net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can use a malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.
{
"cwe_ids": [
"CWE-476"
],
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/24xxx/CVE-2022-24808.json",
"cna_assigner": "GitHub_M"
}{
"source": [
"CPE_FIELD",
"REFERENCES"
],
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "5.9.2"
}
],
"cpe": "cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:*"
}[
{
"target": {
"file": "agent/mibgroup/mibII/vacm_vars.c"
},
"source": "https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"93481678995860343014821550952925501709",
"329883609409088984877513160836570993697",
"90996168828839817641143191009250748746",
"84715928341168886370472531770984568572"
]
},
"signature_type": "Line",
"signature_version": "v1",
"id": "CVE-2022-24808-38d73094"
},
{
"target": {
"function": "nsVacmAccessTable_handler",
"file": "agent/mibgroup/agent/nsVacmAccessTable.c"
},
"source": "https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937",
"deprecated": false,
"digest": {
"length": 4486.0,
"function_hash": "42328859980840848703049083694783789413"
},
"signature_type": "Function",
"signature_version": "v1",
"id": "CVE-2022-24808-6693254c"
},
{
"target": {
"file": "agent/mibgroup/agent/nsVacmAccessTable.c"
},
"source": "https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"101705815906469133529599957598608078925",
"118536710121215357800279261873153586760",
"76046262169075458752936054848008587493",
"208453342658565314658233108540818746089",
"123641821933806846028751834794904150686",
"101705815906469133529599957598608078925",
"266017915174389378972949351611408207840",
"174172268129687264723675784256469245016",
"193473216283755631885302533396112057238",
"135622840203460710109084437991526085403",
"104909031685728238587798713337917481078",
"52294072460638860849608500565980364202",
"123641821933806846028751834794904150686",
"330272572276198096952265186781298889541",
"114147104779263570726863758453786574611",
"270090253713972384606015251073484123519",
"199388456969406388637798506744447315283",
"5223774676679683017950071917146984374",
"99862687578825556437428992220799198473",
"37229377190004587475133905276553638305",
"85360771265516875339456466166751522892",
"123641821933806846028751834794904150686"
]
},
"signature_type": "Line",
"signature_version": "v1",
"id": "CVE-2022-24808-83606bb4"
},
{
"target": {
"function": "write_usmUserStatus",
"file": "agent/mibgroup/snmpv3/usmUser.c"
},
"source": "https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937",
"deprecated": false,
"digest": {
"length": 3340.0,
"function_hash": "199964159541358252145240204005079024052"
},
"signature_type": "Function",
"signature_version": "v1",
"id": "CVE-2022-24808-98a0895f"
},
{
"target": {
"file": "agent/mibgroup/agent/nsLogging.c"
},
"source": "https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"289161301384971360487741187332433544387",
"117147511563233464147479629295932571801",
"164548836578273264233821198389692432198",
"321389477694282802299858719753239225377",
"136440181962252683631310067296458462692",
"122575508272880746612488523363151570574",
"164548836578273264233821198389692432198",
"309869416733132685266140377079494838913",
"289161301384971360487741187332433544387",
"117147511563233464147479629295932571801",
"164548836578273264233821198389692432198",
"136370859928119373804431189880326048574"
]
},
"signature_type": "Line",
"signature_version": "v1",
"id": "CVE-2022-24808-cceb5399"
},
{
"target": {
"function": "access_parse_oid",
"file": "agent/mibgroup/mibII/vacm_vars.c"
},
"source": "https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937",
"deprecated": false,
"digest": {
"length": 1178.0,
"function_hash": "118375497292323459652607233435155316096"
},
"signature_type": "Function",
"signature_version": "v1",
"id": "CVE-2022-24808-d58d5dff"
},
{
"target": {
"file": "agent/mibgroup/snmpv3/usmUser.c"
},
"source": "https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"211813956712650590200040513516643867245",
"200198644239406403094222802618935448258",
"246045345096052309312675647210938041228",
"298070543415549770613339386595090320174",
"275165604706423187201154191902748746246"
]
},
"signature_type": "Line",
"signature_version": "v1",
"id": "CVE-2022-24808-e04fd8d8"
},
{
"target": {
"function": "handle_nsLoggingTable",
"file": "agent/mibgroup/agent/nsLogging.c"
},
"source": "https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937",
"deprecated": false,
"digest": {
"length": 5403.0,
"function_hash": "183393581433958351977344098104352299955"
},
"signature_type": "Function",
"signature_version": "v1",
"id": "CVE-2022-24808-f32bf120"
}
]
"2026-04-13T11:28:31Z"
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-24808.json"