Show plain JSON{"containers": {"cna": {"affected": [{"product": "Linux/Android Bluetooth Mesh SDK", "vendor": "Realtek", "versions": [{"lessThanOrEqual": "4.17-4.17-20220127", "status": "affected", "version": "unspecified", "versionType": "custom"}]}], "datePublic": "2022-08-30T00:00:00", "descriptions": [{"lang": "en", "value": "Realtek Linux/Android Bluetooth Mesh SDK has a buffer overflow vulnerability due to insufficient validation for the length of segmented packets\u2019 shift parameter. An unauthenticated attacker in the adjacent network can exploit this vulnerability to cause buffer overflow and disrupt service."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-120", "description": "CWE-120 Buffer Overflow", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2022-08-30T04:25:25", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://www.twcert.org.tw/tw/cp-132-6458-5052f-1.html"}], "solutions": [{"lang": "en", "value": "Realtek Linux/Android Bluetooth Mesh SDK v4.18-4.18-20220218"}], "source": {"advisory": "TVN-202205003", "discovery": "EXTERNAL"}, "title": "Realtek Linux/Android Bluetooth Mesh SDK - Buffer Overflow", "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"AKA": "TWCERT/CC", "ASSIGNER": "cve@cert.org.tw", "DATE_PUBLIC": "2022-08-30T04:02:00.000Z", "ID": "CVE-2022-26528", "STATE": "PUBLIC", "TITLE": "Realtek Linux/Android Bluetooth Mesh SDK - Buffer Overflow"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Linux/Android Bluetooth Mesh SDK", "version": {"version_data": [{"version_affected": "<=", "version_value": "4.17-4.17-20220127"}]}}]}, "vendor_name": "Realtek"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "Realtek Linux/Android Bluetooth Mesh SDK has a buffer overflow vulnerability due to insufficient validation for the length of segmented packets\u2019 shift parameter. An unauthenticated attacker in the adjacent network can exploit this vulnerability to cause buffer overflow and disrupt service."}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "impact": {"cvss": {"attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-120 Buffer Overflow"}]}]}, "references": {"reference_data": [{"name": "https://www.twcert.org.tw/tw/cp-132-6458-5052f-1.html", "refsource": "MISC", "url": "https://www.twcert.org.tw/tw/cp-132-6458-5052f-1.html"}]}, "solution": [{"lang": "en", "value": "Realtek Linux/Android Bluetooth Mesh SDK v4.18-4.18-20220218"}], "source": {"advisory": "TVN-202205003", "discovery": "EXTERNAL"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-03T05:03:32.961Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://www.twcert.org.tw/tw/cp-132-6458-5052f-1.html"}]}]}, "cveMetadata": {"assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2022-26528", "datePublished": "2022-08-30T04:25:25.740110Z", "dateReserved": "2022-03-07T00:00:00", "dateUpdated": "2024-09-16T20:27:50.200Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}