vulnerability
Red Hat: CVE-2022-24810: net-snmp: A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference. (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:M/Au:N/C:N/I:N/A:C) | Apr 16, 2024 | Sep 27, 2024 | Sep 1, 2025 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:C)
Published
Apr 16, 2024
Added
Sep 27, 2024
Modified
Sep 1, 2025
Description
net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can use a malformed OID in a SET to the nsVacmAccessTable to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.
Solutions
no-fix-redhat-rpm-packageredhat-upgrade-net-snmpredhat-upgrade-net-snmp-agent-libsredhat-upgrade-net-snmp-agent-libs-debuginforedhat-upgrade-net-snmp-debuginforedhat-upgrade-net-snmp-debugsourceredhat-upgrade-net-snmp-develredhat-upgrade-net-snmp-libsredhat-upgrade-net-snmp-libs-debuginforedhat-upgrade-net-snmp-perlredhat-upgrade-net-snmp-perl-debuginforedhat-upgrade-net-snmp-utilsredhat-upgrade-net-snmp-utils-debuginforedhat-upgrade-python3-net-snmpredhat-upgrade-python3-net-snmp-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.