Vulnerability Details CVE-2022-2764
A flaw was found in Undertow. Denial of service can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 28.7%
CVSS Severity
CVSS v3 Score 4.9
Products affected by CVE-2022-2764
-
cpe:2.3:a:netapp:active_iq_unified_manager:-
-
cpe:2.3:a:netapp:cloud_secure_agent:-
-
cpe:2.3:a:netapp:oncommand_insight:-
-
cpe:2.3:a:netapp:oncommand_workflow_automation:-
-
cpe:2.3:a:redhat:integration_camel_k:-
-
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0
-
cpe:2.3:a:redhat:jboss_fuse:7.0.0
-
cpe:2.3:a:redhat:single_sign-on:7.0
-
cpe:2.3:a:redhat:undertow:2.0.0
-
cpe:2.3:a:redhat:undertow:2.0.1
-
cpe:2.3:a:redhat:undertow:2.0.10
-
cpe:2.3:a:redhat:undertow:2.0.11
-
cpe:2.3:a:redhat:undertow:2.0.12
-
cpe:2.3:a:redhat:undertow:2.0.13
-
cpe:2.3:a:redhat:undertow:2.0.14
-
cpe:2.3:a:redhat:undertow:2.0.15
-
cpe:2.3:a:redhat:undertow:2.0.16
-
cpe:2.3:a:redhat:undertow:2.0.17
-
cpe:2.3:a:redhat:undertow:2.0.18
-
cpe:2.3:a:redhat:undertow:2.0.19
-
cpe:2.3:a:redhat:undertow:2.0.2
-
cpe:2.3:a:redhat:undertow:2.0.20
-
cpe:2.3:a:redhat:undertow:2.0.21
-
cpe:2.3:a:redhat:undertow:2.0.22
-
cpe:2.3:a:redhat:undertow:2.0.23
-
cpe:2.3:a:redhat:undertow:2.0.24
-
cpe:2.3:a:redhat:undertow:2.0.25
-
cpe:2.3:a:redhat:undertow:2.0.26
-
cpe:2.3:a:redhat:undertow:2.0.27
-
cpe:2.3:a:redhat:undertow:2.0.28
-
cpe:2.3:a:redhat:undertow:2.0.29
-
cpe:2.3:a:redhat:undertow:2.0.3
-
cpe:2.3:a:redhat:undertow:2.0.30
-
cpe:2.3:a:redhat:undertow:2.0.31
-
cpe:2.3:a:redhat:undertow:2.0.32
-
cpe:2.3:a:redhat:undertow:2.0.33
-
cpe:2.3:a:redhat:undertow:2.0.34
-
cpe:2.3:a:redhat:undertow:2.0.35
-
cpe:2.3:a:redhat:undertow:2.0.36
-
cpe:2.3:a:redhat:undertow:2.0.39
-
cpe:2.3:a:redhat:undertow:2.0.4
-
cpe:2.3:a:redhat:undertow:2.0.5
-
cpe:2.3:a:redhat:undertow:2.0.6
-
cpe:2.3:a:redhat:undertow:2.0.7
-
cpe:2.3:a:redhat:undertow:2.0.8
-
cpe:2.3:a:redhat:undertow:2.0.9
-
cpe:2.3:a:redhat:undertow:2.1.0
-
cpe:2.3:a:redhat:undertow:2.1.1
-
cpe:2.3:a:redhat:undertow:2.1.2
-
cpe:2.3:a:redhat:undertow:2.1.3
-
cpe:2.3:a:redhat:undertow:2.1.4
-
cpe:2.3:a:redhat:undertow:2.1.5
-
cpe:2.3:a:redhat:undertow:2.1.6
-
cpe:2.3:a:redhat:undertow:2.1.7
-
cpe:2.3:a:redhat:undertow:2.2.0
-
cpe:2.3:a:redhat:undertow:2.2.1
-
cpe:2.3:a:redhat:undertow:2.2.10
-
cpe:2.3:a:redhat:undertow:2.2.11
-
cpe:2.3:a:redhat:undertow:2.2.12
-
cpe:2.3:a:redhat:undertow:2.2.13
-
cpe:2.3:a:redhat:undertow:2.2.14
-
cpe:2.3:a:redhat:undertow:2.2.15
-
cpe:2.3:a:redhat:undertow:2.2.16
-
cpe:2.3:a:redhat:undertow:2.2.17
-
cpe:2.3:a:redhat:undertow:2.2.18
-
cpe:2.3:a:redhat:undertow:2.2.19
-
cpe:2.3:a:redhat:undertow:2.2.2
-
cpe:2.3:a:redhat:undertow:2.2.3
-
cpe:2.3:a:redhat:undertow:2.2.4
-
cpe:2.3:a:redhat:undertow:2.2.5
-
cpe:2.3:a:redhat:undertow:2.2.6
-
cpe:2.3:a:redhat:undertow:2.2.7
-
cpe:2.3:a:redhat:undertow:2.2.9
-
cpe:2.3:a:redhat:undertow:2.3.0