:53
Severity ?
Summary
A type confusion vulnerability when resolving properties of JavaScript objects with specially-crafted prototype chains in Facebook Hermes prior to commit fe52854cdf6725c2eaa9e125995da76e6ceb27da allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
Facebook Hermes Version: commit prior to fe52854cdf6725c2eaa9e125995da76e6ceb27da
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:53:59.783Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.facebook.com/security/advisories/cve-2020-1911",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/facebook/hermes/commit/fe52854cdf6725c2eaa9e125995da76e6ceb27da",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Hermes",
               vendor: "Facebook",
               versions: [
                  {
                     status: "affected",
                     version: "commit prior to fe52854cdf6725c2eaa9e125995da76e6ceb27da",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A type confusion vulnerability when resolving properties of JavaScript objects with specially-crafted prototype chains in Facebook Hermes prior to commit fe52854cdf6725c2eaa9e125995da76e6ceb27da allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-843",
                     description: "CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-09-04T02:35:19",
            orgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
            shortName: "facebook",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.facebook.com/security/advisories/cve-2020-1911",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/facebook/hermes/commit/fe52854cdf6725c2eaa9e125995da76e6ceb27da",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve-assign@fb.com",
               DATA_ASSIGNED: "2020-09-03",
               ID: "CVE-2020-1911",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Hermes",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "commit prior to fe52854cdf6725c2eaa9e125995da76e6ceb27da",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Facebook",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A type confusion vulnerability when resolving properties of JavaScript objects with specially-crafted prototype chains in Facebook Hermes prior to commit fe52854cdf6725c2eaa9e125995da76e6ceb27da allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.facebook.com/security/advisories/cve-2020-1911",
                     refsource: "CONFIRM",
                     url: "https://www.facebook.com/security/advisories/cve-2020-1911",
                  },
                  {
                     name: "https://github.com/facebook/hermes/commit/fe52854cdf6725c2eaa9e125995da76e6ceb27da",
                     refsource: "CONFIRM",
                     url: "https://github.com/facebook/hermes/commit/fe52854cdf6725c2eaa9e125995da76e6ceb27da",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
      assignerShortName: "facebook",
      cveId: "CVE-2020-1911",
      datePublished: "2020-09-04T02:35:20",
      dateReserved: "2019-12-02T00:00:00",
      dateUpdated: "2024-08-04T06:53:59.783Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-23557
Vulnerability from cvelistv5
Published
2023-05-18 21:19
Modified
2025-01-21 21:20
Severity ?
Summary
An error in Hermes' algorithm for copying objects properties prior to commit a00d237346894c6067a594983be6634f4168c9ad could be used by a malicious attacker to execute arbitrary code via type confusion. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T10:35:33.573Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.facebook.com/security/advisories/cve-2023-23557",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/facebook/hermes/commit/a00d237346894c6067a594983be6634f4168c9ad",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 9.8,
                     baseSeverity: "CRITICAL",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-23557",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-21T21:19:48.256570Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-843",
                        description: "CWE-843 Access of Resource Using Incompatible Type ('Type Confusion')",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-21T21:20:13.134Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Hermes",
               vendor: "Facebook",
               versions: [
                  {
                     lessThan: "a00d237346894c6067a594983be6634f4168c9ad",
                     status: "affected",
                     version: "0",
                     versionType: "git",
                  },
               ],
            },
         ],
         dateAssigned: "2023-01-12T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An error in Hermes' algorithm for copying objects properties prior to commit a00d237346894c6067a594983be6634f4168c9ad could be used by a malicious attacker to execute arbitrary code via type confusion. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')",
                     lang: "en",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-05-18T21:19:41.668Z",
            orgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
            shortName: "facebook",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.facebook.com/security/advisories/cve-2023-23557",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/facebook/hermes/commit/a00d237346894c6067a594983be6634f4168c9ad",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
      assignerShortName: "facebook",
      cveId: "CVE-2023-23557",
      datePublished: "2023-05-18T21:19:41.668Z",
      dateReserved: "2023-01-12T23:36:42.921Z",
      dateUpdated: "2025-01-21T21:20:13.134Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-35289
Vulnerability from cvelistv5
Published
2022-10-11 00:00
Modified
2024-08-03 09:36
Severity ?
Summary
A write-what-where condition in hermes caused by an integer overflow, prior to commit 5b6255ae049fa4641791e47fad994e8e8c4da374 allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
Impacted products
Vendor Product Version
Facebook Hermes Version: unspecified   < prior to commit 5b6255ae049fa4641791e47fad994e8e8c4da374
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T09:36:43.334Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/facebook/hermes/commit/5b6255ae049fa4641791e47fad994e8e8c4da374",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.facebook.com/security/advisories/CVE-2022-35289",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Hermes",
               vendor: "Facebook",
               versions: [
                  {
                     lessThan: "prior to commit 5b6255ae049fa4641791e47fad994e8e8c4da374",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         dateAssigned: "2022-07-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A write-what-where condition in hermes caused by an integer overflow, prior to commit 5b6255ae049fa4641791e47fad994e8e8c4da374 allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-680",
                     description: "CWE-680: Integer Overflow to Buffer Overflow",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-10-11T00:00:00",
            orgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
            shortName: "facebook",
         },
         references: [
            {
               url: "https://github.com/facebook/hermes/commit/5b6255ae049fa4641791e47fad994e8e8c4da374",
            },
            {
               url: "https://www.facebook.com/security/advisories/CVE-2022-35289",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "4fc57720-52fe-4431-a0fb-3d2c8747b827",
      assignerShortName: "facebook",
      cveId: "CVE-2022-35289",
      datePublished: "2022-10-11T00:00:00",
      dateReserved: "2022-07-06T00:00:00",
      dateUpdated: "2024-08-03T09:36:43.334Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}