CVE-2022-22988

Critical
|9.1
Exploit Available

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker with authenticated access to a device to potentially modify or access sensitive files and directories. However, the attacker must first find a way to log in to the device before they can exploit this weakness.

Technical Description

File and directory permissions have been corrected to prevent unintended users from modifying or accessing resources. It would be more difficult for an authenticated attacker to now traverse through the files and directories. This can only be exploited once an attacker has already found a way to get authenticated access to the device.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$6,000($5K-$15K)
Vendor Response
Grade FPatched in 1502 days

Quick Information

Published

Jan 13, 2022

about 4 years ago

Last Modified

Feb 24, 2026

about 1 month ago

Vendor

westerndigital

Product

edgerover