Show plain JSON{"containers": {"cna": {"affected": [{"product": "Linux/Android Bluetooth Mesh SDK", "vendor": "Realtek", "versions": [{"lessThanOrEqual": "4.17-4.17-20220127", "status": "affected", "version": "unspecified", "versionType": "custom"}]}], "datePublic": "2022-08-30T00:00:00", "descriptions": [{"lang": "en", "value": "Realtek Linux/Android Bluetooth Mesh SDK has a buffer overflow vulnerability due to insufficient validation for the size of segmented packets\u2019 reference parameter. An unauthenticated attacker in the adjacent network can exploit this vulnerability to cause buffer overflow and disrupt service."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-120", "description": "CWE-120 Buffer Overflow", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2022-08-30T04:25:24", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://www.twcert.org.tw/tw/cp-132-6457-66bc9-1.html"}], "solutions": [{"lang": "en", "value": "Realtek Linux/Android Bluetooth Mesh SDK v4.18-4.18-20220218"}], "source": {"advisory": "TVN-202205002", "discovery": "EXTERNAL"}, "title": "Realtek Linux/Android Bluetooth Mesh SDK - Buffer Overflow", "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"AKA": "TWCERT/CC", "ASSIGNER": "cve@cert.org.tw", "DATE_PUBLIC": "2022-08-30T04:01:00.000Z", "ID": "CVE-2022-26527", "STATE": "PUBLIC", "TITLE": "Realtek Linux/Android Bluetooth Mesh SDK - Buffer Overflow"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Linux/Android Bluetooth Mesh SDK", "version": {"version_data": [{"version_affected": "<=", "version_value": "4.17-4.17-20220127"}]}}]}, "vendor_name": "Realtek"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "Realtek Linux/Android Bluetooth Mesh SDK has a buffer overflow vulnerability due to insufficient validation for the size of segmented packets\u2019 reference parameter. An unauthenticated attacker in the adjacent network can exploit this vulnerability to cause buffer overflow and disrupt service."}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "impact": {"cvss": {"attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-120 Buffer Overflow"}]}]}, "references": {"reference_data": [{"name": "https://www.twcert.org.tw/tw/cp-132-6457-66bc9-1.html", "refsource": "MISC", "url": "https://www.twcert.org.tw/tw/cp-132-6457-66bc9-1.html"}]}, "solution": [{"lang": "en", "value": "Realtek Linux/Android Bluetooth Mesh SDK v4.18-4.18-20220218"}], "source": {"advisory": "TVN-202205002", "discovery": "EXTERNAL"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-03T05:03:32.765Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://www.twcert.org.tw/tw/cp-132-6457-66bc9-1.html"}]}]}, "cveMetadata": {"assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2022-26527", "datePublished": "2022-08-30T04:25:24.948684Z", "dateReserved": "2022-03-07T00:00:00", "dateUpdated": "2024-09-16T17:02:52.276Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}