Vulnerability Details CVE-2022-25762
If a web application sends a WebSocket message concurrently with the WebSocket connection closing when running on Apache Tomcat 8.5.0 to 8.5.75 or Apache Tomcat 9.0.0.M1 to 9.0.20, it is possible that the application will continue to use the socket after it has been closed. The error handling triggered in this case could cause the a pooled object to be placed in the pool twice. This could result in subsequent connections using the same object concurrently which could result in data being returned to the wrong use and/or other errors.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 34.0%
CVSS Severity
CVSS v3 Score 8.6
CVSS v2 Score 7.5
Products affected by CVE-2022-25762
-
cpe:2.3:a:apache:tomcat:8.5.0
-
cpe:2.3:a:apache:tomcat:8.5.1
-
cpe:2.3:a:apache:tomcat:8.5.10
-
cpe:2.3:a:apache:tomcat:8.5.11
-
cpe:2.3:a:apache:tomcat:8.5.12
-
cpe:2.3:a:apache:tomcat:8.5.13
-
cpe:2.3:a:apache:tomcat:8.5.14
-
cpe:2.3:a:apache:tomcat:8.5.15
-
cpe:2.3:a:apache:tomcat:8.5.16
-
cpe:2.3:a:apache:tomcat:8.5.17
-
cpe:2.3:a:apache:tomcat:8.5.18
-
cpe:2.3:a:apache:tomcat:8.5.19
-
cpe:2.3:a:apache:tomcat:8.5.2
-
cpe:2.3:a:apache:tomcat:8.5.20
-
cpe:2.3:a:apache:tomcat:8.5.21
-
cpe:2.3:a:apache:tomcat:8.5.22
-
cpe:2.3:a:apache:tomcat:8.5.23
-
cpe:2.3:a:apache:tomcat:8.5.24
-
cpe:2.3:a:apache:tomcat:8.5.25
-
cpe:2.3:a:apache:tomcat:8.5.26
-
cpe:2.3:a:apache:tomcat:8.5.27
-
cpe:2.3:a:apache:tomcat:8.5.28
-
cpe:2.3:a:apache:tomcat:8.5.29
-
cpe:2.3:a:apache:tomcat:8.5.3
-
cpe:2.3:a:apache:tomcat:8.5.30
-
cpe:2.3:a:apache:tomcat:8.5.31
-
cpe:2.3:a:apache:tomcat:8.5.32
-
cpe:2.3:a:apache:tomcat:8.5.33
-
cpe:2.3:a:apache:tomcat:8.5.34
-
cpe:2.3:a:apache:tomcat:8.5.35
-
cpe:2.3:a:apache:tomcat:8.5.36
-
cpe:2.3:a:apache:tomcat:8.5.37
-
cpe:2.3:a:apache:tomcat:8.5.38
-
cpe:2.3:a:apache:tomcat:8.5.39
-
cpe:2.3:a:apache:tomcat:8.5.4
-
cpe:2.3:a:apache:tomcat:8.5.40
-
cpe:2.3:a:apache:tomcat:8.5.41
-
cpe:2.3:a:apache:tomcat:8.5.42
-
cpe:2.3:a:apache:tomcat:8.5.43
-
cpe:2.3:a:apache:tomcat:8.5.44
-
cpe:2.3:a:apache:tomcat:8.5.45
-
cpe:2.3:a:apache:tomcat:8.5.46
-
cpe:2.3:a:apache:tomcat:8.5.47
-
cpe:2.3:a:apache:tomcat:8.5.48
-
cpe:2.3:a:apache:tomcat:8.5.49
-
cpe:2.3:a:apache:tomcat:8.5.5
-
cpe:2.3:a:apache:tomcat:8.5.50
-
cpe:2.3:a:apache:tomcat:8.5.51
-
cpe:2.3:a:apache:tomcat:8.5.52
-
cpe:2.3:a:apache:tomcat:8.5.53
-
cpe:2.3:a:apache:tomcat:8.5.54
-
cpe:2.3:a:apache:tomcat:8.5.55
-
cpe:2.3:a:apache:tomcat:8.5.56
-
cpe:2.3:a:apache:tomcat:8.5.57
-
cpe:2.3:a:apache:tomcat:8.5.58
-
cpe:2.3:a:apache:tomcat:8.5.59
-
cpe:2.3:a:apache:tomcat:8.5.6
-
cpe:2.3:a:apache:tomcat:8.5.60
-
cpe:2.3:a:apache:tomcat:8.5.61
-
cpe:2.3:a:apache:tomcat:8.5.62
-
cpe:2.3:a:apache:tomcat:8.5.63
-
cpe:2.3:a:apache:tomcat:8.5.64
-
cpe:2.3:a:apache:tomcat:8.5.65
-
cpe:2.3:a:apache:tomcat:8.5.66
-
cpe:2.3:a:apache:tomcat:8.5.67
-
cpe:2.3:a:apache:tomcat:8.5.68
-
cpe:2.3:a:apache:tomcat:8.5.69
-
cpe:2.3:a:apache:tomcat:8.5.7
-
cpe:2.3:a:apache:tomcat:8.5.70
-
cpe:2.3:a:apache:tomcat:8.5.71
-
cpe:2.3:a:apache:tomcat:8.5.72
-
cpe:2.3:a:apache:tomcat:8.5.73
-
cpe:2.3:a:apache:tomcat:8.5.74
-
cpe:2.3:a:apache:tomcat:8.5.75
-
cpe:2.3:a:apache:tomcat:8.5.8
-
cpe:2.3:a:apache:tomcat:8.5.9
-
cpe:2.3:a:apache:tomcat:9.0.0
-
cpe:2.3:a:apache:tomcat:9.0.1
-
cpe:2.3:a:apache:tomcat:9.0.10
-
cpe:2.3:a:apache:tomcat:9.0.11
-
cpe:2.3:a:apache:tomcat:9.0.12
-
cpe:2.3:a:apache:tomcat:9.0.13
-
cpe:2.3:a:apache:tomcat:9.0.14
-
cpe:2.3:a:apache:tomcat:9.0.15
-
cpe:2.3:a:apache:tomcat:9.0.16
-
cpe:2.3:a:apache:tomcat:9.0.17
-
cpe:2.3:a:apache:tomcat:9.0.18
-
cpe:2.3:a:apache:tomcat:9.0.19
-
cpe:2.3:a:apache:tomcat:9.0.2
-
cpe:2.3:a:apache:tomcat:9.0.20
-
cpe:2.3:a:apache:tomcat:9.0.3
-
cpe:2.3:a:apache:tomcat:9.0.4
-
cpe:2.3:a:apache:tomcat:9.0.5
-
cpe:2.3:a:apache:tomcat:9.0.6
-
cpe:2.3:a:apache:tomcat:9.0.7
-
cpe:2.3:a:apache:tomcat:9.0.8
-
cpe:2.3:a:apache:tomcat:9.0.9
-
cpe:2.3:a:oracle:agile_plm:9.3.6