Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-30187 (GCVE-0-2022-30187)
Vulnerability from cvelistv5 – Published: 2022-07-12 22:37 – Updated: 2025-07-08 15:35- Information Disclosure
| URL | Tags |
|---|---|
| https://msrc.microsoft.com/update-guide/vulnerabi… | vendor-advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| Microsoft | Azure Storage Blobs client library for .NET |
Affected:
12.0.0 , < 12.13.0
(custom)
|
|
| Microsoft | Azure Storage Queues client library for .NET |
Affected:
12.0.0 , < 12.13.0
(custom)
|
|
| Microsoft | Azure Storage Blobs client library for Java |
Affected:
12.0.0 , < 12.18.0
(custom)
|
|
| Microsoft | Azure Storage Queues client library for Python |
Affected:
12.0.0 , < 12.4.0
(custom)
|
|
| Microsoft | Azure Storage Blobs client library for Python |
Affected:
12.0.0 , < 12.13.0
(custom)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T06:40:47.799Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "Azure Storage Library Information Disclosure Vulnerability",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30187"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-30187",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-11T16:01:30.313428Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-11T16:01:43.278Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"platforms": [
"Unknown"
],
"product": "Azure Storage Blobs client library for .NET",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "12.13.0",
"status": "affected",
"version": "12.0.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"Unknown"
],
"product": "Azure Storage Queues client library for .NET",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "12.13.0",
"status": "affected",
"version": "12.0.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"Unknown"
],
"product": "Azure Storage Blobs client library for Java",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "12.18.0",
"status": "affected",
"version": "12.0.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"Unknown"
],
"product": "Azure Storage Queues client library for Python",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "12.4.0",
"status": "affected",
"version": "12.0.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"Unknown"
],
"product": "Azure Storage Blobs client library for Python",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "12.13.0",
"status": "affected",
"version": "12.0.0",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:azure_storage_blobs:*:*:*:*:*:.net:*:*",
"versionEndExcluding": "12.13.0",
"versionStartIncluding": "12.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_storage_queue:*:*:*:*:*:.net:*:*",
"versionEndExcluding": "12.13.0",
"versionStartIncluding": "12.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_storage_blobs:*:*:*:*:*:java:*:*",
"versionEndExcluding": "12.18.0",
"versionStartIncluding": "12.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_storage_blobs:*:*:*:*:*:python:*:*",
"versionEndExcluding": "12.4.0",
"versionStartIncluding": "12.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_storage_blobs:*:*:*:*:*:python:*:*",
"versionEndExcluding": "12.13.0",
"versionStartIncluding": "12.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"datePublic": "2022-07-12T07:00:00.000Z",
"descriptions": [
{
"lang": "en-US",
"value": "Azure Storage Library Information Disclosure Vulnerability"
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en-US",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Information Disclosure",
"lang": "en-US",
"type": "Impact"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-08T15:35:58.676Z",
"orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"shortName": "microsoft"
},
"references": [
{
"name": "Azure Storage Library Information Disclosure Vulnerability",
"tags": [
"vendor-advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30187"
}
],
"title": "Azure Storage Library Information Disclosure Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"assignerShortName": "microsoft",
"cveId": "CVE-2022-30187",
"datePublished": "2022-07-12T22:37:25.000Z",
"dateReserved": "2022-05-03T00:00:00.000Z",
"dateUpdated": "2025-07-08T15:35:58.676Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2022-30187",
"date": "2026-05-19",
"epss": "0.00268",
"percentile": "0.50306"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:azure_storage_blobs:*:*:*:*:*:.net:*:*\", \"versionEndExcluding\": \"12.13.0\", \"matchCriteriaId\": \"76C885A0-06D7-4573-97BA-FBCA7653F008\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:azure_storage_blobs:*:*:*:*:*:python:*:*\", \"versionEndExcluding\": \"12.13.0\", \"matchCriteriaId\": \"2E1A488F-D561-4005-AFF8-468860F40816\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:azure_storage_blobs:*:*:*:*:*:java:*:*\", \"versionEndExcluding\": \"12.18.0\", \"matchCriteriaId\": \"153D4518-8E6D-48D0-9BC5-EB482EDBF07B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:azure_storage_queue:*:*:*:*:*:python:*:*\", \"versionEndExcluding\": \"12.4.0\", \"matchCriteriaId\": \"F765F0A9-3756-4C1E-85B0-1438474B4590\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:azure_storage_queue:*:*:*:*:*:.net:*:*\", \"versionEndExcluding\": \"12.11.0\", \"matchCriteriaId\": \"5444CD1F-54C8-4918-8842-5320DE43FDBC\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Azure Storage Library Information Disclosure Vulnerability\"}, {\"lang\": \"es\", \"value\": \"Una Vulnerabilidad de Divulgaci\\u00f3n de Informaci\\u00f3n de Azure Storage Library\"}]",
"id": "CVE-2022-30187",
"lastModified": "2024-11-21T07:02:19.837",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"secure@microsoft.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 4.7, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.0, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:M/Au:N/C:P/I:N/A:N\", \"baseScore\": 1.9, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 3.4, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2022-07-12T23:15:10.960",
"references": "[{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30187\", \"source\": \"secure@microsoft.com\"}, {\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30187\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-327\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-30187\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2022-07-12T23:15:10.960\",\"lastModified\":\"2024-11-21T07:02:19.837\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Azure Storage Library Information Disclosure Vulnerability\"},{\"lang\":\"es\",\"value\":\"Una Vulnerabilidad de Divulgaci\u00f3n de Informaci\u00f3n de Azure Storage Library\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":4.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.0,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":1.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.4,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-327\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:azure_storage_blobs:*:*:*:*:*:.net:*:*\",\"versionEndExcluding\":\"12.13.0\",\"matchCriteriaId\":\"76C885A0-06D7-4573-97BA-FBCA7653F008\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:azure_storage_blobs:*:*:*:*:*:python:*:*\",\"versionEndExcluding\":\"12.13.0\",\"matchCriteriaId\":\"2E1A488F-D561-4005-AFF8-468860F40816\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:azure_storage_blobs:*:*:*:*:*:java:*:*\",\"versionEndExcluding\":\"12.18.0\",\"matchCriteriaId\":\"153D4518-8E6D-48D0-9BC5-EB482EDBF07B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:azure_storage_queue:*:*:*:*:*:python:*:*\",\"versionEndExcluding\":\"12.4.0\",\"matchCriteriaId\":\"F765F0A9-3756-4C1E-85B0-1438474B4590\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:azure_storage_queue:*:*:*:*:*:.net:*:*\",\"versionEndExcluding\":\"12.11.0\",\"matchCriteriaId\":\"5444CD1F-54C8-4918-8842-5320DE43FDBC\"}]}]}],\"references\":[{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30187\",\"source\":\"secure@microsoft.com\"},{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30187\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30187\", \"name\": \"Azure Storage Library Information Disclosure Vulnerability\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T06:40:47.799Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-30187\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-11T16:01:30.313428Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T16:01:38.797Z\"}}], \"cna\": {\"title\": \"Azure Storage Library Information Disclosure Vulnerability\", \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 4.7, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C\"}, \"scenarios\": [{\"lang\": \"en-US\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Microsoft\", \"product\": \"Azure Storage Blobs client library for .NET\", \"versions\": [{\"status\": \"affected\", \"version\": \"12.0.0\", \"lessThan\": \"12.13.0\", \"versionType\": \"custom\"}], \"platforms\": [\"Unknown\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Azure Storage Queues client library for .NET\", \"versions\": [{\"status\": \"affected\", \"version\": \"12.0.0\", \"lessThan\": \"12.13.0\", \"versionType\": \"custom\"}], \"platforms\": [\"Unknown\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Azure Storage Blobs client library for Java\", \"versions\": [{\"status\": \"affected\", \"version\": \"12.0.0\", \"lessThan\": \"12.18.0\", \"versionType\": \"custom\"}], \"platforms\": [\"Unknown\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Azure Storage Queues client library for Python\", \"versions\": [{\"status\": \"affected\", \"version\": \"12.0.0\", \"lessThan\": \"12.4.0\", \"versionType\": \"custom\"}], \"platforms\": [\"Unknown\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Azure Storage Blobs client library for Python\", \"versions\": [{\"status\": \"affected\", \"version\": \"12.0.0\", \"lessThan\": \"12.13.0\", \"versionType\": \"custom\"}], \"platforms\": [\"Unknown\"]}], \"datePublic\": \"2022-07-12T07:00:00.000Z\", \"references\": [{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30187\", \"name\": \"Azure Storage Library Information Disclosure Vulnerability\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en-US\", \"value\": \"Azure Storage Library Information Disclosure Vulnerability\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en-US\", \"type\": \"Impact\", \"description\": \"Information Disclosure\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:microsoft:azure_storage_blobs:*:*:*:*:*:.net:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"12.13.0\", \"versionStartIncluding\": \"12.0.0\"}, {\"criteria\": \"cpe:2.3:a:microsoft:azure_storage_queue:*:*:*:*:*:.net:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"12.13.0\", \"versionStartIncluding\": \"12.0.0\"}, {\"criteria\": \"cpe:2.3:a:microsoft:azure_storage_blobs:*:*:*:*:*:java:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"12.18.0\", \"versionStartIncluding\": \"12.0.0\"}, {\"criteria\": \"cpe:2.3:a:microsoft:azure_storage_blobs:*:*:*:*:*:python:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"12.4.0\", \"versionStartIncluding\": \"12.0.0\"}, {\"criteria\": \"cpe:2.3:a:microsoft:azure_storage_blobs:*:*:*:*:*:python:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"12.13.0\", \"versionStartIncluding\": \"12.0.0\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"shortName\": \"microsoft\", \"dateUpdated\": \"2025-07-08T15:35:58.676Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-30187\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-07-08T15:35:58.676Z\", \"dateReserved\": \"2022-05-03T00:00:00.000Z\", \"assignerOrgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"datePublished\": \"2022-07-12T22:37:25.000Z\", \"assignerShortName\": \"microsoft\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2022-AVI-634
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Microsoft Azure. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une exécution de code à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Azure | Azure Storage Blobs client library pour Python | ||
