CVSS 3.1 Score 8.2 of 10 (high)


Published Mar 18, 2024


CVE-2024-22257 is a vulnerability in Spring Security versions 5.7.x to 5.7.12, 5.8.x to 5.8.11, 6.0.x to 6.0.9, 6.1.x to 6.1.8, and 6.2.x to 6.2.3 that can lead to broken access control if the AuthenticatedVoter#vote function is used with a null Authentication parameter. This vulnerability has a base severity rating of HIGH and a base score of 8.2 according to CVSS version 3.1 standards, indicating its significant potential danger to organizations affected by it. The exploitability score is rated at 3.9, with privileges required being NONE and no user interaction necessary for exploitation, while the attack vector is through the network and the confidentiality impact is HIGH but integrity impact is LOW. To remediate this vulnerability, it is recommended to update Spring Security to versions 5.7.12/5/8/11, 6/0/9, 6/1/8 or later versions in order to mitigate the risk of unauthorized access and potential data breaches resulting from broken access controls within applications using this library.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2024-22257 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options