7.5
HIGH
CVE-2022-3786
"Apache OpenSSL X.509 Certificate Name Constraint Buffer Overrun Denial of Service"
Description

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.

INFO

Published Date :

Nov. 1, 2022, 6:15 p.m.

Last Modified :

Nov. 7, 2023, 3:51 a.m.

Remotely Exploitable :

Yes !

Impact Score :

3.6

Exploitability Score :

3.9
Public PoC/Exploit Available at Github

CVE-2022-3786 has a 27 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2022-3786 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Fedoraproject fedora
1 Openssl openssl
1 Nodejs node.js
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2022-3786.

URL Resource
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c42165b5706e42f67ef8ef4c351a9a4c5d21639a Patch Vendor Advisory
https://www.openssl.org/news/secadv/20221101.txt Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

Shell

Updated: 7 months, 1 week ago
0 stars 0 fork 0 watcher
Born at : April 14, 2024, 4:12 p.m. This repo has been linked 3 different CVEs too.

None

Updated: 1 year, 7 months ago
0 stars 0 fork 0 watcher
Born at : April 15, 2023, 8:37 p.m. This repo has been linked 2 different CVEs too.

None

Updated: 1 year, 7 months ago
0 stars 2 fork 2 watcher
Born at : April 8, 2023, 6:19 a.m. This repo has been linked 923 different CVEs too.

None

Shell

Updated: 2 months, 2 weeks ago
3 stars 2 fork 2 watcher
Born at : March 23, 2023, 4:32 a.m. This repo has been linked 435 different CVEs too.

None

Shell

Updated: 2 months, 2 weeks ago
1 stars 0 fork 0 watcher
Born at : March 19, 2023, 1:53 a.m. This repo has been linked 265 different CVEs too.

None

Updated: 9 months, 1 week ago
20 stars 3 fork 3 watcher
Born at : Feb. 14, 2023, 6:10 p.m. This repo has been linked 921 different CVEs too.

Finding CVE-2022-3786 (openssl) with Mayhem

Dockerfile Makefile Shell C

Updated: 1 year, 4 months ago
3 stars 0 fork 0 watcher
Born at : Jan. 11, 2023, 7:52 p.m. This repo has been linked 2 different CVEs too.

None

Python

Updated: 5 months, 2 weeks ago
2 stars 3 fork 3 watcher
Born at : Dec. 12, 2022, 1:15 p.m. This repo has been linked 8 different CVEs too.

None

Shell

Updated: 1 year, 8 months ago
2 stars 0 fork 0 watcher
Born at : Nov. 16, 2022, 9:38 a.m. This repo has been linked 256 different CVEs too.

NFS / NFS over TLS (stunnel) のおためし: VagrantでVM(Ubuntu 20.04 with sshd)を立て、 AnsibleでNFSがインストールされたサーバ・クライアント環境を宣言し、適用する

Updated: 2 years ago
0 stars 0 fork 0 watcher
Born at : Nov. 7, 2022, 10:09 a.m. This repo has been linked 2 different CVEs too.

None

Python

Updated: 3 months, 1 week ago
4 stars 1 fork 1 watcher
Born at : Nov. 7, 2022, 7:58 a.m. This repo has been linked 2 different CVEs too.

None

Makefile C

Updated: 1 year, 7 months ago
17 stars 9 fork 9 watcher
Born at : Nov. 2, 2022, 5:33 p.m. This repo has been linked 2 different CVEs too.

None

Python

Updated: 6 months ago
15 stars 2 fork 2 watcher
Born at : Nov. 2, 2022, 1:09 p.m. This repo has been linked 2 different CVEs too.

An OpenSSL v3.x convenience scanner for Microsoft Windows-based systems.

PowerShell

Updated: 2 years ago
0 stars 0 fork 0 watcher
Born at : Nov. 2, 2022, 11:07 a.m. This repo has been linked 2 different CVEs too.

