vulnerability

Red Hat: CVE-2022-24808: net-snmp: A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference (Multiple Advisories)

Severity
5
CVSS
(AV:N/AC:H/Au:N/C:N/I:N/A:C)
Published
Apr 16, 2024
Added
Sep 27, 2024
Modified
Jul 9, 2025

Description

net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can use a malformed OID in a `SET` request to `NET-SNMP-AGENT-MIB::nsLogTable` to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.

Solution(s)

no-fix-redhat-rpm-packageredhat-upgrade-net-snmpredhat-upgrade-net-snmp-agent-libsredhat-upgrade-net-snmp-agent-libs-debuginforedhat-upgrade-net-snmp-debuginforedhat-upgrade-net-snmp-debugsourceredhat-upgrade-net-snmp-develredhat-upgrade-net-snmp-libsredhat-upgrade-net-snmp-libs-debuginforedhat-upgrade-net-snmp-perlredhat-upgrade-net-snmp-perl-debuginforedhat-upgrade-net-snmp-utilsredhat-upgrade-net-snmp-utils-debuginforedhat-upgrade-python3-net-snmpredhat-upgrade-python3-net-snmp-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.