{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T21:15:14.038","vulnerabilities":[{"cve":{"id":"CVE-2022-22951","sourceIdentifier":"security@vmware.com","published":"2022-03-23T20:15:10.797","lastModified":"2024-11-21T06:47:40.273","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"VMware Carbon Black App Control (8.5.x prior to 8.5.14, 8.6.x prior to 8.6.6, 8.7.x prior to 8.7.4 and 8.8.x prior to 8.8.2) contains an OS command injection vulnerability. An authenticated, high privileged malicious actor with network access to the VMware App Control administration interface may be able to execute commands on the server due to improper input validation leading to remote code execution."},{"lang":"es","value":"VMware Carbon Black App Control (versiones 8.5.x anteriores a 8.5.14, versiones 8.6.x anteriores a 8.6.6, versiones 8.7.x anteriores a 8.7.4 y versiones 8.8.x anteriores a 8.8.2) contiene una vulnerabilidad de inyección de comandos del Sistema Operativo. Un actor malicioso autenticado y con altos privilegios con acceso a la red a la interfaz de administración de VMware App Control puede ser capaz de ejecutar comandos en el servidor debido a una incorrecta comprobación de entrada conllevando a una ejecución de código remota"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.3,"impactScore":6.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C","baseScore":9.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:carbon_black_app_control:*:*:*:*:*:*:*:*","versionStartIncluding":"8.5","versionEndExcluding":"8.5.14","matchCriteriaId":"EB34F6FC-F097-4DA9-8722-A39F3F4BCF88"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:carbon_black_app_control:*:*:*:*:*:*:*:*","versionStartIncluding":"8.6","versionEndExcluding":"8.6.6","matchCriteriaId":"5886E794-A457-472A-A25C-BC1186015A37"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:carbon_black_app_control:*:*:*:*:*:*:*:*","versionStartIncluding":"8.7.0","versionEndExcluding":"8.7.4","matchCriteriaId":"81AB4436-EEE5-48AE-848B-6B0F611AFF92"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:carbon_black_app_control:*:*:*:*:*:*:*:*","versionStartIncluding":"8.8.0","versionEndExcluding":"8.8.2","matchCriteriaId":"A9138626-BF09-4A39-A34D-D528F5A76A1F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","matchCriteriaId":"A2572D17-1DE6-457B-99CC-64AFD54487EA"}]}]}],"references":[{"url":"https://www.vmware.com/security/advisories/VMSA-2022-0008.html","source":"security@vmware.com","tags":["Patch","Vendor Advisory"]},{"url":"https://www.vmware.com/security/advisories/VMSA-2022-0008.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}