Language:
https://alas.aws.amazon.com/AL2022/ALAS-2022-116.html
https://alas.aws.amazon.com/cve/html/CVE-2021-3770.html
https://alas.aws.amazon.com/cve/html/CVE-2022-0554.html
https://alas.aws.amazon.com/cve/html/CVE-2022-0572.html
https://alas.aws.amazon.com/cve/html/CVE-2022-0629.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1616.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1619.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1620.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1621.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1629.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1674.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1720.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1725.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1733.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1735.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1769.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1771.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1785.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1796.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1851.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1886.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1897.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1898.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1927.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1942.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1968.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2000.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2042.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2124.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2125.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2126.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2129.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2175.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2182.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2183.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2206.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2207.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2208.html
Severity: High
ID: 164766
File Name: al2022_ALAS2022-2022-116.nasl
Version: 1.10
Type: local
Agent: unix
Published: 9/6/2022
Updated: 12/11/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5.3
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2022-2210
Risk Factor: High
Base Score: 7.8
Temporal Score: 7
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:amazon:linux:vim-filesystem, p-cpe:/a:amazon:linux:vim-data, cpe:/o:amazon:linux:2022, p-cpe:/a:amazon:linux:vim-enhanced-debuginfo, p-cpe:/a:amazon:linux:vim-common, p-cpe:/a:amazon:linux:vim-minimal-debuginfo, p-cpe:/a:amazon:linux:vim-minimal, p-cpe:/a:amazon:linux:vim-common-debuginfo, p-cpe:/a:amazon:linux:vim-enhanced, p-cpe:/a:amazon:linux:vim-default-editor, p-cpe:/a:amazon:linux:vim-debuginfo, p-cpe:/a:amazon:linux:vim-debugsource
Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 7/20/2022
Vulnerability Publication Date: 5/19/2022
CVE: CVE-2021-3770, CVE-2022-0554, CVE-2022-0572, CVE-2022-0629, CVE-2022-1616, CVE-2022-1619, CVE-2022-1620, CVE-2022-1621, CVE-2022-1629, CVE-2022-1674, CVE-2022-1720, CVE-2022-1725, CVE-2022-1733, CVE-2022-1735, CVE-2022-1769, CVE-2022-1771, CVE-2022-1785, CVE-2022-1796, CVE-2022-1851, CVE-2022-1886, CVE-2022-1897, CVE-2022-1898, CVE-2022-1927, CVE-2022-1942, CVE-2022-1968, CVE-2022-2000, CVE-2022-2042, CVE-2022-2124, CVE-2022-2125, CVE-2022-2126, CVE-2022-2129, CVE-2022-2175, CVE-2022-2182, CVE-2022-2183, CVE-2022-2206, CVE-2022-2207, CVE-2022-2208, CVE-2022-2210, CVE-2022-2231
IAVB: 2022-B-0049-S, 2023-B-0016-S