CVE-2022-24798
Python vulnerability analysis and mitigation

Overview

Internet Routing Registry daemon version 4 (IRRd) is an IRR database server that processes IRR objects in the RPSL format. A vulnerability was discovered where IRRd did not properly filter password hashes in query responses relating to mntner objects and database exports. This vulnerability was identified as CVE-2022-24798 and was disclosed on March 31, 2022. The issue affects IRRd versions 4.2.0 through 4.2.2, with version 4.2.3 containing the fix (GitHub Advisory).

Technical details

The vulnerability stems from insufficient password hash filtering in several scenarios: 1) For mntner objects where password hash names (MD5-PW and CRYPT-PW) were in lower or mixed case in the auth attribute, 2) GraphQL queries accessing the auth field on mntner objects, and 3) GraphQL queries accessing the objectText field on the journal field on mntner objects when nrtm_access_list setting permitted journal access. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating network accessibility with no required privileges or user interaction (GitHub Advisory).

Impact

The vulnerability could allow adversaries to retrieve password hashes, which could then be used in brute-force attacks to discover the clear-text passphrase. If successful, attackers could make unauthorized changes to affected IRR objects. The issue only impacts instances that process password hashes, specifically IRRd instances serving authoritative databases. IRRd instances operating solely as mirrors of other IRR databases are not affected (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in IRRd version 4.2.3 and the main branch. Users of the 4.2.x series are strongly recommended to upgrade to version 4.2.3 or later. Versions in the 4.1.x series were never affected by this vulnerability. While manual patching is possible for 4.2.x or main branch versions, it is not recommended (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22033HIGH8.6
  • PythonPython
  • label-studio
NoNoJan 12, 2026
CVE-2025-68472HIGH8.1
  • PythonPython
  • mindsdb
NoYesJan 12, 2026
CVE-2026-22251MEDIUM5.3
  • PythonPython
  • wlc
NoYesJan 12, 2026
CVE-2026-22691LOW2.7
  • PythonPython
  • pypdf2
NoYesJan 10, 2026
CVE-2026-22250LOW2.5
  • PythonPython
  • wlc
NoYesJan 12, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management