| Microsoft | Azure | Azure Site Recovery VMWare to Azure | ||
| Microsoft | Azure | Azure Storage Queues client library pour Python | ||
| Microsoft | Azure | Azure Storage Queues client library pour .NET | ||
| Microsoft | Azure | Azure Storage Blobs client library pour Java | ||
| Microsoft | Azure | Azure Storage Blobs client library pour .NET |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Azure Storage Blobs client library pour Python",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Site Recovery VMWare to Azure",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Storage Queues client library pour Python",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Storage Queues client library pour .NET",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Storage Blobs client library pour Java",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Storage Blobs client library pour .NET",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-33664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33664"
},
{
"name": "CVE-2022-33653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33653"
},
{
"name": "CVE-2022-33642",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33642"
},
{
"name": "CVE-2022-33650",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33650"
},
{
"name": "CVE-2022-30187",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30187"
},
{
"name": "CVE-2022-33654",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33654"
},
{
"name": "CVE-2022-33671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33671"
},
{
"name": "CVE-2022-33661",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33661"
},
{
"name": "CVE-2022-33678",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33678"
},
{
"name": "CVE-2022-33662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33662"
},
{
"name": "CVE-2022-33674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33674"
},
{
"name": "CVE-2022-33657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33657"
},
{
"name": "CVE-2022-33667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33667"
},
{
"name": "CVE-2022-30181",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30181"
},
{
"name": "CVE-2022-33673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33673"
},
{
"name": "CVE-2022-33677",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33677"
},
{
"name": "CVE-2022-33643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33643"
},
{
"name": "CVE-2022-33668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33668"
},
{
"name": "CVE-2022-33658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33658"
},
{
"name": "CVE-2022-33675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33675"
},
{
"name": "CVE-2022-33665",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33665"
},
{
"name": "CVE-2022-33659",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33659"
},
{
"name": "CVE-2022-33666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33666"
},
{
"name": "CVE-2022-33655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33655"
},
{
"name": "CVE-2022-33656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33656"
},
{
"name": "CVE-2022-33672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33672"
},
{
"name": "CVE-2022-33641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33641"
},
{
"name": "CVE-2022-33669",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33669"
},
{
"name": "CVE-2022-33651",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33651"
},
{
"name": "CVE-2022-33652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33652"
},
{
"name": "CVE-2022-33660",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33660"
},
{
"name": "CVE-2022-33676",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33676"
},
{
"name": "CVE-2022-33663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33663"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33642 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33642"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33676 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33676"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33663 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33663"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33664 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33664"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33673 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33673"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33666 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33666"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33662 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33662"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33655 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33655"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33653 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33653"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33671 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33671"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30187 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30187"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33665 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33665"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33678 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33678"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33643 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33643"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33652 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33652"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33667 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33667"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33654 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33654"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33672 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33672"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33641 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33641"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33659 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33659"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30181 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30181"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33661 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33661"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33650 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33650"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33651 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33651"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33658 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33658"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33660 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33660"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33669 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33669"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33668 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33668"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33674 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33674"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33656 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33656"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33657 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33657"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33677 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33677"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33675 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33675"
}
],
"reference": "CERTFR-2022-AVI-634",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-07-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Azure\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une\nex\u00e9cution de code \u00e0 distance et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Azure",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
CERTFR-2025-AVI-0563
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.3.2411.x antérieures à 9.3.2411.107 | ||
| Splunk | SOAR | Splunk SOAR versions antérieures à 6.4.1 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.4.x antérieures à 9.4.3 | ||
| Splunk | Universal Forwarder | Splunk Universal Forwarder versions 9.2.x antérieures à 9.2.7 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.3.x antérieures à 9.3.5 | ||
| Splunk | Splunk DB Connect | Splunk DB Connect versions antérieures à 4.0.0 | ||
| Splunk | Universal Forwarder | Splunk Universal Forwarder versions 9.3.x antérieures à 9.3.5 | ||
| Splunk | Universal Forwarder | Splunk Universal Forwarder versions 9.4.x antérieures à 9.4.3 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.3.2408.x antérieures à 9.3.2408.117 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.1.x antérieures à 9.1.10 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.2.x antérieures à 9.2.7 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.2.2406.x antérieures à 9.2.2406.121 | ||
| Splunk | Universal Forwarder | Splunk Universal Forwarder versions 9.1.x antérieures à 9.1.10 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk Enterprise Cloud versions 9.3.2411.x ant\u00e9rieures \u00e0 9.3.2411.107",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk SOAR versions ant\u00e9rieures \u00e0 6.4.1",
"product": {
"name": "SOAR",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.4.x ant\u00e9rieures \u00e0 9.4.3",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Universal Forwarder versions 9.2.x ant\u00e9rieures \u00e0 9.2.7",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.5",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk DB Connect versions ant\u00e9rieures \u00e0 4.0.0",
"product": {
"name": "Splunk DB Connect",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Universal Forwarder versions 9.3.x ant\u00e9rieures \u00e0 9.3.5",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Universal Forwarder versions 9.4.x ant\u00e9rieures \u00e0 9.4.3",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise Cloud versions 9.3.2408.x ant\u00e9rieures \u00e0 9.3.2408.117",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.10",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.7",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise Cloud versions 9.2.2406.x ant\u00e9rieures \u00e0 9.2.2406.121",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Universal Forwarder versions 9.1.x ant\u00e9rieures \u00e0 9.1.10",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2022-30187",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30187"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-2466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2466"
},
{
"name": "CVE-2025-27414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27414"
},
{
"name": "CVE-2025-20324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20324"
},
{
"name": "CVE-2025-23388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23388"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-20319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20319"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2020-28458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
},
{
"name": "CVE-2025-20321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20321"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2025-20325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20325"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2025-23387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23387"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2021-23445",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23445"
},
{
"name": "CVE-2024-48949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48949"
},
{
"name": "CVE-2025-23389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23389"
},
{
"name": "CVE-2024-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21538"
