CVE-2024-22257

CVSS 3.1 Score 8.2 of 10 (high)

Details

Published Mar 18, 2024

Summary

CVE-2024-22257 is a vulnerability in Spring Security versions 5.7.x to 5.7.12, 5.8.x to 5.8.11, 6.0.x to 6.0.9, 6.1.x to 6.1.8, and 6.2.x to 6.2.3 that can lead to broken access control if the AuthenticatedVoter#vote function is used with a null Authentication parameter. This vulnerability has a base severity rating of HIGH and a base score of 8.2 according to CVSS version 3.1 standards, indicating its significant potential danger to organizations affected by it. The exploitability score is rated at 3.9, with privileges required being NONE and no user interaction necessary for exploitation, while the attack vector is through the network and the confidentiality impact is HIGH but integrity impact is LOW. To remediate this vulnerability, it is recommended to update Spring Security to versions 5.7.12/5/8/11, 6/0/9, 6/1/8 or later versions in order to mitigate the risk of unauthorized access and potential data breaches resulting from broken access controls within applications using this library.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2024-22257 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions