CVE-2022-46764
Critical
|9.8No Exploit
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows attackers to run any SQL commands on the TrueConf Server, which can lead to them taking control of the server remotely. The attacker does not need to be logged in or authenticated, making it particularly dangerous for anyone using the affected version of the software.
Technical Description
A SQL injection issue in the web API in TrueConf Server 5.2.0.10225 (fixed in 5.2.6.10025) allows remote unauthenticated attackers to execute arbitrary SQL commands, ultimately leading to remote code execution.
CVSS Vector Analysis
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$13,000($5K-$15K)
Vendor Response
Grade FPatched in 1158 days
Quick Information
Published
Dec 27, 2022
over 3 years ago
Last Modified
Feb 27, 2026
about 1 month ago
Vendor
trueconf
Product
server