/

CVE-2022-22978 Report - Details, Severity, & Advisorie...

CVE-2022-22978 Report - Details, Severity, & Advisories

Twingate Team

May 31, 2024

What is CVE-2022-22978?

CVE-2022-22978 is a critical security vulnerability affecting certain versions of Spring Security. This issue, known as an authorization bypass, can impact systems using vulnerable versions of Spring Security with RegexRequestMatcher and a specific regular expression configuration. The vulnerability has a severity rating of 9.8 out of 10, making it a high-risk concern for affected systems. It is essential for organizations using the impacted software to take appropriate mitigation steps to protect their systems and data.

Who is impacted by CVE-2022-22978?

Theis vulnerability affects users of certain versions of Spring Security, Oracle Financial Services Crime and Compliance Management Studio, and NetApp Active IQ Unified Manager. Specifically, it impacts Spring Security versions prior to 5.4.11, 5.5.7, and 5.6.4, as well as older unsupported versions. Oracle Financial Services Crime and Compliance Management Studio versions 8.0.8.2.0 and 8.0.8.3.0 are also affected. Lastly, all versions of NetApp Active IQ Unified Manager on Linux, VMware vSphere, and Windows platforms are impacted by this vulnerability.

What should I do if I’m affected?

If you're affected by the CVE-2022-22978 vulnerability, it's crucial to take action to protect your systems. Follow these steps:

  1. Identify if your system uses a vulnerable version of Spring Security, Oracle Financial Services Crime and Compliance Management Studio, or NetApp Active IQ Unified Manager.

  2. Update to a fixed version of the affected software. For Spring Security, upgrade to 5.5.7 or greater for 5.5.x users, and 5.6.4 or greater for 5.6.x users.

  3. Monitor for any security advisories or updates related to this vulnerability.

By taking these steps, you can help safeguard your systems and data from potential threats.

Is this in CISA’s Known Exploited Vulnerabilities Catalog?

The CVE-2022-22978 vulnerability, also known as Authorization Bypass in RegexRequestMatcher, is not listed in CISA's Known Exploited Vulnerabilities Catalog. It was published on May 19, 2022.

Weakness Enumeration

The weakness enumeration for this vulnerability is categorized as CWE-863, which is an incorrect authorization issue in RegexRequestMatcher affecting certain versions of Spring Security.

Learn More

For a comprehensive understanding of its description, severity, technical details, and known affected software configurations, refer to the NVD page and the sources listed below.

Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.

/

CVE-2022-22978 Report - Details, Severity, & Advisorie...

CVE-2022-22978 Report - Details, Severity, & Advisories

Twingate Team

May 31, 2024

What is CVE-2022-22978?

CVE-2022-22978 is a critical security vulnerability affecting certain versions of Spring Security. This issue, known as an authorization bypass, can impact systems using vulnerable versions of Spring Security with RegexRequestMatcher and a specific regular expression configuration. The vulnerability has a severity rating of 9.8 out of 10, making it a high-risk concern for affected systems. It is essential for organizations using the impacted software to take appropriate mitigation steps to protect their systems and data.

Who is impacted by CVE-2022-22978?

Theis vulnerability affects users of certain versions of Spring Security, Oracle Financial Services Crime and Compliance Management Studio, and NetApp Active IQ Unified Manager. Specifically, it impacts Spring Security versions prior to 5.4.11, 5.5.7, and 5.6.4, as well as older unsupported versions. Oracle Financial Services Crime and Compliance Management Studio versions 8.0.8.2.0 and 8.0.8.3.0 are also affected. Lastly, all versions of NetApp Active IQ Unified Manager on Linux, VMware vSphere, and Windows platforms are impacted by this vulnerability.

What should I do if I’m affected?

If you're affected by the CVE-2022-22978 vulnerability, it's crucial to take action to protect your systems. Follow these steps:

  1. Identify if your system uses a vulnerable version of Spring Security, Oracle Financial Services Crime and Compliance Management Studio, or NetApp Active IQ Unified Manager.

  2. Update to a fixed version of the affected software. For Spring Security, upgrade to 5.5.7 or greater for 5.5.x users, and 5.6.4 or greater for 5.6.x users.

  3. Monitor for any security advisories or updates related to this vulnerability.

By taking these steps, you can help safeguard your systems and data from potential threats.

Is this in CISA’s Known Exploited Vulnerabilities Catalog?

The CVE-2022-22978 vulnerability, also known as Authorization Bypass in RegexRequestMatcher, is not listed in CISA's Known Exploited Vulnerabilities Catalog. It was published on May 19, 2022.

Weakness Enumeration

The weakness enumeration for this vulnerability is categorized as CWE-863, which is an incorrect authorization issue in RegexRequestMatcher affecting certain versions of Spring Security.

Learn More

For a comprehensive understanding of its description, severity, technical details, and known affected software configurations, refer to the NVD page and the sources listed below.

Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.

CVE-2022-22978 Report - Details, Severity, & Advisories

Twingate Team

May 31, 2024

What is CVE-2022-22978?

CVE-2022-22978 is a critical security vulnerability affecting certain versions of Spring Security. This issue, known as an authorization bypass, can impact systems using vulnerable versions of Spring Security with RegexRequestMatcher and a specific regular expression configuration. The vulnerability has a severity rating of 9.8 out of 10, making it a high-risk concern for affected systems. It is essential for organizations using the impacted software to take appropriate mitigation steps to protect their systems and data.

Who is impacted by CVE-2022-22978?

Theis vulnerability affects users of certain versions of Spring Security, Oracle Financial Services Crime and Compliance Management Studio, and NetApp Active IQ Unified Manager. Specifically, it impacts Spring Security versions prior to 5.4.11, 5.5.7, and 5.6.4, as well as older unsupported versions. Oracle Financial Services Crime and Compliance Management Studio versions 8.0.8.2.0 and 8.0.8.3.0 are also affected. Lastly, all versions of NetApp Active IQ Unified Manager on Linux, VMware vSphere, and Windows platforms are impacted by this vulnerability.

What should I do if I’m affected?

If you're affected by the CVE-2022-22978 vulnerability, it's crucial to take action to protect your systems. Follow these steps:

  1. Identify if your system uses a vulnerable version of Spring Security, Oracle Financial Services Crime and Compliance Management Studio, or NetApp Active IQ Unified Manager.

  2. Update to a fixed version of the affected software. For Spring Security, upgrade to 5.5.7 or greater for 5.5.x users, and 5.6.4 or greater for 5.6.x users.

  3. Monitor for any security advisories or updates related to this vulnerability.

By taking these steps, you can help safeguard your systems and data from potential threats.

Is this in CISA’s Known Exploited Vulnerabilities Catalog?

The CVE-2022-22978 vulnerability, also known as Authorization Bypass in RegexRequestMatcher, is not listed in CISA's Known Exploited Vulnerabilities Catalog. It was published on May 19, 2022.

Weakness Enumeration

The weakness enumeration for this vulnerability is categorized as CWE-863, which is an incorrect authorization issue in RegexRequestMatcher affecting certain versions of Spring Security.

Learn More

For a comprehensive understanding of its description, severity, technical details, and known affected software configurations, refer to the NVD page and the sources listed below.