},
{
"name": "CVE-2022-35583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35583"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-52804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52804"
},
{
"name": "CVE-2025-20300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20300"
},
{
"name": "CVE-2024-45801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45801"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-20323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20323"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-38999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38999"
},
{
"name": "CVE-2025-20320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20320"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-45230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45230"
},
{
"name": "CVE-2024-49767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49767"
},
{
"name": "CVE-2024-47875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47875"
},
{
"name": "CVE-2025-20322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20322"
},
{
"name": "CVE-2024-21272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21272"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2024-39338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
},
{
"name": "CVE-2024-21090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21090"
},
{
"name": "CVE-2013-7489",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7489"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2024-0853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0853"
},
{
"name": "CVE-2025-22952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22952"
},
{
"name": "CVE-2024-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32002"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0563",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0708",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0708"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0703",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0703"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0701",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0701"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0706",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0706"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0705",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0705"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0702",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0702"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0712",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0712"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0711",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0711"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0707",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0707"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0710",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0710"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0709",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0709"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0704",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0704"
}
]
}
CERTFR-2022-AVI-634
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Microsoft Azure. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une exécution de code à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Azure | Azure Storage Blobs client library pour Python | ||
| Microsoft | Azure | Azure Site Recovery VMWare to Azure | ||
| Microsoft | Azure | Azure Storage Queues client library pour Python | ||
| Microsoft | Azure | Azure Storage Queues client library pour .NET | ||
| Microsoft | Azure | Azure Storage Blobs client library pour Java | ||
| Microsoft | Azure | Azure Storage Blobs client library pour .NET |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Azure Storage Blobs client library pour Python",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Site Recovery VMWare to Azure",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Storage Queues client library pour Python",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Storage Queues client library pour .NET",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Storage Blobs client library pour Java",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Storage Blobs client library pour .NET",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-33664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33664"
},
{
"name": "CVE-2022-33653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33653"
},
{
"name": "CVE-2022-33642",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33642"
},
{
"name": "CVE-2022-33650",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33650"
},
{
"name": "CVE-2022-30187",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30187"
},
{
"name": "CVE-2022-33654",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33654"
},
{
"name": "CVE-2022-33671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33671"
},
{
"name": "CVE-2022-33661",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33661"
},
{
"name": "CVE-2022-33678",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33678"
},
{
"name": "CVE-2022-33662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33662"
},
{
"name": "CVE-2022-33674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33674"
},
{
"name": "CVE-2022-33657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33657"
},
{
"name": "CVE-2022-33667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33667"
},
{
"name": "CVE-2022-30181",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30181"
},
{
"name": "CVE-2022-33673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33673"
},
{
"name": "CVE-2022-33677",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33677"
},
{
"name": "CVE-2022-33643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33643"
},
{
"name": "CVE-2022-33668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33668"
},
{
"name": "CVE-2022-33658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33658"
},
{
"name": "CVE-2022-33675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33675"
},
{
"name": "CVE-2022-33665",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33665"
},
{
"name": "CVE-2022-33659",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33659"
},
{
"name": "CVE-2022-33666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33666"
},
{
"name": "CVE-2022-33655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33655"
},
{
"name": "CVE-2022-33656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33656"
},
{
"name": "CVE-2022-33672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33672"
},
{
"name": "CVE-2022-33641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33641"
},
{
"name": "CVE-2022-33669",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33669"
},
{
"name": "CVE-2022-33651",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33651"
},
{
"name": "CVE-2022-33652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33652"
},
{
"name": "CVE-2022-33660",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33660"
},
{
"name": "CVE-2022-33676",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33676"
},
{
"name": "CVE-2022-33663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33663"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33642 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33642"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33676 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33676"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33663 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33663"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33664 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33664"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33673 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33673"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33666 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33666"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33662 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33662"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33655 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33655"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33653 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33653"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33671 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33671"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30187 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30187"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33665 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33665"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33678 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33678"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33643 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33643"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33652 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33652"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33667 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33667"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33654 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33654"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33672 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33672"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33641 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33641"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33659 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33659"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-30181 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30181"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33661 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33661"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33650 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33650"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33651 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33651"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33658 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33658"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33660 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33660"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33669 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33669"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33668 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33668"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33674 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33674"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33656 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33656"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33657 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33657"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33677 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33677"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33675 du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33675"
}
],
"reference": "CERTFR-2022-AVI-634",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-07-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Azure\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une\nex\u00e9cution de code \u00e0 distance et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Azure",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 12 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
CERTFR-2025-AVI-0563
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.3.2411.x antérieures à 9.3.2411.107 | ||
| Splunk | SOAR | Splunk SOAR versions antérieures à 6.4.1 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.4.x antérieures à 9.4.3 | ||
| Splunk | Universal Forwarder | Splunk Universal Forwarder versions 9.2.x antérieures à 9.2.7 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.3.x antérieures à 9.3.5 | ||
