Show plain JSON{"containers": {"cna": {"affected": [{"product": "Asylo", "vendor": "Google LLC", "versions": [{"lessThanOrEqual": "0.6.2", "status": "affected", "version": "unspecified", "versionType": "custom"}]}], "credits": [{"lang": "en", "value": "Qinkun Bao (Baidu Security)"}, {"lang": "en", "value": "Zhaofeng Chen (Baidu Security)"}, {"lang": "en", "value": "Mingshen Sun (Baidu Security)"}, {"lang": "en", "value": "Kang Li (Baidu Security)"}], "datePublic": "2021-03-29T00:00:00", "descriptions": [{"lang": "en", "value": "An attacker can change the pointer to untrusted memory to point to trusted memory region which causes copying trusted memory to trusted memory, if the latter is later copied out, it allows for reading of memory regions from the trusted region. It is recommended to update past 0.6.2 or git commit https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c"}], "metrics": [{"cvssV3_1": {"attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-788", "description": "CWE-788 Access of Memory Location After End of Buffer", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2021-06-08T13:15:13", "orgId": "14ed7db2-1595-443d-9d34-6215bf890778", "shortName": "Google"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c"}], "source": {"discovery": "EXTERNAL"}, "title": "Arbitrary enclave memory overread vulnerability in Asylo TrustedPrimitives::UntrustedCall", "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "security@google.com", "DATE_PUBLIC": "2021-03-29T10:00:00.000Z", "ID": "CVE-2021-22548", "STATE": "PUBLIC", "TITLE": "Arbitrary enclave memory overread vulnerability in Asylo TrustedPrimitives::UntrustedCall"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Asylo", "version": {"version_data": [{"version_affected": "<=", "version_value": "0.6.2"}]}}]}, "vendor_name": "Google LLC"}]}}, "credit": [{"lang": "eng", "value": "Qinkun Bao (Baidu Security)"}, {"lang": "eng", "value": "Zhaofeng Chen (Baidu Security)"}, {"lang": "eng", "value": "Mingshen Sun (Baidu Security)"}, {"lang": "eng", "value": "Kang Li (Baidu Security)"}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "An attacker can change the pointer to untrusted memory to point to trusted memory region which causes copying trusted memory to trusted memory, if the latter is later copied out, it allows for reading of memory regions from the trusted region. It is recommended to update past 0.6.2 or git commit https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c"}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "impact": {"cvss": {"attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-788 Access of Memory Location After End of Buffer"}]}]}, "references": {"reference_data": [{"name": "https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c", "refsource": "MISC", "url": "https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c"}]}, "source": {"discovery": "EXTERNAL"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-03T18:44:13.780Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c"}]}]}, "cveMetadata": {"assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778", "assignerShortName": "Google", "cveId": "CVE-2021-22548", "datePublished": "2021-06-08T13:15:13.466433Z", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-09-17T01:11:52.435Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}