Vulnerability Details CVE-2022-29077
A heap-based buffer overflow exists in rippled before 1.8.5. The vulnerability allows attackers to cause a crash or execute commands remotely on a rippled node, which may lead to XRPL mainnet DoS or compromise. This exposes all digital assets on the XRPL to a security threat.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.009
EPSS Ranking 75.0%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2022-29077
-
cpe:2.3:a:ripple:rippled:-
-
cpe:2.3:a:ripple:rippled:0.12.0
-
cpe:2.3:a:ripple:rippled:0.14.0
-
cpe:2.3:a:ripple:rippled:0.15.0
-
cpe:2.3:a:ripple:rippled:0.16.0
-
cpe:2.3:a:ripple:rippled:0.17.0
-
cpe:2.3:a:ripple:rippled:0.18.0
-
cpe:2.3:a:ripple:rippled:0.19.0
-
cpe:2.3:a:ripple:rippled:0.19.1
-
cpe:2.3:a:ripple:rippled:0.19.2
-
cpe:2.3:a:ripple:rippled:0.20.0
-
cpe:2.3:a:ripple:rippled:0.20.1
-
cpe:2.3:a:ripple:rippled:0.21.0
-
cpe:2.3:a:ripple:rippled:0.22.0
-
cpe:2.3:a:ripple:rippled:0.23.0
-
cpe:2.3:a:ripple:rippled:0.24.0
-
cpe:2.3:a:ripple:rippled:0.25.0
-
cpe:2.3:a:ripple:rippled:0.25.1
-
cpe:2.3:a:ripple:rippled:0.25.2
-
cpe:2.3:a:ripple:rippled:0.26.0
-
cpe:2.3:a:ripple:rippled:0.26.1
-
cpe:2.3:a:ripple:rippled:0.26.2
-
cpe:2.3:a:ripple:rippled:0.26.4
-
cpe:2.3:a:ripple:rippled:0.27.0
-
cpe:2.3:a:ripple:rippled:0.27.1
-
cpe:2.3:a:ripple:rippled:0.27.2
-
cpe:2.3:a:ripple:rippled:0.27.3
-
cpe:2.3:a:ripple:rippled:0.27.4
-
cpe:2.3:a:ripple:rippled:0.28.0
-
cpe:2.3:a:ripple:rippled:0.28.1
-
cpe:2.3:a:ripple:rippled:0.28.2
-
cpe:2.3:a:ripple:rippled:0.29.0
-
cpe:2.3:a:ripple:rippled:0.30.0
-
cpe:2.3:a:ripple:rippled:0.30.1
-
cpe:2.3:a:ripple:rippled:0.31.0
-
cpe:2.3:a:ripple:rippled:0.31.2
-
cpe:2.3:a:ripple:rippled:0.32.0
-
cpe:2.3:a:ripple:rippled:0.32.1
-
cpe:2.3:a:ripple:rippled:0.33.0
-
cpe:2.3:a:ripple:rippled:0.40.0
-
cpe:2.3:a:ripple:rippled:0.40.1
-
cpe:2.3:a:ripple:rippled:0.50.0
-
cpe:2.3:a:ripple:rippled:0.50.2
-
cpe:2.3:a:ripple:rippled:0.50.3
-
cpe:2.3:a:ripple:rippled:0.60.0
-
cpe:2.3:a:ripple:rippled:0.60.1
-
cpe:2.3:a:ripple:rippled:0.60.2
-
cpe:2.3:a:ripple:rippled:0.60.3
-
cpe:2.3:a:ripple:rippled:0.70.0
-
cpe:2.3:a:ripple:rippled:0.70.1
-
cpe:2.3:a:ripple:rippled:0.70.2
-
cpe:2.3:a:ripple:rippled:0.80.0
-
cpe:2.3:a:ripple:rippled:0.80.1
-
cpe:2.3:a:ripple:rippled:0.80.2
-
cpe:2.3:a:ripple:rippled:0.81.0
-
cpe:2.3:a:ripple:rippled:0.90.0
-
cpe:2.3:a:ripple:rippled:0.90.1
-
cpe:2.3:a:ripple:rippled:1.0.0
-
cpe:2.3:a:ripple:rippled:1.0.1
-
cpe:2.3:a:ripple:rippled:1.1.0
-
cpe:2.3:a:ripple:rippled:1.1.1
-
cpe:2.3:a:ripple:rippled:1.1.2
-
cpe:2.3:a:ripple:rippled:1.2.0
-
cpe:2.3:a:ripple:rippled:1.2.1
-
cpe:2.3:a:ripple:rippled:1.2.2
-
cpe:2.3:a:ripple:rippled:1.2.3
-
cpe:2.3:a:ripple:rippled:1.2.4
-
cpe:2.3:a:ripple:rippled:1.3.0
-
cpe:2.3:a:ripple:rippled:1.3.1
-
cpe:2.3:a:ripple:rippled:1.4.0
-
cpe:2.3:a:ripple:rippled:1.5.0
-
cpe:2.3:a:ripple:rippled:1.6.0
-
cpe:2.3:a:ripple:rippled:1.7.0
-
cpe:2.3:a:ripple:rippled:1.7.2
-
cpe:2.3:a:ripple:rippled:1.7.3
-
cpe:2.3:a:ripple:rippled:1.8.1
-
cpe:2.3:a:ripple:rippled:1.8.2
-
cpe:2.3:a:ripple:rippled:1.8.3
-
cpe:2.3:a:ripple:rippled:1.8.4