{
  "document" : {
    "aggregate_severity" : {
      "text" : "hoch"
    },
    "category" : "csaf_base",
    "csaf_version" : "2.0",
    "distribution" : {
      "tlp" : {
        "label" : "WHITE",
        "url" : "https://www.first.org/tlp/"
      }
    },
    "lang" : "de-DE",
    "notes" : [ {
      "category" : "legal_disclaimer",
      "text" : "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen."
    }, {
      "category" : "description",
      "text" : "Vim (Vi IMproved) ist eine Weiterentwicklung des Texteditors vi.",
      "title" : "Produktbeschreibung"
    }, {
      "category" : "summary",
      "text" : "Ein lokaler Angreifer kann mehrere Schwachstellen in vim ausnutzen, um beliebigen Programmcode auszuführen.",
      "title" : "Angriff"
    }, {
      "category" : "general",
      "text" : "- Linux\n- MacOS X\n- Sonstiges\n- Windows",
      "title" : "Betroffene Betriebssysteme"
    } ],
    "publisher" : {
      "category" : "other",
      "contact_details" : "csaf-provider@cert-bund.de",
      "name" : "Bundesamt für Sicherheit in der Informationstechnik",
      "namespace" : "https://www.bsi.bund.de"
    },
    "references" : [ {
      "category" : "self",
      "summary" : "WID-SEC-W-2022-0032 - CSAF Version",
      "url" : "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0032.json"
    }, {
      "category" : "self",
      "summary" : "WID-SEC-2022-0032 - Portal Version",
      "url" : "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0032"
    }, {
      "category" : "external",
      "summary" : "National Vulnerability Database vom 2022-03-30",
      "url" : "https://nvd.nist.gov/vuln/detail/CVE-2022-1154"
    }, {
      "category" : "external",
      "summary" : "PoC",
      "url" : "https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425/"
    }, {
      "category" : "external",
      "summary" : "National Vulnerability Database vom 2022-03-30",
      "url" : "https://nvd.nist.gov/vuln/detail/CVE-2022-1160"
    }, {
      "category" : "external",
      "summary" : "PoC",
      "url" : "https://huntr.dev/bounties/a6f3222d-2472-439d-8881-111138a5694c/"
    }, {
      "category" : "external",
      "summary" : "Fedora Security Advisory FEDORA-2022-D776FCFE60 vom 2022-04-07",
      "url" : "https://bodhi.fedoraproject.org/updates/FEDORA-2022-d776fcfe60"
    }, {
      "category" : "external",
      "summary" : "Fedora Security Advisory FEDORA-2022-44F5B2DF35 vom 2022-04-07",
      "url" : "https://bodhi.fedoraproject.org/updates/FEDORA-2022-44f5b2df35"
    }, {
      "category" : "external",
      "summary" : "Arch Linux Security Advisory ASA-202204-13 vom 2022-04-15",
      "url" : "https://security.archlinux.org/ASA-202204-13"
    }, {
      "category" : "external",
      "summary" : "Arch Linux Security Advisory ASA-202204-12 vom 2022-04-15",
      "url" : "https://security.archlinux.org/ASA-202204-12"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2022:1552 vom 2022-04-27",
      "url" : "https://access.redhat.com/errata/RHSA-2022:1552"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2022-1552 vom 2022-04-30",
      "url" : "https://linux.oracle.com/errata/ELSA-2022-1552.html"
    }, {
      "category" : "external",
      "summary" : "AVAYA Security Advisory ASA-2022-042 vom 2022-05-04",
      "url" : "https://downloads.avaya.com/css/P8/documents/101081679"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2022:1679 vom 2022-05-10",
      "url" : "https://access.redhat.com/errata/RHSA-2022:1679"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2022:2183 vom 2022-05-11",
      "url" : "https://access.redhat.com/errata/RHSA-2022:2183"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2022:2217 vom 2022-05-12",
      "url" : "https://access.redhat.com/errata/RHSA-2022:2217"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2022:2216 vom 2022-05-12",
      "url" : "https://access.redhat.com/errata/RHSA-2022:2216"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2022:2218 vom 2022-05-12",
      "url" : "https://access.redhat.com/errata/RHSA-2022:2218"
    }, {
      "category" : "external",
      "summary" : "Debian Security Advisory DLA-3011 vom 2022-05-17",
      "url" : "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2022:4690 vom 2022-05-19",
      "url" : "https://access.redhat.com/errata/RHSA-2022:4690"
    }, {
      "category" : "external",
      "summary" : "Amazon Linux Security Advisory ALAS-2022-077 vom 2022-05-20",
      "url" : "https://alas.aws.amazon.com/AL2022/ALAS-2022-077.html"
    }, {
      "category" : "external",
