Vulnerability Details CVE-2022-4968
netplan leaks the private key of wireguard to local users. Versions after 1.0 are not affected.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 19.3%
CVSS Severity
CVSS v3 Score 6.5
Products affected by CVE-2022-4968
-
cpe:2.3:a:canonical:netplan:0.1
-
cpe:2.3:a:canonical:netplan:0.10
-
cpe:2.3:a:canonical:netplan:0.100
-
cpe:2.3:a:canonical:netplan:0.101
-
cpe:2.3:a:canonical:netplan:0.102
-
cpe:2.3:a:canonical:netplan:0.103
-
cpe:2.3:a:canonical:netplan:0.104
-
cpe:2.3:a:canonical:netplan:0.105
-
cpe:2.3:a:canonical:netplan:0.106
-
cpe:2.3:a:canonical:netplan:0.106.1
-
cpe:2.3:a:canonical:netplan:0.107
-
cpe:2.3:a:canonical:netplan:0.107.1
-
cpe:2.3:a:canonical:netplan:0.11
-
cpe:2.3:a:canonical:netplan:0.11.1
-
cpe:2.3:a:canonical:netplan:0.12
-
cpe:2.3:a:canonical:netplan:0.13
-
cpe:2.3:a:canonical:netplan:0.14
-
cpe:2.3:a:canonical:netplan:0.15
-
cpe:2.3:a:canonical:netplan:0.16
-
cpe:2.3:a:canonical:netplan:0.17
-
cpe:2.3:a:canonical:netplan:0.18
-
cpe:2.3:a:canonical:netplan:0.19
-
cpe:2.3:a:canonical:netplan:0.2
-
cpe:2.3:a:canonical:netplan:0.21
-
cpe:2.3:a:canonical:netplan:0.21_16.04.1
-
cpe:2.3:a:canonical:netplan:0.22
-
cpe:2.3:a:canonical:netplan:0.22_16.04.1
-
cpe:2.3:a:canonical:netplan:0.22_16.10.1
-
cpe:2.3:a:canonical:netplan:0.22_17.04.1
-
cpe:2.3:a:canonical:netplan:0.23
-
cpe:2.3:a:canonical:netplan:0.23_16.04.1
-
cpe:2.3:a:canonical:netplan:0.23_16.10.1
-
cpe:2.3:a:canonical:netplan:0.23_17.04.1
-
cpe:2.3:a:canonical:netplan:0.24
-
cpe:2.3:a:canonical:netplan:0.25
-
cpe:2.3:a:canonical:netplan:0.26
-
cpe:2.3:a:canonical:netplan:0.26_16.04.1
-
cpe:2.3:a:canonical:netplan:0.27
-
cpe:2.3:a:canonical:netplan:0.28
-
cpe:2.3:a:canonical:netplan:0.29
-
cpe:2.3:a:canonical:netplan:0.3
-
cpe:2.3:a:canonical:netplan:0.30
-
cpe:2.3:a:canonical:netplan:0.31
-
cpe:2.3:a:canonical:netplan:0.31_16.04.1
-
cpe:2.3:a:canonical:netplan:0.31_17.04.1
-
cpe:2.3:a:canonical:netplan:0.32
-
cpe:2.3:a:canonical:netplan:0.32_16.04.1
-
cpe:2.3:a:canonical:netplan:0.32_16.04.2
-
cpe:2.3:a:canonical:netplan:0.32_16.04.3
-
cpe:2.3:a:canonical:netplan:0.32_16.04.4
-
cpe:2.3:a:canonical:netplan:0.32_16.04.5
-
cpe:2.3:a:canonical:netplan:0.32_16.04.6
-
cpe:2.3:a:canonical:netplan:0.32_17.04.1
-
cpe:2.3:a:canonical:netplan:0.32_17.10.1
-
cpe:2.3:a:canonical:netplan:0.32_17.10.3
-
cpe:2.3:a:canonical:netplan:0.32_17.10.4
-
cpe:2.3:a:canonical:netplan:0.33
-
cpe:2.3:a:canonical:netplan:0.34
-
cpe:2.3:a:canonical:netplan:0.34.1
-
cpe:2.3:a:canonical:netplan:0.35
-
cpe:2.3:a:canonical:netplan:0.36
-
cpe:2.3:a:canonical:netplan:0.36.1
-
cpe:2.3:a:canonical:netplan:0.36.2
-
cpe:2.3:a:canonical:netplan:0.36.3
-
cpe:2.3:a:canonical:netplan:0.37
-
cpe:2.3:a:canonical:netplan:0.37.1
-
cpe:2.3:a:canonical:netplan:0.38
-
cpe:2.3:a:canonical:netplan:0.39
-
cpe:2.3:a:canonical:netplan:0.4
-
cpe:2.3:a:canonical:netplan:0.40
-
cpe:2.3:a:canonical:netplan:0.40.1
-
cpe:2.3:a:canonical:netplan:0.40.1_18.04.1
-
cpe:2.3:a:canonical:netplan:0.40.1_18.04.2
-
cpe:2.3:a:canonical:netplan:0.40.1_18.04.3
-
cpe:2.3:a:canonical:netplan:0.40.2
-
cpe:2.3:a:canonical:netplan:0.40.2.1
-
cpe:2.3:a:canonical:netplan:0.40.2.2
-
cpe:2.3:a:canonical:netplan:0.40_18.04.1
-
cpe:2.3:a:canonical:netplan:0.5
-
cpe:2.3:a:canonical:netplan:0.6
-
cpe:2.3:a:canonical:netplan:0.7
-
cpe:2.3:a:canonical:netplan:0.8
-
cpe:2.3:a:canonical:netplan:0.9
-
cpe:2.3:a:canonical:netplan:0.90
-
cpe:2.3:a:canonical:netplan:0.95
-
cpe:2.3:a:canonical:netplan:0.96
-
cpe:2.3:a:canonical:netplan:0.96.1
-
cpe:2.3:a:canonical:netplan:0.97
-
cpe:2.3:a:canonical:netplan:0.98
-
cpe:2.3:a:canonical:netplan:0.99
-
cpe:2.3:a:canonical:netplan:1.0