{"vulnerability": "CVE-2022-46393", "sightings": [{"uuid": "355b34e3-b911-415d-88a6-2741452d4e8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46393", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12680", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-46393\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.3.0. There is a potential heap-based buffer overflow and heap-based buffer over-read in DTLS if MBEDTLS_SSL_DTLS_CONNECTION_ID is enabled and MBEDTLS_SSL_CID_IN_LEN_MAX &gt; 2 * MBEDTLS_SSL_CID_OUT_LEN_MAX.\n\ud83d\udccf Published: 2022-12-15T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-21T14:31:49.155Z\n\ud83d\udd17 References:\n1. https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/\n2. https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.3.0\n3. https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2\n4. https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4BR7ZCVKLPGCOEEALUHZMFHXQHR6S4QL/\n5. https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XMKJ5IMJEPXYAHHU56Z4P2FSYIEAESB/", "creation_timestamp": "2025-04-21T15:03:05.000000Z"}]}