vulnerability

Red Hat: CVE-2022-24805: net-snmp: A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access. (Multiple Advisories)

Severity
6
CVSS
(AV:L/AC:M/Au:N/C:N/I:C/A:C)
Published
Apr 16, 2024
Added
Sep 27, 2024
Modified
Mar 27, 2026

Description

net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the `INDEX` of `NET-SNMP-VACM-MIB` can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.

Solutions

redhat-upgrade-net-snmpredhat-upgrade-net-snmp-agent-libsredhat-upgrade-net-snmp-agent-libs-debuginforedhat-upgrade-net-snmp-debuginforedhat-upgrade-net-snmp-debugsourceredhat-upgrade-net-snmp-develredhat-upgrade-net-snmp-libsredhat-upgrade-net-snmp-libs-debuginforedhat-upgrade-net-snmp-perlredhat-upgrade-net-snmp-perl-debuginforedhat-upgrade-net-snmp-utilsredhat-upgrade-net-snmp-utils-debuginforedhat-upgrade-python3-net-snmpredhat-upgrade-python3-net-snmp-debuginfo
Title
Rapid7 Labs

2026 Global Threat Landscape Report

The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.