First published: Tue Aug 23 2022(Updated: )
A Denial-of-Service (DoS) vulnerability was discovered in F-Secure & WithSecure products whereby the aerdl unpack function crashes. This can lead to a possible scanning engine crash. The exploit can be triggered remotely by an attacker.
Credit: cve-notifications-us@f-secure.com
Affected Software | Affected Version | How to fix |
---|---|---|
F-secure Elements Endpoint Protection | ||
Apple macOS | ||
Microsoft Windows | ||
F-Secure Atlant | ||
F-secure Cloud Protection For Salesforce | ||
F-secure Elements Collaboration Protection | ||
F-secure Internet Gatekeeper | ||
F-Secure Linux Security | ||
F-secure Linux Security 64 |
FIX No User action is required. The required fix has been published through automatic update channel with Capricorn database on 2022-08-10_06
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Denial-of-Service (DoS) vulnerability is CVE-2022-28883.
The severity of CVE-2022-28883 is high with a severity value of 7.5.
The F-Secure & WithSecure products affected by CVE-2022-28883 include F-Secure Elements Endpoint Protection, F-Secure Atlant, F-Secure Cloud Protection For Salesforce, F-Secure Elements Collaboration Protection, F-Secure Internet Gatekeeper, F-Secure Linux Security, and F-Secure Linux Security 64.
The exploit for CVE-2022-28883 can be triggered remotely by an attacker.
No, Apple macOS and Microsoft Windows are not affected by CVE-2022-28883.
You can find more information about CVE-2022-28883 at the following reference: [CVE-2022-28883](https://www.withsecure.com/en/support/security-advisories).