| Splunk | Splunk DB Connect | Splunk DB Connect versions antérieures à 4.0.0 | ||
| Splunk | Universal Forwarder | Splunk Universal Forwarder versions 9.3.x antérieures à 9.3.5 | ||
| Splunk | Universal Forwarder | Splunk Universal Forwarder versions 9.4.x antérieures à 9.4.3 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.3.2408.x antérieures à 9.3.2408.117 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.1.x antérieures à 9.1.10 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.2.x antérieures à 9.2.7 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.2.2406.x antérieures à 9.2.2406.121 | ||
| Splunk | Universal Forwarder | Splunk Universal Forwarder versions 9.1.x antérieures à 9.1.10 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk Enterprise Cloud versions 9.3.2411.x ant\u00e9rieures \u00e0 9.3.2411.107",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk SOAR versions ant\u00e9rieures \u00e0 6.4.1",
"product": {
"name": "SOAR",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.4.x ant\u00e9rieures \u00e0 9.4.3",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Universal Forwarder versions 9.2.x ant\u00e9rieures \u00e0 9.2.7",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.5",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk DB Connect versions ant\u00e9rieures \u00e0 4.0.0",
"product": {
"name": "Splunk DB Connect",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Universal Forwarder versions 9.3.x ant\u00e9rieures \u00e0 9.3.5",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Universal Forwarder versions 9.4.x ant\u00e9rieures \u00e0 9.4.3",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise Cloud versions 9.3.2408.x ant\u00e9rieures \u00e0 9.3.2408.117",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.10",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.7",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise Cloud versions 9.2.2406.x ant\u00e9rieures \u00e0 9.2.2406.121",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Universal Forwarder versions 9.1.x ant\u00e9rieures \u00e0 9.1.10",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2022-30187",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30187"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-2466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2466"
},
{
"name": "CVE-2025-27414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27414"
},
{
"name": "CVE-2025-20324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20324"
},
{
"name": "CVE-2025-23388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23388"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-20319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20319"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2020-28458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
},
{
"name": "CVE-2025-20321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20321"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2025-20325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20325"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2025-23387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23387"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2021-23445",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23445"
},
{
"name": "CVE-2024-48949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48949"
},
{
"name": "CVE-2025-23389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23389"
},
{
"name": "CVE-2024-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21538"
},
{
"name": "CVE-2022-35583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35583"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-52804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52804"
},
{
"name": "CVE-2025-20300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20300"
},
{
"name": "CVE-2024-45801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45801"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-20323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20323"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-38999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38999"
},
{
"name": "CVE-2025-20320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20320"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-45230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45230"
},
{
"name": "CVE-2024-49767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49767"
},
{
"name": "CVE-2024-47875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47875"
},
{
"name": "CVE-2025-20322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20322"
},
{
"name": "CVE-2024-21272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21272"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2024-39338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
},
{
"name": "CVE-2024-21090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21090"
},
{
"name": "CVE-2013-7489",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7489"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2024-0853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0853"
},
{
"name": "CVE-2025-22952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22952"
},
{
"name": "CVE-2024-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32002"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0563",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0708",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0708"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0703",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0703"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0701",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0701"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0706",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0706"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0705",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0705"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0702",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0702"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0712",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0712"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0711",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0711"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0707",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0707"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0710",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0710"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0709",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0709"
},
{
"published_at": "2025-07-07",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0704",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0704"
}
]
}
BDU:2022-05160
Vulnerability from fstec - Published: 12.07.2022{
"CVSS 2.0": "AV:N/AC:H/Au:S/C:C/I:N/A:N",
"CVSS 3.0": "AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Microsoft Corp",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 12.13.0 (Azure Storage Blobs client library \u0434\u043b\u044f Python), \u0434\u043e 12.4.0 (Azure Storage Queues client library \u0434\u043b\u044f Python), \u0434\u043e 12.18.0 (Azure Storage Blobs client library \u0434\u043b\u044f Java), \u0434\u043e 12.11.0 (Azure Storage Queues client library \u0434\u043b\u044f .NET), \u0434\u043e 12.13.0 (Azure Storage Blobs client library \u0434\u043b\u044f .NET)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30187",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "12.07.2022",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "19.08.2022",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "19.08.2022",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2022-05160",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-30187",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Azure Storage Blobs client library \u0434\u043b\u044f Python, Azure Storage Queues client library \u0434\u043b\u044f Python, Azure Storage Blobs client library \u0434\u043b\u044f Java, Azure Storage Queues client library \u0434\u043b\u044f .NET, Azure Storage Blobs client library \u0434\u043b\u044f .NET",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 Azure Storage Library, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c\u0438 \u0440\u0430\u0437\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u043e\u0439 \u043e\u0431\u043b\u0430\u0441\u0442\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u044b, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0420\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 (CWE-200), \u0412\u044b\u0437\u043e\u0432 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u0441 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u043f\u0435\u0440\u0435\u043c\u0435\u043d\u043d\u043e\u0439 \u0438\u043b\u0438 \u0441\u0441\u044b\u043b\u043a\u043e\u0439 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0430\u0440\u0433\u0443\u043c\u0435\u043d\u0442\u0430 (CWE-688)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 Azure Storage Library \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c\u0438 \u0440\u0430\u0437\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u043e\u0439 \u043e\u0431\u043b\u0430\u0441\u0442\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u044b. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0441\u0431\u043e\u0440 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30187\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-30187\nhttps://vuldb.com/ru/?id.203686",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-200, CWE-688",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,9)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,3)"
}
FKIE_CVE-2022-30187
Vulnerability from fkie_nvd - Published: 2022-07-12 23:15 - Updated: 2024-11-21 07:02| Vendor | Product | Version | |
|---|---|---|---|
| microsoft | azure_storage_blobs | * | |
| microsoft | azure_storage_blobs | * | |
| microsoft | azure_storage_blobs | * | |
| microsoft | azure_storage_queue | * | |
| microsoft | azure_storage_queue | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:azure_storage_blobs:*:*:*:*:*:.net:*:*",
"matchCriteriaId": "76C885A0-06D7-4573-97BA-FBCA7653F008",
"versionEndExcluding": "12.13.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_storage_blobs:*:*:*:*:*:python:*:*",
"matchCriteriaId": "2E1A488F-D561-4005-AFF8-468860F40816",
"versionEndExcluding": "12.13.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_storage_blobs:*:*:*:*:*:java:*:*",
"matchCriteriaId": "153D4518-8E6D-48D0-9BC5-EB482EDBF07B",
"versionEndExcluding": "12.18.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_storage_queue:*:*:*:*:*:python:*:*",
"matchCriteriaId": "F765F0A9-3756-4C1E-85B0-1438474B4590",
"versionEndExcluding": "12.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_storage_queue:*:*:*:*:*:.net:*:*",
"matchCriteriaId": "5444CD1F-54C8-4918-8842-5320DE43FDBC",
"versionEndExcluding": "12.11.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Azure Storage Library Information Disclosure Vulnerability"
},
{
"lang": "es",
"value": "Una Vulnerabilidad de Divulgaci\u00f3n de Informaci\u00f3n de Azure Storage Library"
}
],
"id": "CVE-2022-30187",
"lastModified": "2024-11-21T07:02:19.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6,
"source": "secure@microsoft.com",
"type": "Secondary"
}
]
},
"published": "2022-07-12T23:15:10.960",
"references": [
{
"source": "secure@microsoft.com",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30187"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30187"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-327"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-64X4-9HC6-R2H6
Vulnerability from github – Published: 2022-07-13 00:00 – Updated: 2024-05-23 17:12Summary
The Azure Storage Encryption library in Java and other languages is vulnerable to a CBC Padding Oracle attack, similar to CVE-2020-8911. The library is not vulnerable to the equivalent of CVE-2020-8912, but only because it currently only supports AES-CBC as encryption mode.
