CVE Vulnerabilities

CVE-2022-24810

NULL Pointer Dereference

Published: Apr 16, 2024 | Modified: Feb 11, 2025
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
5.9 MODERATE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can use a malformed OID in a SET to the nsVacmAccessTable to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
Net-snmpNet-snmp*5.9.2 (excluding)
Red Hat Enterprise Linux 9RedHatnet-snmp-1:5.9.1-13.el9_4.3*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHatnet-snmp-1:5.9.1-11.el9_2.2*
Net-snmpUbuntubionic*
Net-snmpUbuntudevel*
Net-snmpUbuntuesm-infra-legacy/trusty*
Net-snmpUbuntuesm-infra/bionic*
Net-snmpUbuntuesm-infra/focal*
Net-snmpUbuntuesm-infra/xenial*
Net-snmpUbuntufocal*
Net-snmpUbuntuimpish*
Net-snmpUbuntujammy*
Net-snmpUbuntukinetic*
Net-snmpUbuntutrusty*
Net-snmpUbuntutrusty/esm*
Net-snmpUbuntuupstream*
Net-snmpUbuntuxenial*

Potential Mitigations

References