SpookySSL CVE-2022-3602 SSLv3 Scanner for Windows, Linux, macOS

cve-2022-3602 openssl scanner spookyssl vulnerability

Python

Updated: 3 months, 1 week ago
1 stars 0 fork 0 watcher
Born at : Nov. 2, 2022, 9:29 a.m. This repo has been linked 2 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2022-3786 vulnerability anywhere in the article.

  • malwaretech.com
Everything you need to know about the OpenSSL 3.0.7 Patch (CVE-2022-3602 & CVE-2022-3786)

Discussion thread: https://updatedsecurity.com/topic/9-openssl-vulnerability-cve-2022-3602-cve-2022-3786/ Vulnerability Details From https://www.openssl.org/news/secadv/20221101.txt X.509 Email Addres ... Read more

Published Date: Nov 01, 2022 (2 years ago)

The following table lists the changes that have been made to the CVE-2022-3786 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Nov. 07, 2023

    Action Type Old Value New Value
    Changed Description A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.
  • Reanalysis by [email protected]

    Jan. 19, 2023

    Action Type Old Value New Value
    Added CPE Configuration OR *cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* versions from (including) 18.0.0 up to (excluding) 18.11.0 *cpe:2.3:a:nodejs:node.js:18.12.0:*:*:*:lts:*:*:* *cpe:2.3:a:nodejs:node.js:19.0.0:*:*:*:-:*:*:*
  • Modified Analysis by [email protected]

    Dec. 09, 2022

    Action Type Old Value New Value
    Changed Reference Type https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c42165b5706e42f67ef8ef4c351a9a4c5d21639a No Types Assigned https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c42165b5706e42f67ef8ef4c351a9a4c5d21639a Patch, Vendor Advisory
  • CVE Modified by [email protected]

    Nov. 04, 2022

    Action Type Old Value New Value
    Changed Description A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6). A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.
    Removed Reference http://packetstormsecurity.com/files/169687/OpenSSL-Security-Advisory-20221101.html [No Types Assigned]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/01/15 [Mailing List, Third Party Advisory]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/01/16 [Mailing List, Third Party Advisory]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/01/17 [Mailing List, Third Party Advisory]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/01/18 [Mailing List, Third Party Advisory]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/01/19 [Mailing List, Third Party Advisory]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/01/20 [Mailing List, Third Party Advisory]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/01/21 [Mailing List, Third Party Advisory]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/01/24 [Mailing List, Third Party Advisory]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/02/1 [Mailing List, Third Party Advisory]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/02/10 [Mailing List, Third Party Advisory]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/02/11 [No Types Assigned]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/02/12 [No Types Assigned]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/02/13 [No Types Assigned]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/02/14 [No Types Assigned]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/02/15 [No Types Assigned]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/02/2 [Mailing List, Third Party Advisory]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/02/3 [Mailing List, Third Party Advisory]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/02/5 [Mailing List, Third Party Advisory]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/02/6 [Mailing List, Third Party Advisory]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/02/7 [Mailing List, Third Party Advisory]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/02/9 [Mailing List, Third Party Advisory]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/03/1 [No Types Assigned]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/03/10 [No Types Assigned]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/03/11 [No Types Assigned]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/03/2 [No Types Assigned]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/03/3 [No Types Assigned]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/03/5 [No Types Assigned]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/03/6 [No Types Assigned]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/03/7 [No Types Assigned]
    Removed Reference http://www.openwall.com/lists/oss-security/2022/11/03/9 [No Types Assigned]
    Removed Reference https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=c42165b5706e42f67ef8ef4c351a9a4c5d21639a [No Types Assigned]
    Removed Reference https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63YRPWPUSX3MBHNPIEJZDKQT6YA7UF6S/ [No Types Assigned]
    Removed Reference https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DWP23EZYOBDJQP7HP4YU7W2ABU2YDITS/ [No Types Assigned]
    Removed Reference https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0023 [Third Party Advisory]
    Removed Reference https://security.gentoo.org/glsa/202211-01 [Issue Tracking, Third Party Advisory]
    Removed Reference https://security.netapp.com/advisory/ntap-20221102-0001/ [No Types Assigned]
    Removed Reference https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-W9sdCc2a [Third Party Advisory]
    Removed Reference https://www.kb.cert.org/vuls/id/794340 [No Types Assigned]
    Added Reference https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c42165b5706e42f67ef8ef4c351a9a4c5d21639a [No Types Assigned]
  • CVE Modified by [email protected]

