Vulnerability Description
An out-of-bounds read vulnerability exists in the PORT command parameter extraction functionality of Weston Embedded uC-FTPs v 1.98.00. A specially-crafted set of network packets can lead to denial of service. An attacker can send packets to trigger this vulnerability.This vulnerability occurs when no port argument is provided to the `PORT` command.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Weston-Embedded | Uc-Ftps | 1.98.00 |
Related Weaknesses (CWE)
References
- https://github.com/weston-embedded/uC-FTPs/pull/2Patch
- https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681ExploitMitigationThird Party Advisory
- https://github.com/weston-embedded/uC-FTPs/pull/2Patch
- https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681ExploitMitigationThird Party Advisory
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1681
FAQ
What is CVE-2022-46378?
CVE-2022-46378 is a vulnerability with a CVSS score of 6.5 (MEDIUM). An out-of-bounds read vulnerability exists in the PORT command parameter extraction functionality of Weston Embedded uC-FTPs v 1.98.00. A specially-crafted set of network packets can lead to denial of...
How severe is CVE-2022-46378?
CVE-2022-46378 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-46378?
Check the references section above for vendor advisories and patch information. Affected products include: Weston-Embedded Uc-Ftps.