First published: Mon Aug 15 2022(Updated: )
OctoPrint 1.7.3 and prior does not have rate limiting on the login page, making it possible for attackers to attempt brute force attacks. The severity of this issue is limited by OctoPrint normally running in a restricted LAN. The `devel` and `maintenance` branches of the repository have a fix that limits the rate of failed login attempts.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
pip/OctoPrint | <=1.7.3 | |
Octoprint Octoprint | <1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-2822.
The severity of CVE-2022-2822 is high with a CVSS score of 7.5.
The affected software is OctoPrint versions up to and including 1.7.3 and OctoPrint versions up to and excluding 1.9.0.
The impact of CVE-2022-2822 is that an attacker can freely brute force username and password and can take over any account.
Yes, the fix for CVE-2022-2822 is available in the `devel` and `maintenance` branches of the OctoPrint repository.