      "summary" : "Ubuntu Security Notice USN-5433-1 vom 2022-05-23",
      "url" : "https://ubuntu.com/security/notices/USN-5433-1"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2022:4880 vom 2022-06-02",
      "url" : "https://access.redhat.com/errata/RHSA-2022:4880"
    }, {
      "category" : "external",
      "summary" : "Amazon Linux Security Advisory ALAS2-2022-1805 vom 2022-06-07",
      "url" : "https://alas.aws.amazon.com/AL2/ALAS-2022-1805.html"
    }, {
      "category" : "external",
      "summary" : "Amazon Linux Security Advisory ALAS-2022-1597 vom 2022-06-10",
      "url" : "https://alas.aws.amazon.com/ALAS-2022-1597.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2022:5188 vom 2022-06-25",
      "url" : "https://access.redhat.com/errata/RHSA-2022:5188"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2022:5242 vom 2022-07-01",
      "url" : "https://access.redhat.com/errata/RHSA-2022:5242"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2022-5242 vom 2022-07-01",
      "url" : "http://linux.oracle.com/errata/ELSA-2022-5242.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2022:5483 vom 2022-07-01",
      "url" : "https://access.redhat.com/errata/RHSA-2022:5483"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2022-5319 vom 2022-07-01",
      "url" : "http://linux.oracle.com/errata/ELSA-2022-5319.html"
    }, {
      "category" : "external",
      "summary" : "Gentoo Linux Security Advisory GLSA-202208-32 vom 2022-08-23",
      "url" : "https://security.gentoo.org/glsa/202208-32"
    }, {
      "category" : "external",
      "summary" : "Ubuntu Security Notice USN-5613-1 vom 2022-09-15",
      "url" : "https://ubuntu.com/security/notices/USN-5613-1"
    }, {
      "category" : "external",
      "summary" : "Ubuntu Security Notice USN-5613-2 vom 2022-09-19",
      "url" : "https://ubuntu.com/security/notices/USN-5613-2"
    }, {
      "category" : "external",
      "summary" : "IBM Security Bulletin 6831853 vom 2022-10-26",
      "url" : "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-siem-application-framework-base-image-is-vulnerable-to-using-components-with-known-vulnerabilities-3/"
    }, {
      "category" : "external",
      "summary" : "Debian Security Advisory DLA-3182 vom 2022-11-08",
      "url" : "https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2023-0958 vom 2023-02-28",
      "url" : "http://linux.oracle.com/errata/ELSA-2023-0958.html"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2025-17715 vom 2025-10-10",
      "url" : "https://linux.oracle.com/errata/ELSA-2025-17715.html"
    } ],
    "source_lang" : "en-US",
    "title" : "vim: Mehrere Schwachstellen ermöglichen Codeausführung",
    "tracking" : {
      "current_release_date" : "2025-10-09T22:00:00.000+00:00",
      "generator" : {
        "date" : "2025-10-10T08:24:51.184+00:00",
        "engine" : {
          "name" : "BSI-WID",
          "version" : "1.4.0"
        }
      },
      "id" : "WID-SEC-W-2022-0032",
      "initial_release_date" : "2022-03-30T22:00:00.000+00:00",
      "revision_history" : [ {
        "date" : "2022-03-30T22:00:00.000+00:00",
        "number" : "1",
        "summary" : "Initiale Fassung"
      }, {
        "date" : "2022-04-07T22:00:00.000+00:00",
        "number" : "2",
        "summary" : "Neue Updates von Fedora aufgenommen"
      }, {
        "date" : "2022-04-18T22:00:00.000+00:00",
        "number" : "3",
        "summary" : "Neue Updates von Arch Linux aufgenommen"
      }, {
        "date" : "2022-04-26T22:00:00.000+00:00",
        "number" : "4",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2022-05-01T22:00:00.000+00:00",
        "number" : "5",
        "summary" : "Neue Updates von Oracle Linux aufgenommen"
      }, {
        "date" : "2022-05-05T22:00:00.000+00:00",
        "number" : "6",
        "summary" : "Neue Updates von AVAYA aufgenommen"
      }, {
        "date" : "2022-05-10T22:00:00.000+00:00",
        "number" : "7",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2022-05-11T22:00:00.000+00:00",
        "number" : "8",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2022-05-16T22:00:00.000+00:00",
        "number" : "9",
        "summary" : "Neue Updates von Debian aufgenommen"
      }, {
        "date" : "2022-05-18T22:00:00.000+00:00",
        "number" : "10",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2022-05-19T22:00:00.000+00:00",
        "number" : "11",
        "summary" : "Neue Updates von Amazon aufgenommen"
      }, {
        "date" : "2022-05-23T22:00:00.000+00:00",
        "number" : "12",
        "summary" : "Neue Updates von Ubuntu aufgenommen"
