CVE-2022-41686
CVSS V2 None
CVSS V3 Medium 4.4
Description
OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption.
Overview
- CVE ID
- CVE-2022-41686
- Assigner
- scy@openharmony.io
- Vulnerability Status
- Analyzed
- Published Version
- 2022-10-14T15:16:20
- Last Modified Date
- 2022-10-17T18:33:45
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:openharmony:openharmony:*:*:*:*:long_term_support:*:*:* | 1 | OR | 3.0 | 3.0.6 |
cpe:2.3:a:openharmony:openharmony:*:*:*:*:-:*:*:* | 1 | OR | 3.1 | 3.1.2 |
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
- Attack Vector
- LOCAL
- Attack Compatibility
- LOW
- Privileges Required
- LOW
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- LOW
- Availability Impact
- NONE
- Base Score
- 4.4
- Base Severity
- MEDIUM
- Exploitability Score
- 1.8
- Impact Score
- 2.5
References
Reference URL | Reference Tags |
---|---|
https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-41686 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41686 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-10-14 16:00:10 | Added to TrackCVE | |||
2022-12-07 07:20:51 | 2022-10-14T15:16Z | 2022-10-14T15:16:20 | CVE Published Date | updated |
2022-12-07 07:20:51 | 2022-10-17T18:33:45 | CVE Modified Date | updated | |
2022-12-07 07:20:51 | Analyzed | Vulnerability Status | updated |