CVE-2022-28880 poses a medium risk Denial-of-Service vulnerability in F-Secure Atlant and WithSecure products, allowing remote attackers to crash scanning engines. Learn about impact, mitigation, and patch details.
A Denial-of-Service vulnerability was discovered in the F-Secure Atlant and certain WithSecure products that can crash the scanning engine when scanning fuzzed PE32-bit files, allowing remote exploit by an attacker.
Understanding CVE-2022-28880
This CVE involves a Denial-of-Service vulnerability affecting certain F-Secure and WithSecure products.
What is CVE-2022-28880?
CVE-2022-28880 is a Denial-of-Service vulnerability discovered in the F-Secure Atlant and specific WithSecure products. It allows attackers to remotely crash the scanning engine by exploiting certain file types.
The Impact of CVE-2022-28880
With a CVSS base score of 4.3, this vulnerability poses a medium severity risk. It requires high privileges for exploitation and user interaction is also necessary. The confidentiality, integrity, and availability of affected systems are all at risk.
Technical Details of CVE-2022-28880
This section covers the specifics of the vulnerability.
Vulnerability Description
The vulnerability arises from scanning fuzzed PE32-bit files in F-Secure Atlant and other specific WithSecure products, leading to a scanning engine crash when exploited remotely.
Affected Systems and Versions
All F-Secure and WithSecure Endpoint Protection products for Mac, F-Secure Linux Security, F-Secure Atlant, F-Secure Internet Gatekeeper, WithSecure Cloud Protection for Salesforce, and WithSecure Collaboration Protection are impacted with all versions affected.
Exploitation Mechanism
Attackers can trigger the exploit remotely, requiring high privileges and user interaction for successful exploitation.
Mitigation and Prevention
To address CVE-2022-28880, users should take immediate steps and follow long-term security practices.
Immediate Steps to Take
No user action is currently required as the fix has been automatically deployed through the Capricorn database since July 29, 2022.
Long-Term Security Practices
Users are advised to stay updated on security patches and maintain a proactive approach to cybersecurity.
Patching and Updates
Regularly apply security updates provided by F-Secure and ensure systems are up to date to prevent exploitation of this vulnerability.