    Nov. 04, 2022

    Action Type Old Value New Value
    Removed Reference https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c42165b5706e42f67ef8ef4c351a9a4c5d21639a [Mailing List, Patch, Vendor Advisory]
    Removed Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/63YRPWPUSX3MBHNPIEJZDKQT6YA7UF6S/ [Mailing List, Third Party Advisory]
    Removed Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/DWP23EZYOBDJQP7HP4YU7W2ABU2YDITS/ [Mailing List, Third Party Advisory]
    Added Reference https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63YRPWPUSX3MBHNPIEJZDKQT6YA7UF6S/ [No Types Assigned]
    Added Reference https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DWP23EZYOBDJQP7HP4YU7W2ABU2YDITS/ [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/03/11 [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/03/10 [No Types Assigned]
    Added Reference https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=c42165b5706e42f67ef8ef4c351a9a4c5d21639a [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/03/9 [No Types Assigned]
  • CVE Modified by [email protected]

    Nov. 03, 2022

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/03/6 [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/03/7 [No Types Assigned]
  • CVE Modified by [email protected]

    Nov. 03, 2022

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/03/5 [No Types Assigned]
  • CVE Modified by [email protected]

    Nov. 03, 2022

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/03/1 [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/03/2 [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/03/3 [No Types Assigned]
  • CVE Modified by [email protected]

    Nov. 03, 2022

    Action Type Old Value New Value
    Added Reference https://www.kb.cert.org/vuls/id/794340 [No Types Assigned]
  • CVE Modified by [email protected]

    Nov. 02, 2022

    Action Type Old Value New Value
    Added Reference https://security.netapp.com/advisory/ntap-20221102-0001/ [No Types Assigned]
  • CVE Modified by [email protected]

    Nov. 02, 2022

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/02/15 [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/02/14 [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/02/13 [No Types Assigned]
  • CVE Modified by [email protected]

    Nov. 02, 2022

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/02/11 [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/02/12 [No Types Assigned]
  • CVE Modified by [email protected]

    Nov. 02, 2022

    Action Type Old Value New Value
    Added Reference http://packetstormsecurity.com/files/169687/OpenSSL-Security-Advisory-20221101.html [No Types Assigned]
  • Initial Analysis by [email protected]

