Technical Severity
CRITICALCVSS v3.1 Metrics
10
/ 10
Minimal Risk
Critical
Vector Specification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:HExploitation Likelihood
EPSS Prediction
93.71
%
Predictive Probability
Percentile Rank
99.8
th
Documented as more likely to be exploited than 99.8% of known CVEs.
Detection Date
Jun 26, 2024
Remediation Due
Jul 17, 2024
CISA Catalog Active
Threat Analysis
OSGeo GeoServer JAI-EXT contains a code injection vulnerability that, when programs use jt-jiffle and allow Jiffle script to be provided via network request, could allow remote code execution.
Remediation Directive
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
External Intelligence
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. The patched JAI-EXT is version 1.1.22:
https://github.com/geosolutions-it/jai-ext/releases/tag/1.1.22,
NVD
National Vulnerability Database
https://nvd.nist.gov/vuln/detail/CVE-2022-24816