{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T22:06:20.979","vulnerabilities":[{"cve":{"id":"CVE-2022-26306","sourceIdentifier":"security@documentfoundation.org","published":"2022-07-25T15:15:09.353","lastModified":"2024-11-21T06:53:43.550","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"LibreOffice supports the storage of passwords for web connections in the user’s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where the required initialization vector for encryption was always the same which weakens the security of the encryption making them vulnerable if an attacker has access to the user's configuration data. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7; 7.3 versions prior to 7.3.1."},{"lang":"es","value":"LibreOffice admite el almacenamiento de contraseñas para las conexiones web en la base de datos de configuración del usuario. Las contraseñas almacenadas se cifran con una única clave maestra proporcionada por el usuario. Se presentaba un fallo en LibreOffice en el que el vector de inicialización requerido para el cifrado era siempre el mismo, lo que debilitaba la seguridad del cifrado haciéndolo vulnerable si un atacante tenía acceso a los datos de configuración del usuario. Este problema afecta a: The Document Foundation LibreOffice versiones 7.2 anteriores a 7.2.7; versiones 7.3 anteriores a 7.3.1"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security@documentfoundation.org","type":"Secondary","description":[{"lang":"en","value":"CWE-326"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-330"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*","versionStartIncluding":"7.2.0","versionEndExcluding":"7.2.7","matchCriteriaId":"20BCBB73-64D6-44F0-8B7F-F94269E9EEDA"},{"vulnerable":true,"criteria":"cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*","versionStartIncluding":"7.3.0","versionEndExcluding":"7.3.3","matchCriteriaId":"E1452E9B-C09C-4BF4-AE1F-C3AF6698BC33"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","matchCriteriaId":"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"}]}]}],"references":[{"url":"http://www.openwall.com/lists/oss-security/2022/08/13/1","source":"security@documentfoundation.org","tags":["Mailing List","Third Party Advisory"]},{"url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00022.html","source":"security@documentfoundation.org","tags":["Mailing List","Third Party Advisory"]},{"url":"https://www.libreoffice.org/about-us/security/advisories/cve-2022-26306","source":"security@documentfoundation.org","tags":["Vendor Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2022/08/13/1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00022.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://www.libreoffice.org/about-us/security/advisories/cve-2022-26306","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}