CVSS 3.1 Score 7.8 of 10 (high)


Published Feb 5, 2024
Updated: Feb 23, 2024
CWE ID 787


CVE-2024-22667 is a stack-based buffer overflow vulnerability found in Vim before version 9.0.2142. This vulnerability affects various products, including kPHicW, pqRTJN, WJ2fHZ, and many others. The vulnerability occurs when the function did_set_langmap in map.c uses sprintf to write to the error buffer passed down to the option callback functions. The base severity of this vulnerability is rated as HIGH with a base score of 7.8 according to [email protected]. It requires low privileges and user interaction is not required for exploitation. The attack vector is local, and it has a high impact on integrity and confidentiality. The exploitability score is 1.8 out of 10, indicating that it is relatively easy to exploit. Organizations should apply the necessary updates or patches provided by Vim to remediate this vulnerability as it poses a potential danger to their systems and data security.

Leverage our Vulnerability Intelligence module to secure your systems now - get detailed insights on CVE-2024-37364. Book your demo today.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2024-22667 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options