Severity
Moderate - The vulnerability poses insider risks/privilege escalation risks, circumventing controls for stored data.
Further Analysis
The Java Azure Blob Storage Encryption SDK is impacted by an issue that can result in loss of confidentiality and message forgery. The attack requires write access to the container in question, and that the attacker has access to an endpoint that reveals decryption failures (without revealing the plaintext) and that when encrypting the CBC option was chosen as content cipher.
This advisory describes the plaintext revealing vulnerabilities in the Java Azure Blob Storage Encryption SDK, with a similar issue in the other blob storage SDKs being present as well.
In the current version of the Azure Blob Storage crypto SDK, the only algorithm option that allows users to encrypt files is to AES-CBC, without computing a MAC on the data.
This exposes a padding oracle vulnerability: If the attacker has write access to the blob container bucket and can observe whether or not an endpoint with access to the key can decrypt a file (without observing the file contents that the endpoint learns in the process), they can reconstruct the plaintext with (on average) 128*length(plaintext) queries to the endpoint, by exploiting CBC's ability to manipulate the bytes of the next block and PKCS5 padding errors.
Timeline
Date reported: March 29 2022 Date preview: June 16 2022 Date GA: July 11 2022 Date disclosed: July 17 2022
{
"affected": [
{
"package": {
"ecosystem": "NuGet",
"name": "Azure.Storage.Queues"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "12.11.0"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Azure.Storage.Blobs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "12.13.0"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "com.azure:azure-storage-blob"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "12.18.0"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "PyPI",
"name": "azure-storage-queue"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "12.4.0"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "PyPI",
"name": "azure-storage-blob"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "12.13.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2022-30187"
],
"database_specific": {
"cwe_ids": [
"CWE-668"
],
"github_reviewed": true,
"github_reviewed_at": "2022-07-21T22:35:57Z",
"nvd_published_at": "2022-07-12T23:15:00Z",
"severity": "MODERATE"
},
"details": "### Summary\n\nThe Azure Storage Encryption library in Java and other languages is vulnerable to a CBC Padding Oracle attack, similar to CVE-2020-8911. The library is not vulnerable to the equivalent of CVE-2020-8912, but only because it currently only supports AES-CBC as encryption mode. \n\n### Severity\n\nModerate - The vulnerability poses insider risks/privilege escalation risks, circumventing controls for stored data.\n\n### Further Analysis\nThe Java Azure Blob Storage Encryption SDK is impacted by an issue that can result in loss of confidentiality and message forgery. The attack requires write access to the container in question, and that the attacker has access to an endpoint that reveals decryption failures (without revealing the plaintext) and that when encrypting the CBC option was chosen as content cipher.\n\nThis advisory describes the plaintext revealing vulnerabilities in the Java Azure Blob Storage Encryption SDK, with a similar issue in the other blob storage SDKs being present as well.\n\nIn the current version of the Azure Blob Storage crypto SDK, the only algorithm option that allows users to encrypt files is to AES-CBC, without computing a MAC on the data.\n\nThis exposes a padding oracle vulnerability: If the attacker has write access to the blob container bucket and can observe whether or not an endpoint with access to the key can decrypt a file (without observing the file contents that the endpoint learns in the process), they can reconstruct the plaintext with (on average) 128*length(plaintext) queries to the endpoint, by exploiting CBC\u0027s ability to manipulate the bytes of the next block and PKCS5 padding errors.\n\n### Timeline\n**Date reported**: March 29 2022\n**Date preview**: June 16 2022\n**Date GA**: July 11 2022\n**Date disclosed**: July 17 2022",
"id": "GHSA-64x4-9hc6-r2h6",
"modified": "2024-05-23T17:12:42Z",
"published": "2022-07-13T00:00:39Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/google/security-research/security/advisories/GHSA-6m8q-r22q-vfxh"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30187"
},
{
"type": "WEB",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30187"
},
{
"type": "WEB",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30187"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
],
"summary": "Microsoft: CBC Padding Oracle in Azure Blob Storage Encryption Library"
}
GSD-2022-30187
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-30187",
"description": "Azure Storage Library Information Disclosure Vulnerability.",
"id": "GSD-2022-30187",
"references": [
"https://www.suse.com/security/cve/CVE-2022-30187.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-30187"
],
"details": "Azure Storage Library Information Disclosure Vulnerability",
"id": "GSD-2022-30187",
"modified": "2023-12-13T01:19:36.789802Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2022-30187",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Azure Storage Blobs client library for .NET",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "12.0.0",
"version_value": "12.13.0"
}
]
}
},
{
"product_name": "Azure Storage Queues client library for .NET",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "12.0.0",
"version_value": "12.13.0"
}
]
}
},
{
"product_name": "Azure Storage Blobs client library for Java",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "12.0.0",
"version_value": "12.18.0"
}
]
}
},
{
"product_name": "Azure Storage Queues client library for Python",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "12.0.0",
"version_value": "12.4.0"
}
]
}
},
{
"product_name": "Azure Storage Blobs client library for Python",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "12.0.0",
"version_value": "12.13.0"
}
]
}
}
]
},
"vendor_name": "Microsoft"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Azure Storage Library Information Disclosure Vulnerability"
}
]
},
"impact": {
"cvss": [
{
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30187",
"refsource": "MISC",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30187"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "(,12.13.0)",
"affected_versions": "All versions before 12.13.0",
"cvss_v2": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"cvss_v3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-668",
"CWE-937"
],
"date": "2022-07-21",
"description": "Azure Storage Library Information Disclosure Vulnerability.",
"fixed_versions": [
"12.13.0"
],
"identifier": "CVE-2022-30187",
"identifiers": [
"GHSA-64x4-9hc6-r2h6",
"CVE-2022-30187"
],
"not_impacted": "All versions starting from 12.13.0",
"package_slug": "nuget/Azure.Storage.Blobs",
"pubdate": "2022-07-13",
"solution": "Upgrade to version 12.13.0 or above.",
"title": "Exposure of Resource to Wrong Sphere",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2022-30187",
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30187",
"https://github.com/google/security-research/security/advisories/GHSA-6m8q-r22q-vfxh",
"https://github.com/advisories/GHSA-64x4-9hc6-r2h6"
],
"uuid": "b59b5a6f-f210-4e6a-9872-d11c4cdd4e02"
},
{
"affected_range": "(,12.11.0)",
"affected_versions": "All versions before 12.11.0",
"cvss_v2": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"cvss_v3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-668",
"CWE-937"
],
