Learn about CVE-2022-27892 found in Palantir Gotham, allowing attackers to exhaust memory through an unauthenticated endpoint. Mitigation steps and patching details included.
This article provides detailed information about CVE-2022-27892, a security vulnerability found in Palantir Gotham versions prior to 3.22.11.2. The vulnerability allowed an attacker to exhaust the memory of the Gotham dispatch service through an unauthenticated endpoint.
Understanding CVE-2022-27892
In this section, we will discuss what CVE-2022-27892 entails, its impact, technical details, and mitigation strategies.
What is CVE-2022-27892?
CVE-2022-27892 is a vulnerability in Palantir Gotham versions prior to 3.22.11.2, where an unauthenticated endpoint could be exploited by an attacker to exhaust the memory of the Gotham dispatch service, causing a denial of service.
The Impact of CVE-2022-27892
The impact of this vulnerability is rated as medium with a CVSS base score of 5.3. While it requires no privileges for exploitation, it could lead to a denial-of-service condition affecting the availability of the Gotham dispatch service.
Technical Details of CVE-2022-27892
Let's delve into the technical aspects of CVE-2022-27892, including the vulnerability description, affected systems and versions, and exploitation mechanism.
Vulnerability Description
The vulnerability stemmed from an unauthenticated endpoint in Palantir Gotham that allowed attackers to send arbitrary sized payloads, leading to memory exhaustion within the Gotham dispatch service.
Affected Systems and Versions
Palantir Gotham versions prior to 3.22.11.2 are affected by this vulnerability. Users with versions less than 3.22.11.2 are advised to update their systems immediately.
Exploitation Mechanism
Attackers could exploit the unauthenticated endpoint in Palantir Gotham to send large payloads, consuming excessive memory resources and causing a denial of service.
Mitigation and Prevention
To mitigate the risks associated with CVE-2022-27892, users should follow immediate steps to secure their systems and adopt long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Palantir has released version 3.22.11.2 to address CVE-2022-27892. Users are strongly advised to update their systems to the latest version to protect against this vulnerability.