dell emc-appsync CVE-2022-22552 is a vulnerability in Dell Emc Appsync
Published on January 21, 2022

Dell EMC AppSync versions 3.9 to 4.3 contain a clickjacking vulnerability in AppSync. A remote unauthenticated attacker could potentially exploit this vulnerability to trick the victim into executing state changing operations.

NVD

Vulnerability Analysis

CVE-2022-22552 is exploitable with network access, requires user interaction. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, with no impact on integrity, and a high impact on availability.

Attack Vector:
NETWORK
Attack Complexity:
HIGH
Privileges Required:
NONE
User Interaction:
REQUIRED
Scope:
CHANGED
Confidentiality Impact:
NONE
Integrity Impact:
LOW
Availability Impact:
HIGH

Weakness Type

What is a Clickjacking Vulnerability?

The web application does not restrict or incorrectly restricts frame objects or UI layers that belong to another application or domain, which can lead to user confusion about which interface the user is interacting with. A web application is expected to place restrictions on whether it is allowed to be rendered within frames, iframes, objects, embed or applet elements. Without the restrictions, users can be tricked into interacting with the application when they were not intending to.

CVE-2022-22552 has been classified to as a Clickjacking vulnerability or weakness.


Products Associated with CVE-2022-22552

Want to know whenever a new CVE is published for Dell Emc Appsync? stack.watch will email you.

 

Affected Versions

Dell AppSync:

Exploit Probability

EPSS
0.21%
Percentile
43.14%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.