    Nov. 02, 2022

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
    Changed Reference Type http://www.openwall.com/lists/oss-security/2022/11/01/15 No Types Assigned http://www.openwall.com/lists/oss-security/2022/11/01/15 Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2022/11/01/16 No Types Assigned http://www.openwall.com/lists/oss-security/2022/11/01/16 Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2022/11/01/17 No Types Assigned http://www.openwall.com/lists/oss-security/2022/11/01/17 Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2022/11/01/18 No Types Assigned http://www.openwall.com/lists/oss-security/2022/11/01/18 Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2022/11/01/19 No Types Assigned http://www.openwall.com/lists/oss-security/2022/11/01/19 Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2022/11/01/20 No Types Assigned http://www.openwall.com/lists/oss-security/2022/11/01/20 Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2022/11/01/21 No Types Assigned http://www.openwall.com/lists/oss-security/2022/11/01/21 Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2022/11/01/24 No Types Assigned http://www.openwall.com/lists/oss-security/2022/11/01/24 Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2022/11/02/1 No Types Assigned http://www.openwall.com/lists/oss-security/2022/11/02/1 Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2022/11/02/10 No Types Assigned http://www.openwall.com/lists/oss-security/2022/11/02/10 Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2022/11/02/2 No Types Assigned http://www.openwall.com/lists/oss-security/2022/11/02/2 Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2022/11/02/3 No Types Assigned http://www.openwall.com/lists/oss-security/2022/11/02/3 Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2022/11/02/5 No Types Assigned http://www.openwall.com/lists/oss-security/2022/11/02/5 Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2022/11/02/6 No Types Assigned http://www.openwall.com/lists/oss-security/2022/11/02/6 Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2022/11/02/7 No Types Assigned http://www.openwall.com/lists/oss-security/2022/11/02/7 Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2022/11/02/9 No Types Assigned http://www.openwall.com/lists/oss-security/2022/11/02/9 Mailing List, Third Party Advisory
    Changed Reference Type https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c42165b5706e42f67ef8ef4c351a9a4c5d21639a No Types Assigned https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c42165b5706e42f67ef8ef4c351a9a4c5d21639a Mailing List, Patch, Vendor Advisory
    Changed Reference Type https://lists.fedoraproject.org/archives/list/[email protected]/message/63YRPWPUSX3MBHNPIEJZDKQT6YA7UF6S/ No Types Assigned https://lists.fedoraproject.org/archives/list/[email protected]/message/63YRPWPUSX3MBHNPIEJZDKQT6YA7UF6S/ Mailing List, Third Party Advisory
    Changed Reference Type https://lists.fedoraproject.org/archives/list/[email protected]/message/DWP23EZYOBDJQP7HP4YU7W2ABU2YDITS/ No Types Assigned https://lists.fedoraproject.org/archives/list/[email protected]/message/DWP23EZYOBDJQP7HP4YU7W2ABU2YDITS/ Mailing List, Third Party Advisory
    Changed Reference Type https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0023 No Types Assigned https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0023 Third Party Advisory
    Changed Reference Type https://security.gentoo.org/glsa/202211-01 No Types Assigned https://security.gentoo.org/glsa/202211-01 Issue Tracking, Third Party Advisory
    Changed Reference Type https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-W9sdCc2a No Types Assigned https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-W9sdCc2a Third Party Advisory
    Changed Reference Type https://www.openssl.org/news/secadv/20221101.txt No Types Assigned https://www.openssl.org/news/secadv/20221101.txt Vendor Advisory
    Added CWE NIST CWE-120
    Added CPE Configuration OR *cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* versions from (including) 3.0.0 up to (excluding) 3.0.7
    Added CPE Configuration OR *cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* *cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Nov. 02, 2022

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/02/9 [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/02/10 [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/02/7 [No Types Assigned]
  • CVE Modified by [email protected]

    Nov. 02, 2022

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/02/1 [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/02/2 [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/02/3 [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/02/5 [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/02/6 [No Types Assigned]
  • CVE Modified by [email protected]

    Nov. 02, 2022

    Action Type Old Value New Value
    Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/DWP23EZYOBDJQP7HP4YU7W2ABU2YDITS/ [No Types Assigned]
    Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/63YRPWPUSX3MBHNPIEJZDKQT6YA7UF6S/ [No Types Assigned]
  • CVE Modified by [email protected]

    Nov. 02, 2022

    Action Type Old Value New Value
    Added Reference https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0023 [No Types Assigned]
  • CVE Modified by [email protected]

    Nov. 02, 2022

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/01/17 [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/01/18 [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/01/19 [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/01/24 [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/01/20 [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/01/21 [No Types Assigned]
    Added Reference https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-W9sdCc2a [No Types Assigned]
    Added Reference https://security.gentoo.org/glsa/202211-01 [No Types Assigned]
  • CVE Modified by [email protected]

    Nov. 01, 2022

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/01/15 [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2022/11/01/16 [No Types Assigned]
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2022-3786 is associated with the following CWEs:

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.12 }} 0.00%

score

0.46984

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability