Show plain JSON{"id": "CVE-2022-23001", "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "psirt@wdc.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 5.3, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "LOW", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 1.4, "exploitabilityScore": 3.9}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 5.3, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "LOW", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 1.4, "exploitabilityScore": 3.9}]}, "published": "2022-07-29T19:15:08.123", "references": [{"url": "https://www.westerndigital.com/support/product-security/wdc-22013-sweet-b-incorrect-output-vulnerabilities", "tags": ["Product", "Vendor Advisory"], "source": "psirt@wdc.com"}, {"url": "https://www.westerndigital.com/support/product-security/wdc-22013-sweet-b-incorrect-output-vulnerabilities", "tags": ["Product", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "psirt@wdc.com", "description": [{"lang": "en", "value": "CWE-682"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-682"}]}], "descriptions": [{"lang": "en", "value": "When compressing or decompressing elliptic curve points using the Sweet B library, an incorrect choice of sign bit is used. An attacker with user level privileges and no other user's assistance can exploit this vulnerability with only knowledge of the public key and the library. The resulting output may cause an error when used in other operations; for instance, verification of a valid signature under a decompressed public key may fail. This may be leveraged by an attacker to cause an error scenario in applications which use the library, resulting in a limited denial of service for an individual user. The scope of impact cannot extend to other components."}, {"lang": "es", "value": "Cuando son comprimidos o descomprimidos puntos de curvas el\u00edpticas usando la biblioteca Sweet B, es usada una elecci\u00f3n incorrecta del bit de signo. Un atacante con privilegios de nivel de usuario y sin ayuda de otros usuarios puede explotar esta vulnerabilidad con s\u00f3lo conocer la clave p\u00fablica y la biblioteca. La salida resultante puede causar un error cuando es usada en otras operaciones; por ejemplo, la verificaci\u00f3n de una firma v\u00e1lida bajo una clave p\u00fablica descomprimida puede fallar. Esto puede ser aprovechado por un atacante para causar un escenario de error en las aplicaciones que usan la biblioteca, resultando en una denegaci\u00f3n de servicio limitada para un usuario individual. El alcance del impacto no puede extenderse a otros componentes"}], "lastModified": "2024-11-21T06:47:46.850", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:westerndigital:sweet_b:1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BD0868BB-4143-41EC-9A15-C16C98EF851C"}], "operator": "OR"}]}], "sourceIdentifier": "psirt@wdc.com"}