| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.2 | $0-$5k | 0.00 |
Summary
A vulnerability identified as critical has been detected in vim up to 8.1. Affected by this vulnerability is an unknown functionality. The manipulation leads to stack-based overflow. This vulnerability is referenced as CVE-2022-0408. Remote exploitation of the attack is possible. No exploit is available. You should upgrade the affected component.
Details
A vulnerability was found in vim up to 8.1 (Word Processing Software). It has been rated as critical. This issue affects some unknown functionality. The manipulation with an unknown input leads to a stack-based overflow vulnerability. Using CWE to declare the problem leads to CWE-121. A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). Impacted is confidentiality, integrity, and availability.
The weakness was published 01/30/2022. The advisory is shared at huntr.dev. The identification of this vulnerability is CVE-2022-0408 since 01/28/2022. It demands that the victim is doing some kind of user interaction. Neither technical details nor an exploit are publicly available.
The vulnerability scanner Nessus provides a plugin with the ID 212489 (Amazon Linux 2022 : vim-common, vim-data, vim-default-editor (ALAS2022-2022-025)), which helps to determine the existence of the flaw in a target environment.
Upgrading to version 8.2 eliminates this vulnerability. Applying the patch 06f15416bb8d5636200a10776f1752c4d6e49f31 is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
The vulnerability is also documented in the databases at Tenable (212489) and EUVD (EUVD-2022-15553). If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Product
Type
Name
Version
License
Website
- Product: https://github.com/vim/vim/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.3VulDB Meta Temp Score: 7.2
VulDB Base Score: 6.3
VulDB Temp Score: 6.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
CNA Base Score: 8.4
CNA Vector (huntr.dev): 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Stack-based overflowCWE: CWE-121 / CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 212489
Nessus Name: Amazon Linux 2022 : vim-common, vim-data, vim-default-editor (ALAS2022-2022-025)
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: vim 8.2
Patch: 06f15416bb8d5636200a10776f1752c4d6e49f31
Timeline
01/28/2022 🔍01/30/2022 🔍
01/30/2022 🔍
03/28/2026 🔍
Sources
Product: github.comAdvisory: 06f15416bb8d5636200a10776f1752c4d6e49f31
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2022-0408 (🔍)
GCVE (CVE): GCVE-0-2022-0408
GCVE (VulDB): GCVE-100-192005
EUVD: 🔍
Entry
Created: 01/30/2022 20:37Updated: 03/28/2026 09:17
Changes: 01/30/2022 20:37 (50), 02/02/2022 16:43 (3), 12/12/2024 22:57 (16), 05/01/2025 22:00 (3), 03/28/2026 09:17 (1)
Complete: 🔍
Cache ID: 216:F9C:103
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
No comments yet. Languages: en.
Please log in to comment.