Integer Overflow Vulnerability in Spring Security by VMware
CVE-2022-22976

5.3MEDIUM

Key Information:

Vendor
Vmware
Vendor
CVE Published:
19 May 2022

Badges

👾 Exploit Exists🟡 Public PoC

Summary

The integer overflow vulnerability in Spring Security affects specified versions where the BCrypt class does not perform necessary salt rounds when configured with the maximum work factor. This flaw occurs due to an inadequately handled integer overflow, leading to potential security issues for applications that rely on password encoding. Users should update their Spring Security versions to the latest releases to mitigate risks.

Affected Version(s)

Spring Security Spring Security versions 5.5.x prior to 5.5.7, 5.6.x prior to 5.6.4, and earlier unsupported versions

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability Reserved

.