Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-23219: n/a in n/a

0
Critical
VulnerabilityCVE-2022-23219cvecve-2022-23219
Published: Fri Jan 14 2022 (01/14/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

AI-Powered Analysis

AILast updated: 07/03/2025, 11:24:47 UTC

Technical Analysis

CVE-2022-23219 is a critical security vulnerability found in the deprecated compatibility function clnt_create within the sunrpc module of the GNU C Library (glibc) up to version 2.34. The vulnerability arises because clnt_create copies its hostname argument onto the stack without validating the length of the input. This unchecked copying can lead to a classic stack-based buffer overflow (CWE-120). Exploiting this flaw could allow an attacker to cause a denial of service (DoS) by crashing the affected application or, more severely, achieve arbitrary code execution if the target application is compiled without stack protection mechanisms such as stack canaries. The vulnerability is remotely exploitable (AV:N) without any authentication (PR:N) or user interaction (UI:N), making it highly dangerous. The impact affects confidentiality, integrity, and availability, as arbitrary code execution could lead to full system compromise. The vulnerability has a CVSS v3.1 base score of 9.8, indicating critical severity. Although no known exploits are reported in the wild, the ease of exploitation and the severity of potential impact make it a significant threat. The vulnerability affects systems using glibc versions up to 2.34 that utilize the sunrpc module and the clnt_create function, which is often used in remote procedure call (RPC) implementations. Since glibc is a core component of most Linux distributions, this vulnerability has broad implications across many Linux-based environments.

Potential Impact

For European organizations, the impact of CVE-2022-23219 can be substantial. Many enterprises, government agencies, and critical infrastructure providers in Europe rely heavily on Linux-based systems that include glibc. The vulnerability could be exploited to disrupt services through denial of service attacks or to gain unauthorized control over systems, potentially leading to data breaches, espionage, or sabotage. Sectors such as finance, telecommunications, healthcare, and energy, which often use RPC services for internal and external communications, are particularly at risk. The ability to execute arbitrary code remotely without authentication increases the risk of widespread exploitation, especially in environments where legacy applications or outdated glibc versions are still in use. Additionally, the lack of user interaction requirement means automated attacks could be launched at scale. This could impact the confidentiality of sensitive data, the integrity of critical systems, and the availability of essential services, thereby affecting business continuity and regulatory compliance under frameworks like GDPR.

Mitigation Recommendations

To mitigate CVE-2022-23219, European organizations should take the following specific actions: 1) Immediately identify all systems running glibc versions up to 2.34, focusing on those that use the sunrpc module and the clnt_create function. 2) Apply official patches or upgrade glibc to versions beyond 2.34 where the vulnerability is fixed. If patches are not yet available, consider disabling or restricting the use of sunrpc services where feasible. 3) Rebuild critical applications with stack protection enabled (e.g., using compiler flags like -fstack-protector-strong) to reduce the risk of arbitrary code execution. 4) Implement network-level controls such as firewall rules to limit access to RPC services only to trusted hosts and networks, reducing the attack surface. 5) Monitor network traffic and system logs for unusual activity indicative of exploitation attempts, including anomalous RPC calls or crashes. 6) Conduct vulnerability scans and penetration tests focused on RPC services to proactively identify exposure. 7) Educate system administrators and developers about the risks of using deprecated functions and the importance of input validation and secure coding practices. These targeted measures go beyond generic advice by focusing on the specific vulnerable component and its operational context.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-01-14T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdbff3

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 7/3/2025, 11:24:47 AM

Last updated: 2/7/2026, 8:46:01 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats