
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-36845 is a duplicate of CVE-2022-0367, which is a heap-based buffer overflow vulnerability found in the libmodbus function modbus_reply() in src/modbus.c. The vulnerability was addressed in libmodbus version 3.1.6-2+deb11u1 for Debian 11 bullseye (Debian Announce).
The vulnerability is classified under CWE-122 (Heap-based Buffer Overflow) and CWE-787 (Out-of-bounds Write). The issue specifically affects the modbus_reply() function in the src/modbus.c file of libmodbus (Debian Announce).
If exploited, this heap-based buffer overflow vulnerability could potentially allow attackers to execute arbitrary code or cause system crashes through buffer manipulation (Debian Announce).
Users are recommended to upgrade their libmodbus packages to version 3.1.6-2+deb11u1 or later. For Debian 11 bullseye users, the fix has been included in the security update (Debian Announce).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."