{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T06:20:07.549","vulnerabilities":[{"cve":{"id":"CVE-2022-31120","sourceIdentifier":"security-advisories@github.com","published":"2022-08-04T17:15:08.520","lastModified":"2024-11-21T07:03:56.207","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Nextcloud server is an open source personal cloud solution. The audit log is used to get a full trail of the actions which has been incompletely populated. In affected versions federated share events were not properly logged which would allow brute force attacks to go unnoticed. This behavior exacerbates the impact of CVE-2022-31118. It is recommended that the Nextcloud Server is upgraded to 22.2.7, 23.0.4 or 24.0.0. There are no workarounds available."},{"lang":"es","value":"El servidor Nextcloud es una solución de nube personal de código abierto. El registro de auditoría se utiliza para obtener un rastro completo de las acciones que se ha poblado de forma incompleta. En las versiones afectadas, los eventos de uso compartido federado no se registraban correctamente, lo que permitía que los ataques de fuerza bruta pasaran desapercibidos. Este comportamiento exacerba el impacto de CVE-2022-31118. Se recomienda actualizar el servidor Nextcloud a la versión 22.2.7, 23.0.4 o 24.0.0. No hay soluciones disponibles"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N","baseScore":2.1,"baseSeverity":"LOW","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":0.7,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N","baseScore":2.7,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-778"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*","versionEndExcluding":"22.2.7","matchCriteriaId":"1569E72C-B9ED-4CED-ADBC-77DD1C02E1A6"},{"vulnerable":true,"criteria":"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*","versionStartIncluding":"23.0.0","versionEndExcluding":"23.0.4","matchCriteriaId":"737EF28B-6521-4269-8877-E31AF9341858"}]}]}],"references":[{"url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9qvg-7fwg-722x","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/nextcloud/server/pull/31594/commits/1d8bf9a89c6856218802a1d365000a5831be8655","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://portal.nextcloud.com/article/using-the-audit-log-44.html","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9qvg-7fwg-722x","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://github.com/nextcloud/server/pull/31594/commits/1d8bf9a89c6856218802a1d365000a5831be8655","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://portal.nextcloud.com/article/using-the-audit-log-44.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}