"date": "2022-07-21",
"description": "Azure Storage Library Information Disclosure Vulnerability.",
"fixed_versions": [
"12.11.0"
],
"identifier": "CVE-2022-30187",
"identifiers": [
"GHSA-64x4-9hc6-r2h6",
"CVE-2022-30187"
],
"not_impacted": "All versions starting from 12.11.0",
"package_slug": "nuget/Azure.Storage.Queues",
"pubdate": "2022-07-13",
"solution": "Upgrade to version 12.11.0 or above.",
"title": "Exposure of Resource to Wrong Sphere",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2022-30187",
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30187",
"https://github.com/google/security-research/security/advisories/GHSA-6m8q-r22q-vfxh",
"https://github.com/advisories/GHSA-64x4-9hc6-r2h6"
],
"uuid": "4f947020-bae2-402e-b4f9-d1ca751a411f"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:microsoft:azure_storage_blobs:*:*:*:*:*:python:*:*",
"cpe_name": [],
"versionEndExcluding": "12.13.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:azure_storage_blobs:*:*:*:*:*:.net:*:*",
"cpe_name": [],
"versionEndExcluding": "12.13.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:azure_storage_queue:*:*:*:*:*:.net:*:*",
"cpe_name": [],
"versionEndExcluding": "12.11.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:azure_storage_blobs:*:*:*:*:*:java:*:*",
"cpe_name": [],
"versionEndExcluding": "12.18.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:azure_storage_queue:*:*:*:*:*:python:*:*",
"cpe_name": [],
"versionEndExcluding": "12.4.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2022-30187"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Azure Storage Library Information Disclosure Vulnerability"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-668"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30187",
"refsource": "MISC",
"tags": [],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30187"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-05-17T17:15Z",
"publishedDate": "2022-07-12T23:15Z"
}
}
}
MSRC_CVE-2022-30187
Vulnerability from csaf_microsoft - Published: 2022-07-12 07:00 - Updated: 2022-07-12 07:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Azure Storage Blobs client library for .NET 12.13.0
Azure Storage Blobs client library for .NET
|
12.13.0 | ||
|
Azure Storage Blobs client library for Python 12.13.0
Azure Storage Blobs client library for Python
|
12.13.0 | ||
|
Azure Storage Queues client library for .NET 12.13.0
Azure Storage Queues client library for .NET
|
12.13.0 | ||
|
Azure Storage Blobs client library for Java 12.18.0
Azure Storage Blobs client library for Java
|
12.18.0 | ||
|
Azure Storage Queues client library for Python 12.4.0
Azure Storage Queues client library for Python
|
12.4.0 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Azure Storage Queues client library for Python <12.4.0
Azure Storage Queues client library for Python
|
<12.4.0 |
Vendor Fix
fix
|
|
|
Azure Storage Blobs client library for Java <12.18.0
Azure Storage Blobs client library for Java
|
<12.18.0 |
Vendor Fix
fix
|
|
|
Azure Storage Queues client library for .NET <12.13.0
Azure Storage Queues client library for .NET
|
<12.13.0 |
Vendor Fix
fix
|
|
|
Azure Storage Blobs client library for Python <12.13.0
Azure Storage Blobs client library for Python
|
<12.13.0 |
Vendor Fix
fix
|
|
|
Azure Storage Blobs client library for .NET <12.13.0
Azure Storage Blobs client library for .NET
|
<12.13.0 |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://msrc.microsoft.com/update-guide/vulnerabi… | self |
| https://msrc.microsoft.com/csaf/advisories/2022/m… | self |
| https://www.microsoft.com/en-us/msrc/exploitabili… | external |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/update-guide/vulnerabi… | self |
| https://msrc.microsoft.com/csaf/advisories/2022/m… | self |
{
"document": {
"acknowledgments": [
{
"names": [
"\u003ca href=\"https://twitter.com/schmiegsophie\"\u003eSophie Schmieg\u003c/a\u003e with \u003ca href=\"https://google.com/\"\u003eGoogle\u003c/a\u003e"
]
}
],
"aggregate_severity": {
"namespace": "https://www.microsoft.com/en-us/msrc/security-update-severity-rating-system",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
},
{
"category": "general",
"text": "Required. The vulnerability documented by this CVE requires customer action to resolve.",
"title": "Customer Action"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2022-30187 Azure Storage Library Information Disclosure Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30187"
},
{
"category": "self",
"summary": "CVE-2022-30187 Azure Storage Library Information Disclosure Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/advisories/2022/msrc_cve-2022-30187.json"
},
{
"category": "external",
"summary": "Microsoft Exploitability Index",
"url": "https://www.microsoft.com/en-us/msrc/exploitability-index?rtc=1"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Azure Storage Library Information Disclosure Vulnerability",
"tracking": {
"current_release_date": "2022-07-12T07:00:00.000Z",
"generator": {
"date": "2025-07-08T15:35:53.908Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2022-30187",
"initial_release_date": "2022-07-12T07:00:00.000Z",
"revision_history": [
{
"date": "2022-07-12T07:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c12.13.0",
"product": {
"name": "Azure Storage Blobs client library for .NET \u003c12.13.0",
"product_id": "5"
}
},
{
"category": "product_version",
"name": "12.13.0",
"product": {
"name": "Azure Storage Blobs client library for .NET 12.13.0",
"product_id": "12060"
}
}
],
"category": "product_name",
"name": "Azure Storage Blobs client library for .NET"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c12.13.0",
"product": {
"name": "Azure Storage Queues client library for .NET \u003c12.13.0",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "12.13.0",
"product": {
"name": "Azure Storage Queues client library for .NET 12.13.0",
"product_id": "12063"
}
}
],
"category": "product_name",
"name": "Azure Storage Queues client library for .NET"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c12.18.0",
"product": {
"name": "Azure Storage Blobs client library for Java \u003c12.18.0",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "12.18.0",
"product": {
"name": "Azure Storage Blobs client library for Java 12.18.0",
"product_id": "12064"
}
}
],
"category": "product_name",
"name": "Azure Storage Blobs client library for Java"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c12.4.0",
"product": {
"name": "Azure Storage Queues client library for Python \u003c12.4.0",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "12.4.0",
"product": {
"name": "Azure Storage Queues client library for Python 12.4.0",
"product_id": "12065"
}
}
],
"category": "product_name",
"name": "Azure Storage Queues client library for Python"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c12.13.0",
"product": {
"name": "Azure Storage Blobs client library for Python \u003c12.13.0",
"product_id": "4"
}
},
{
"category": "product_version",
"name": "12.13.0",
"product": {
"name": "Azure Storage Blobs client library for Python 12.13.0",
"product_id": "12062"
}
}
],
"category": "product_name",
"name": "Azure Storage Blobs client library for Python"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-30187",
"notes": [
{
"category": "general",
"text": "Microsoft",
"title": "Assigning CNA"
},
{
"category": "faq",
"text": "Azure Storage .NET, Java, and Python SDKs use cipher block chaining (CBC mode) for client-side encryption. This client-side encryption is used by very small set of customers, who encrypt their data on the client with a customer-managed key that is maintained in Azure Key Vault or another key store before uploading to Azure Storage.",
"title": "What is CBC padding in storage SDK?"
