Vulnerability Name:

CVE-2022-21673 (CCN-217800)

Assigned:2021-11-16
Published:2022-01-18
Updated:2023-07-24
Summary:
CVSS v3 Severity:4.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)
3.8 Low (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
4.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)
3.8 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
4.3 Medium (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)
3.8 Low (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:3.5 Low (CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2022-21673

Source: XF
Type: UNKNOWN
grafana-cve202221673-info-disc(217800)

Source: security-advisories@github.com
Type: Release Notes, Third Party Advisory
security-advisories@github.com

Source: security-advisories@github.com
Type: Release Notes, Third Party Advisory
security-advisories@github.com

Source: CCN
Type: Grafana GIT Repository
Forward OAuth Identity Token can allow users to access some data sources

Source: security-advisories@github.com
Type: Third Party Advisory
security-advisories@github.com

Source: CCN
Type: Grafana Web site
Grafana

Source: security-advisories@github.com
Type: Mailing List, Third Party Advisory
security-advisories@github.com

Source: security-advisories@github.com
Type: Mailing List, Third Party Advisory
security-advisories@github.com

Source: security-advisories@github.com
Type: Mailing List, Third Party Advisory
security-advisories@github.com

Source: security-advisories@github.com
Type: Third Party Advisory
security-advisories@github.com

Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:grafana:grafana:5.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:grafana:grafana:5.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:grafana:grafana:4.6.3:*:*:*:*:*:*:*
  • OR cpe:/a:grafana:grafana:3.0:beta1:*:*:enterprise:*:*:*
  • OR cpe:/a:grafana:grafana:5.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:grafana:grafana:5.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:grafana:grafana:6.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:grafana:grafana:6.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:grafana:grafana:6.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:grafana:grafana:5.4.0:-:*:*:*:*:*:*
  • OR cpe:/a:grafana:grafana:6.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:grafana:grafana:6.7.3:*:*:*:*:*:*:*
  • OR cpe:/a:grafana:grafana:7.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:grafana:grafana:5.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:grafana:grafana:6.4.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.redhat.rhsa:def:20228057
    P
    RHSA-2022:8057: grafana security, bug fix, and enhancement update (Important)
    2022-11-15
    oval:com.redhat.rhsa:def:20227519
    P
    RHSA-2022:7519: grafana security, bug fix, and enhancement update (Moderate)
    2022-11-08
    oval:org.opensuse.security:def:127300
    P
    Security update for SUSE Manager Client Tools (Important)
    2022-06-20
    oval:org.opensuse.security:def:6077
    P
    Security update for SUSE Manager Client Tools (Important)
    2022-06-20
    oval:org.opensuse.security:def:125737
    P
    Security update for SUSE Manager Client Tools (Important)
    2022-06-20
    oval:org.opensuse.security:def:126903
    P
    Security update for SUSE Manager Client Tools (Important)
    2022-06-20
    oval:org.opensuse.security:def:102173
    P
    Security update for SUSE Manager Client Tools (Moderate)
    2022-04-25
    BACK
    grafana grafana 5.1.3
    grafana grafana 5.2.2
    grafana grafana 4.6.3
    grafana grafana 3.0 beta1
    grafana grafana 5.3.2
    grafana grafana 5.2.4
    grafana grafana 6.2.4
    grafana grafana 6.3.2
    grafana grafana 6.3.3
    grafana grafana 5.4.0 -
    grafana grafana 6.3.6
    grafana grafana 6.7.3
    grafana grafana 7.0.1
    grafana grafana 5.3.1
    grafana grafana 6.4.3