Vulnerability Description
Rhonabwy before v1.1.5 was discovered to contain a buffer overflow via the component r_jwe_aesgcm_key_unwrap. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted JWE token.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rhonabwy Project | Rhonabwy | < 1.1.5 |
Related Weaknesses (CWE)
References
- https://github.com/babelouest/rhonabwy/Third Party Advisory
- https://github.com/babelouest/rhonabwy/commit/b4c2923a1ba4fabf9b55a89244127e153aPatchThird Party Advisory
- https://github.com/babelouest/rhonabwy/Third Party Advisory
- https://github.com/babelouest/rhonabwy/commit/b4c2923a1ba4fabf9b55a89244127e153aPatchThird Party Advisory
FAQ
What is CVE-2022-32096?
CVE-2022-32096 is a vulnerability with a CVSS score of 7.5 (HIGH). Rhonabwy before v1.1.5 was discovered to contain a buffer overflow via the component r_jwe_aesgcm_key_unwrap. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted JWE t...
How severe is CVE-2022-32096?
CVE-2022-32096 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-32096?
Check the references section above for vendor advisories and patch information. Affected products include: Rhonabwy Project Rhonabwy.