Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-45474: n/a in n/a

0
Critical
VulnerabilityCVE-2022-45474cvecve-2022-45474
Published: Fri Nov 18 2022 (11/18/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

drachtio-server 0.8.18 has a request-handler.cpp event_cb use-after-free for any request.

AI-Powered Analysis

AILast updated: 06/22/2025, 13:09:05 UTC

Technical Analysis

CVE-2022-45474 is a critical use-after-free vulnerability identified in drachtio-server version 0.8.18, specifically within the request-handler.cpp file's event_cb function. A use-after-free (CWE-416) vulnerability occurs when a program continues to use a pointer after the memory it points to has been freed, potentially leading to arbitrary code execution, memory corruption, or application crashes. In this case, the vulnerability can be triggered by any request sent to the server, indicating that no authentication or special privileges are required to exploit it. The CVSS v3.1 base score of 9.8 reflects the high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). This means an attacker can remotely exploit the vulnerability without any user interaction or credentials, leading to complete compromise of the affected system. Although no official patch or vendor information is provided, the vulnerability is publicly disclosed and enriched by CISA, indicating recognition by cybersecurity authorities. There are no known exploits in the wild at the time of publication, but the critical nature and ease of exploitation make it a significant threat to any deployment of drachtio-server 0.8.18. Drachtio-server is an open-source SIP server framework used in VoIP communications, often integrated into telephony infrastructure and real-time communication platforms.

Potential Impact

For European organizations, the exploitation of CVE-2022-45474 could have severe consequences, especially for those relying on drachtio-server for their VoIP or real-time communication services. Successful exploitation could allow attackers to execute arbitrary code, disrupt telephony services, intercept or manipulate voice communications, and potentially pivot to other internal systems. This could lead to significant confidentiality breaches (e.g., interception of sensitive calls), integrity violations (e.g., call manipulation or fraud), and availability issues (e.g., denial of service on communication platforms). Critical sectors such as telecommunications providers, financial institutions using VoIP for secure communications, government agencies, and emergency services could face operational disruptions and data breaches. The lack of authentication and user interaction requirements increases the risk of automated or widespread exploitation attempts. Additionally, the vulnerability could be leveraged in targeted attacks or espionage campaigns, given the strategic importance of communication infrastructure in Europe.

Mitigation Recommendations

Given the absence of an official patch, European organizations should take immediate and specific mitigation steps: 1) Identify and inventory all instances of drachtio-server 0.8.18 within their networks, including embedded systems and telephony infrastructure. 2) Implement network-level protections such as firewall rules to restrict access to the drachtio-server ports only to trusted internal IP addresses and VPNs, minimizing exposure to untrusted networks. 3) Deploy intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics targeting anomalous SIP requests or known exploit patterns related to use-after-free conditions. 4) Consider temporarily disabling or isolating drachtio-server instances if they are not critical or if alternative communication platforms are available until a patch or update is released. 5) Monitor vendor channels, security advisories, and community forums for patches or mitigations and apply updates promptly once available. 6) Conduct thorough security assessments and penetration tests focusing on VoIP infrastructure to detect potential exploitation attempts. 7) Employ application-level sandboxing or containerization for drachtio-server to limit the blast radius in case of compromise. 8) Educate IT and security teams about this vulnerability to ensure rapid response to any suspicious activity.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-11-18T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983cc4522896dcbee90e

Added to database: 5/21/2025, 9:09:16 AM

Last enriched: 6/22/2025, 1:09:05 PM

Last updated: 2/7/2026, 10:41:18 AM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats