CVE-2022-2048 vulnerability in Eclipse and Other Products
Published on July 7, 2022
Vulnerability Analysis
CVE-2022-2048 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.
Weakness Types
Insufficient Resource Pool
The software's resource pool is not large enough to handle peak demand, which allows an attacker to prevent others from accessing the resource by using a (relatively) large number of requests for resources. Frequently the consequence is a "flood" of connection or sessions.
Improper Control of a Resource Through its Lifetime
The software does not maintain or incorrectly maintains control over a resource throughout its lifetime of creation, use, and release.
Products Associated with CVE-2022-2048
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2022-2048 are published in these products:
Affected Versions
The Eclipse Foundation Eclipse Jetty:- Version 9.4.0 and below unspecified is affected.
- Version unspecified, <= 9.4.46 is affected.
- Version 10.0.0 and below unspecified is affected.
- Version unspecified, <= 10.0.9 is affected.
- Version 11.0.0 and below unspecified is affected.
- Version unspecified, <= 11.0.9 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.