},
{
"category": "faq",
"text": "An attacker who successfully exploited this vulnerability could decrypt data on the client side and disclose the content of the file or blob.",
"title": "What type of information could be disclosed by this vulnerability?"
},
{
"category": "faq",
"text": "Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.",
"title": "According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?"
}
],
"product_status": {
"fixed": [
"12060",
"12062",
"12063",
"12064",
"12065"
],
"known_affected": [
"1",
"2",
"3",
"4",
"5"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-30187 Azure Storage Library Information Disclosure Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30187"
},
{
"category": "self",
"summary": "CVE-2022-30187 Azure Storage Library Information Disclosure Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/advisories/2022/msrc_cve-2022-30187.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-12T07:00:00.000Z",
"details": "12.13.0:Security Update:https://www.nuget.org/packages/Azure.Storage.Blobs/12.13.0",
"product_ids": [
"5"
],
"url": "https://www.nuget.org/packages/Azure.Storage.Blobs/12.13.0"
},
{
"category": "vendor_fix",
"date": "2022-07-12T07:00:00.000Z",
"details": "12.13.0:Security Update:https://www.nuget.org/packages/Azure.Storage.Queues/12.11.0",
"product_ids": [
"3"
],
"url": "https://www.nuget.org/packages/Azure.Storage.Queues/12.11.0"
},
{
"category": "vendor_fix",
"date": "2022-07-12T07:00:00.000Z",
"details": "12.18.0:Security Update:https://search.maven.org/artifact/com.azure/azure-storage-blob/12.18.0/jar",
"product_ids": [
"2"
],
"url": "https://search.maven.org/artifact/com.azure/azure-storage-blob/12.18.0/jar"
},
{
"category": "vendor_fix",
"date": "2022-07-12T07:00:00.000Z",
"details": "12.4.0:Security Update:https://pypi.org/project/azure-storage-queue/12.4.0/",
"product_ids": [
"1"
],
"url": "https://pypi.org/project/azure-storage-queue/12.4.0/"
},
{
"category": "vendor_fix",
"date": "2022-07-12T07:00:00.000Z",
"details": "12.13.0:Security Update:https://pypi.org/project/azure-storage-blob/12.13.0/",
"product_ids": [
"4"
],
"url": "https://pypi.org/project/azure-storage-blob/12.13.0/"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"exploitCodeMaturity": "PROOF_OF_CONCEPT",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"remediationLevel": "OFFICIAL_FIX",
"reportConfidence": "CONFIRMED",
"scope": "UNCHANGED",
"temporalScore": 4.2,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Information Disclosure"
},
{
"category": "exploit_status",
"details": "Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely"
}
],
"title": "Azure Storage Library Information Disclosure Vulnerability"
}
]
}
OPENSUSE-SU-2024:12283-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:python310-azure-storage-blob-12.13.1-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python310-azure-storage-blob-12.13.1-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python310-azure-storage-blob-12.13.1-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python310-azure-storage-blob-12.13.1-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python38-azure-storage-blob-12.13.1-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python38-azure-storage-blob-12.13.1-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python38-azure-storage-blob-12.13.1-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python38-azure-storage-blob-12.13.1-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python39-azure-storage-blob-12.13.1-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python39-azure-storage-blob-12.13.1-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python39-azure-storage-blob-12.13.1-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:python39-azure-storage-blob-12.13.1-2.1.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://www.suse.com/security/cve/CVE-2022-30187/ | self |
| https://www.suse.com/security/cve/CVE-2022-30187 | external |
| https://bugzilla.suse.com/1202088 | external |
| https://bugzilla.suse.com/1203582 | external |
| https://bugzilla.suse.com/1205790 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python310-azure-storage-blob-12.13.1-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python310-azure-storage-blob-12.13.1-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-12283",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12283-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-30187 page",
"url": "https://www.suse.com/security/cve/CVE-2022-30187/"
}
],
"title": "python310-azure-storage-blob-12.13.1-2.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:12283-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python310-azure-storage-blob-12.13.1-2.1.aarch64",
"product": {
"name": "python310-azure-storage-blob-12.13.1-2.1.aarch64",
"product_id": "python310-azure-storage-blob-12.13.1-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "python38-azure-storage-blob-12.13.1-2.1.aarch64",
"product": {
"name": "python38-azure-storage-blob-12.13.1-2.1.aarch64",
"product_id": "python38-azure-storage-blob-12.13.1-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "python39-azure-storage-blob-12.13.1-2.1.aarch64",
"product": {
"name": "python39-azure-storage-blob-12.13.1-2.1.aarch64",
"product_id": "python39-azure-storage-blob-12.13.1-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python310-azure-storage-blob-12.13.1-2.1.ppc64le",
"product": {
"name": "python310-azure-storage-blob-12.13.1-2.1.ppc64le",
"product_id": "python310-azure-storage-blob-12.13.1-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python38-azure-storage-blob-12.13.1-2.1.ppc64le",
"product": {
"name": "python38-azure-storage-blob-12.13.1-2.1.ppc64le",
"product_id": "python38-azure-storage-blob-12.13.1-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-azure-storage-blob-12.13.1-2.1.ppc64le",
"product": {
"name": "python39-azure-storage-blob-12.13.1-2.1.ppc64le",
"product_id": "python39-azure-storage-blob-12.13.1-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python310-azure-storage-blob-12.13.1-2.1.s390x",
"product": {
"name": "python310-azure-storage-blob-12.13.1-2.1.s390x",
"product_id": "python310-azure-storage-blob-12.13.1-2.1.s390x"
}
},
{
"category": "product_version",
"name": "python38-azure-storage-blob-12.13.1-2.1.s390x",
"product": {
"name": "python38-azure-storage-blob-12.13.1-2.1.s390x",
"product_id": "python38-azure-storage-blob-12.13.1-2.1.s390x"
}
},
{
"category": "product_version",
"name": "python39-azure-storage-blob-12.13.1-2.1.s390x",
"product": {
"name": "python39-azure-storage-blob-12.13.1-2.1.s390x",
"product_id": "python39-azure-storage-blob-12.13.1-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python310-azure-storage-blob-12.13.1-2.1.x86_64",
