CVE-2022-39974: n/a in n/a
WASM3 v0.5.0 was discovered to contain a segmentation fault via the component op_Select_i32_srs in wasm3/source/m3_exec.h.
AI Analysis
Technical Summary
CVE-2022-39974 is a high-severity vulnerability identified in WASM3 version 0.5.0, an open-source WebAssembly interpreter designed for embedded systems and resource-constrained environments. The vulnerability arises from a segmentation fault triggered via the component op_Select_i32_srs located in the source file wasm3/source/m3_exec.h. This fault is indicative of a memory safety issue, specifically a buffer over-read or invalid memory access, categorized under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer). The segmentation fault can cause the interpreter to crash, leading to a denial of service (DoS) condition. The CVSS v3.1 base score of 7.5 reflects a high severity rating, with the vector indicating that the vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts availability (A:H) without affecting confidentiality or integrity. No known exploits are currently reported in the wild, and no patches or vendor advisories have been published yet. The lack of vendor or product information suggests that WASM3 is a niche or embedded component used within broader products or systems rather than a standalone commercial product. The vulnerability's exploitation could be triggered by processing crafted WebAssembly bytecode that exercises the vulnerable op_Select_i32_srs operation, causing the interpreter to crash and disrupt service.
Potential Impact
For European organizations, the primary impact of CVE-2022-39974 is the potential for denial of service attacks against systems embedding WASM3 for WebAssembly execution. This could affect IoT devices, embedded controllers, or specialized applications that rely on WASM3 for running WebAssembly modules. Disruption of these systems could lead to operational downtime, loss of availability of critical services, or interruption in industrial or consumer devices. Although confidentiality and integrity are not directly impacted, availability degradation can have cascading effects, especially in sectors such as manufacturing, healthcare, or critical infrastructure where embedded systems are prevalent. Additionally, the absence of required privileges or user interaction for exploitation increases the risk surface, as attackers could remotely trigger the fault if the system processes untrusted WebAssembly code. European organizations deploying embedded systems or edge devices that incorporate WASM3 should be aware of this vulnerability to prevent service interruptions and maintain compliance with availability requirements under regulations like NIS2.
Mitigation Recommendations
Given the absence of official patches, European organizations should take immediate steps to mitigate the risk. First, audit all embedded systems and applications to identify usage of WASM3 version 0.5.0 or earlier. If possible, upgrade to a newer version of WASM3 where the vulnerability is addressed or apply community patches if available. If upgrading is not feasible, implement input validation and sanitization to restrict or block untrusted WebAssembly bytecode from reaching the interpreter. Employ network-level controls such as firewalls and intrusion prevention systems to limit exposure of devices running WASM3 to untrusted networks. Additionally, implement robust monitoring and anomaly detection to identify crashes or abnormal behavior indicative of exploitation attempts. For critical systems, consider deploying redundancy or failover mechanisms to maintain availability in case of DoS conditions. Finally, engage with vendors or open-source maintainers to track patch releases and apply updates promptly once available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Sweden, Finland
CVE-2022-39974: n/a in n/a
Description
WASM3 v0.5.0 was discovered to contain a segmentation fault via the component op_Select_i32_srs in wasm3/source/m3_exec.h.
AI-Powered Analysis
Technical Analysis
CVE-2022-39974 is a high-severity vulnerability identified in WASM3 version 0.5.0, an open-source WebAssembly interpreter designed for embedded systems and resource-constrained environments. The vulnerability arises from a segmentation fault triggered via the component op_Select_i32_srs located in the source file wasm3/source/m3_exec.h. This fault is indicative of a memory safety issue, specifically a buffer over-read or invalid memory access, categorized under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer). The segmentation fault can cause the interpreter to crash, leading to a denial of service (DoS) condition. The CVSS v3.1 base score of 7.5 reflects a high severity rating, with the vector indicating that the vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts availability (A:H) without affecting confidentiality or integrity. No known exploits are currently reported in the wild, and no patches or vendor advisories have been published yet. The lack of vendor or product information suggests that WASM3 is a niche or embedded component used within broader products or systems rather than a standalone commercial product. The vulnerability's exploitation could be triggered by processing crafted WebAssembly bytecode that exercises the vulnerable op_Select_i32_srs operation, causing the interpreter to crash and disrupt service.
Potential Impact
For European organizations, the primary impact of CVE-2022-39974 is the potential for denial of service attacks against systems embedding WASM3 for WebAssembly execution. This could affect IoT devices, embedded controllers, or specialized applications that rely on WASM3 for running WebAssembly modules. Disruption of these systems could lead to operational downtime, loss of availability of critical services, or interruption in industrial or consumer devices. Although confidentiality and integrity are not directly impacted, availability degradation can have cascading effects, especially in sectors such as manufacturing, healthcare, or critical infrastructure where embedded systems are prevalent. Additionally, the absence of required privileges or user interaction for exploitation increases the risk surface, as attackers could remotely trigger the fault if the system processes untrusted WebAssembly code. European organizations deploying embedded systems or edge devices that incorporate WASM3 should be aware of this vulnerability to prevent service interruptions and maintain compliance with availability requirements under regulations like NIS2.
Mitigation Recommendations
Given the absence of official patches, European organizations should take immediate steps to mitigate the risk. First, audit all embedded systems and applications to identify usage of WASM3 version 0.5.0 or earlier. If possible, upgrade to a newer version of WASM3 where the vulnerability is addressed or apply community patches if available. If upgrading is not feasible, implement input validation and sanitization to restrict or block untrusted WebAssembly bytecode from reaching the interpreter. Employ network-level controls such as firewalls and intrusion prevention systems to limit exposure of devices running WASM3 to untrusted networks. Additionally, implement robust monitoring and anomaly detection to identify crashes or abnormal behavior indicative of exploitation attempts. For critical systems, consider deploying redundancy or failover mechanisms to maintain availability in case of DoS conditions. Finally, engage with vendors or open-source maintainers to track patch releases and apply updates promptly once available.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-09-06T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68375ceb182aa0cae258f109
Added to database: 5/28/2025, 6:58:51 PM
Last enriched: 7/7/2025, 5:10:56 AM
Last updated: 2/7/2026, 7:58:36 AM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2077: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.