Skip to main content

CVE-2022-0343: CWE-275 Permission Issues in Google LLC Perfetto Dev Scripts

Medium
Published: Tue Mar 29 2022 (03/29/2022, 15:10:11 UTC)
Source: CVE
Vendor/Project: Google LLC
Product: Perfetto Dev Scripts

Description

A local attacker, as a different local user, may be able to send a HTTP request to 127.0.0.1:10000 after the user (typically a developer) manually invoked the ./tools/run-dev-server script. It is recommended to upgrade to any version beyond 24.2

AI-Powered Analysis

AILast updated: 06/20/2025, 13:33:41 UTC

Technical Analysis

CVE-2022-0343 is a medium-severity local privilege vulnerability affecting Google LLC's Perfetto development scripts, specifically related to permission issues categorized under CWE-275. Perfetto is an open-source performance tracing tool widely used by developers for system and application profiling. The vulnerability arises when a developer manually invokes the './tools/run-dev-server' script, which starts a local HTTP server listening on 127.0.0.1 at port 10000. Due to improper permission controls, a different local user on the same machine can send HTTP requests to this server. This unauthorized access could allow the attacker to interact with the development server in ways not intended by the original user, potentially leading to information disclosure or manipulation of the development environment. The vulnerability is local, requiring the attacker to have access to the same host but as a different user account. No remote exploitation or network access is implied. The affected versions are unspecified, but upgrading to any version beyond 24.2 of the Perfetto dev scripts is recommended to mitigate the issue. There are no known exploits in the wild, and no patch links were provided, but the vendor has acknowledged the issue and recommended upgrades. The vulnerability impacts confidentiality and integrity within the local environment and could disrupt developer workflows or leak sensitive development data if exploited.

Potential Impact

For European organizations, the impact of CVE-2022-0343 is primarily relevant to development environments where Perfetto is used. Organizations with active software development teams employing Perfetto for performance tracing could face risks of local privilege escalation or unauthorized access to development data if multiple users share the same development machines or environments without strict user isolation. This could lead to leakage of sensitive code, performance data, or internal debugging information, potentially aiding further attacks or intellectual property theft. However, since the vulnerability requires local access as a different user and manual invocation of the vulnerable script, the risk is limited to insider threats or compromised internal accounts rather than external attackers. The impact on production systems is minimal unless development servers are improperly exposed. European organizations with strict multi-user development setups or shared workstations are more vulnerable. Additionally, organizations in regulated sectors such as finance, healthcare, or critical infrastructure that rely on Perfetto for performance diagnostics should be cautious, as unauthorized access to development tools could indirectly affect system integrity or compliance.

Mitigation Recommendations

To mitigate CVE-2022-0343, European organizations should: 1) Upgrade Perfetto dev scripts to version 24.2 or later where the permission issues are resolved. 2) Enforce strict user account separation on development machines to prevent unauthorized local user access. 3) Limit the use of the './tools/run-dev-server' script to trusted users and consider restricting its execution via file system permissions or access control lists. 4) Monitor local network connections to 127.0.0.1:10000 during development sessions to detect unauthorized access attempts. 5) Implement endpoint security controls that detect anomalous local user behavior or unauthorized inter-user communication on shared machines. 6) Educate developers about the risks of running development servers with insufficient isolation and encourage use of containerized or virtualized environments to isolate development tools. 7) Regularly audit development environments for outdated Perfetto versions and unauthorized local user accounts. These steps go beyond generic advice by focusing on local user isolation, monitoring local loopback traffic, and controlling script execution privileges.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Google
Date Reserved
2022-01-24T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d984bc4522896dcbf7f4f

Added to database: 5/21/2025, 9:09:31 AM

Last enriched: 6/20/2025, 1:33:41 PM

Last updated: 8/4/2025, 12:58:24 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats