Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2022-28880 : What You Need to Know

CVE-2022-28880 poses a medium risk Denial-of-Service vulnerability in F-Secure Atlant and WithSecure products, allowing remote attackers to crash scanning engines. Learn about impact, mitigation, and patch details.

A Denial-of-Service vulnerability was discovered in the F-Secure Atlant and certain WithSecure products that can crash the scanning engine when scanning fuzzed PE32-bit files, allowing remote exploit by an attacker.

Understanding CVE-2022-28880

This CVE involves a Denial-of-Service vulnerability affecting certain F-Secure and WithSecure products.

What is CVE-2022-28880?

CVE-2022-28880 is a Denial-of-Service vulnerability discovered in the F-Secure Atlant and specific WithSecure products. It allows attackers to remotely crash the scanning engine by exploiting certain file types.

The Impact of CVE-2022-28880

With a CVSS base score of 4.3, this vulnerability poses a medium severity risk. It requires high privileges for exploitation and user interaction is also necessary. The confidentiality, integrity, and availability of affected systems are all at risk.

Technical Details of CVE-2022-28880

This section covers the specifics of the vulnerability.

Vulnerability Description

The vulnerability arises from scanning fuzzed PE32-bit files in F-Secure Atlant and other specific WithSecure products, leading to a scanning engine crash when exploited remotely.

Affected Systems and Versions

All F-Secure and WithSecure Endpoint Protection products for Mac, F-Secure Linux Security, F-Secure Atlant, F-Secure Internet Gatekeeper, WithSecure Cloud Protection for Salesforce, and WithSecure Collaboration Protection are impacted with all versions affected.

Exploitation Mechanism

Attackers can trigger the exploit remotely, requiring high privileges and user interaction for successful exploitation.

Mitigation and Prevention

To address CVE-2022-28880, users should take immediate steps and follow long-term security practices.

Immediate Steps to Take

No user action is currently required as the fix has been automatically deployed through the Capricorn database since July 29, 2022.

Long-Term Security Practices

Users are advised to stay updated on security patches and maintain a proactive approach to cybersecurity.

Patching and Updates

Regularly apply security updates provided by F-Secure and ensure systems are up to date to prevent exploitation of this vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now