HIGH · 7.5

CVE-2022-0084

A flaw was found in XNIO, specifically in the notifyReadClosed method. The issue revealed this method was logging a message to another expected end. This flaw allows an attacker to send flawed request...

Vulnerability Description

A flaw was found in XNIO, specifically in the notifyReadClosed method. The issue revealed this method was logging a message to another expected end. This flaw allows an attacker to send flawed requests to a server, possibly causing log contention-related performance concerns or an unwanted disk fill-up.

CVSS Score

7.5

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
RedhatIntegration Camel K-
RedhatIntegration Camel Quarkus-
RedhatSingle Sign-On7.0
RedhatXnio< 3.8.7

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-0084?

CVE-2022-0084 is a vulnerability with a CVSS score of 7.5 (HIGH). A flaw was found in XNIO, specifically in the notifyReadClosed method. The issue revealed this method was logging a message to another expected end. This flaw allows an attacker to send flawed request...

How severe is CVE-2022-0084?

CVE-2022-0084 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2022-0084?

Check the references section above for vendor advisories and patch information. Affected products include: Redhat Integration Camel K, Redhat Integration Camel Quarkus, Redhat Single Sign-On, Redhat Xnio.