"product": {
"name": "python310-azure-storage-blob-12.13.1-2.1.x86_64",
"product_id": "python310-azure-storage-blob-12.13.1-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "python38-azure-storage-blob-12.13.1-2.1.x86_64",
"product": {
"name": "python38-azure-storage-blob-12.13.1-2.1.x86_64",
"product_id": "python38-azure-storage-blob-12.13.1-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "python39-azure-storage-blob-12.13.1-2.1.x86_64",
"product": {
"name": "python39-azure-storage-blob-12.13.1-2.1.x86_64",
"product_id": "python39-azure-storage-blob-12.13.1-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-azure-storage-blob-12.13.1-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-azure-storage-blob-12.13.1-2.1.aarch64"
},
"product_reference": "python310-azure-storage-blob-12.13.1-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-azure-storage-blob-12.13.1-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-azure-storage-blob-12.13.1-2.1.ppc64le"
},
"product_reference": "python310-azure-storage-blob-12.13.1-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-azure-storage-blob-12.13.1-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-azure-storage-blob-12.13.1-2.1.s390x"
},
"product_reference": "python310-azure-storage-blob-12.13.1-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-azure-storage-blob-12.13.1-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-azure-storage-blob-12.13.1-2.1.x86_64"
},
"product_reference": "python310-azure-storage-blob-12.13.1-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-azure-storage-blob-12.13.1-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-azure-storage-blob-12.13.1-2.1.aarch64"
},
"product_reference": "python38-azure-storage-blob-12.13.1-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-azure-storage-blob-12.13.1-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-azure-storage-blob-12.13.1-2.1.ppc64le"
},
"product_reference": "python38-azure-storage-blob-12.13.1-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-azure-storage-blob-12.13.1-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-azure-storage-blob-12.13.1-2.1.s390x"
},
"product_reference": "python38-azure-storage-blob-12.13.1-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-azure-storage-blob-12.13.1-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-azure-storage-blob-12.13.1-2.1.x86_64"
},
"product_reference": "python38-azure-storage-blob-12.13.1-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-azure-storage-blob-12.13.1-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-azure-storage-blob-12.13.1-2.1.aarch64"
},
"product_reference": "python39-azure-storage-blob-12.13.1-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-azure-storage-blob-12.13.1-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-azure-storage-blob-12.13.1-2.1.ppc64le"
},
"product_reference": "python39-azure-storage-blob-12.13.1-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-azure-storage-blob-12.13.1-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-azure-storage-blob-12.13.1-2.1.s390x"
},
"product_reference": "python39-azure-storage-blob-12.13.1-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-azure-storage-blob-12.13.1-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-azure-storage-blob-12.13.1-2.1.x86_64"
},
"product_reference": "python39-azure-storage-blob-12.13.1-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-30187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-30187"
}
],
"notes": [
{
"category": "general",
"text": "Azure Storage Library Information Disclosure Vulnerability",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-azure-storage-blob-12.13.1-2.1.aarch64",
"openSUSE Tumbleweed:python310-azure-storage-blob-12.13.1-2.1.ppc64le",
"openSUSE Tumbleweed:python310-azure-storage-blob-12.13.1-2.1.s390x",
"openSUSE Tumbleweed:python310-azure-storage-blob-12.13.1-2.1.x86_64",
"openSUSE Tumbleweed:python38-azure-storage-blob-12.13.1-2.1.aarch64",
"openSUSE Tumbleweed:python38-azure-storage-blob-12.13.1-2.1.ppc64le",
"openSUSE Tumbleweed:python38-azure-storage-blob-12.13.1-2.1.s390x",
"openSUSE Tumbleweed:python38-azure-storage-blob-12.13.1-2.1.x86_64",
"openSUSE Tumbleweed:python39-azure-storage-blob-12.13.1-2.1.aarch64",
"openSUSE Tumbleweed:python39-azure-storage-blob-12.13.1-2.1.ppc64le",
"openSUSE Tumbleweed:python39-azure-storage-blob-12.13.1-2.1.s390x",
"openSUSE Tumbleweed:python39-azure-storage-blob-12.13.1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-30187",
"url": "https://www.suse.com/security/cve/CVE-2022-30187"
},
{
"category": "external",
"summary": "SUSE Bug 1202088 for CVE-2022-30187",
"url": "https://bugzilla.suse.com/1202088"
},
{
"category": "external",
"summary": "SUSE Bug 1203582 for CVE-2022-30187",
"url": "https://bugzilla.suse.com/1203582"
},
{
"category": "external",
"summary": "SUSE Bug 1205790 for CVE-2022-30187",
"url": "https://bugzilla.suse.com/1205790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-azure-storage-blob-12.13.1-2.1.aarch64",
"openSUSE Tumbleweed:python310-azure-storage-blob-12.13.1-2.1.ppc64le",
"openSUSE Tumbleweed:python310-azure-storage-blob-12.13.1-2.1.s390x",
"openSUSE Tumbleweed:python310-azure-storage-blob-12.13.1-2.1.x86_64",
"openSUSE Tumbleweed:python38-azure-storage-blob-12.13.1-2.1.aarch64",
"openSUSE Tumbleweed:python38-azure-storage-blob-12.13.1-2.1.ppc64le",
"openSUSE Tumbleweed:python38-azure-storage-blob-12.13.1-2.1.s390x",
"openSUSE Tumbleweed:python38-azure-storage-blob-12.13.1-2.1.x86_64",
"openSUSE Tumbleweed:python39-azure-storage-blob-12.13.1-2.1.aarch64",
"openSUSE Tumbleweed:python39-azure-storage-blob-12.13.1-2.1.ppc64le",
"openSUSE Tumbleweed:python39-azure-storage-blob-12.13.1-2.1.s390x",
"openSUSE Tumbleweed:python39-azure-storage-blob-12.13.1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-azure-storage-blob-12.13.1-2.1.aarch64",
"openSUSE Tumbleweed:python310-azure-storage-blob-12.13.1-2.1.ppc64le",
"openSUSE Tumbleweed:python310-azure-storage-blob-12.13.1-2.1.s390x",
"openSUSE Tumbleweed:python310-azure-storage-blob-12.13.1-2.1.x86_64",
"openSUSE Tumbleweed:python38-azure-storage-blob-12.13.1-2.1.aarch64",
"openSUSE Tumbleweed:python38-azure-storage-blob-12.13.1-2.1.ppc64le",
"openSUSE Tumbleweed:python38-azure-storage-blob-12.13.1-2.1.s390x",
"openSUSE Tumbleweed:python38-azure-storage-blob-12.13.1-2.1.x86_64",
"openSUSE Tumbleweed:python39-azure-storage-blob-12.13.1-2.1.aarch64",
"openSUSE Tumbleweed:python39-azure-storage-blob-12.13.1-2.1.ppc64le",
"openSUSE Tumbleweed:python39-azure-storage-blob-12.13.1-2.1.s390x",
"openSUSE Tumbleweed:python39-azure-storage-blob-12.13.1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-30187"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.