      }, {
        "date" : "2022-06-01T22:00:00.000+00:00",
        "number" : "13",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2022-06-07T22:00:00.000+00:00",
        "number" : "14",
        "summary" : "Neue Updates von Amazon aufgenommen"
      }, {
        "date" : "2022-06-09T22:00:00.000+00:00",
        "number" : "15",
        "summary" : "Neue Updates von Amazon aufgenommen"
      }, {
        "date" : "2022-06-26T22:00:00.000+00:00",
        "number" : "16",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2022-06-30T22:00:00.000+00:00",
        "number" : "17",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2022-07-03T22:00:00.000+00:00",
        "number" : "18",
        "summary" : "Neue Updates von Oracle Linux und Red Hat aufgenommen"
      }, {
        "date" : "2022-08-22T22:00:00.000+00:00",
        "number" : "19",
        "summary" : "Neue Updates von Gentoo aufgenommen"
      }, {
        "date" : "2022-09-15T22:00:00.000+00:00",
        "number" : "20",
        "summary" : "Neue Updates von Ubuntu aufgenommen"
      }, {
        "date" : "2022-09-19T22:00:00.000+00:00",
        "number" : "21",
        "summary" : "Neue Updates von Ubuntu aufgenommen"
      }, {
        "date" : "2022-10-25T22:00:00.000+00:00",
        "number" : "22",
        "summary" : "Neue Updates von IBM aufgenommen"
      }, {
        "date" : "2022-11-08T23:00:00.000+00:00",
        "number" : "23",
        "summary" : "Neue Updates von Debian aufgenommen"
      }, {
        "date" : "2023-02-28T23:00:00.000+00:00",
        "number" : "24",
        "summary" : "Neue Updates von Oracle Linux aufgenommen"
      }, {
        "date" : "2025-10-09T22:00:00.000+00:00",
        "number" : "25",
        "summary" : "Neue Updates von Oracle Linux aufgenommen"
      } ],
      "status" : "final",
      "version" : "25"
    }
  },
  "product_tree" : {
    "branches" : [ {
      "branches" : [ {
        "category" : "product_name",
        "name" : "Amazon Linux 2",
        "product" : {
          "name" : "Amazon Linux 2",
          "product_id" : "398363",
          "product_identification_helper" : {
            "cpe" : "cpe:/o:amazon:linux_2:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "Amazon"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "Avaya Aura Application Enablement Services",
        "product" : {
          "name" : "Avaya Aura Application Enablement Services",
          "product_id" : "T015516",
          "product_identification_helper" : {
            "cpe" : "cpe:/a:avaya:aura_application_enablement_services:-"
          }
        }
      }, {
        "category" : "product_name",
        "name" : "Avaya Aura Communication Manager",
        "product" : {
          "name" : "Avaya Aura Communication Manager",
          "product_id" : "T015126",
          "product_identification_helper" : {
            "cpe" : "cpe:/a:avaya:communication_manager:-"
          }
        }
      }, {
        "category" : "product_name",
        "name" : "Avaya Aura Experience Portal",
        "product" : {
          "name" : "Avaya Aura Experience Portal",
          "product_id" : "T015519",
          "product_identification_helper" : {
            "cpe" : "cpe:/a:avaya:aura_experience_portal:-"
          }
        }
      }, {
        "category" : "product_name",
        "name" : "Avaya Aura Session Manager",
        "product" : {
          "name" : "Avaya Aura Session Manager",
          "product_id" : "T015127",
          "product_identification_helper" : {
            "cpe" : "cpe:/a:avaya:session_manager:-"
          }
        }
      }, {
        "category" : "product_name",
        "name" : "Avaya Aura System Manager",
        "product" : {
          "name" : "Avaya Aura System Manager",
          "product_id" : "T015518",
          "product_identification_helper" : {
            "cpe" : "cpe:/a:avaya:aura_system_manager:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "Avaya"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "Debian Linux",
        "product" : {
          "name" : "Debian Linux",
          "product_id" : "2951",
          "product_identification_helper" : {
            "cpe" : "cpe:/o:debian:debian_linux:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "Debian"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "Gentoo Linux",
        "product" : {
          "name" : "Gentoo Linux",
          "product_id" : "T012167",
          "product_identification_helper" : {
            "cpe" : "cpe:/o:gentoo:linux:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "Gentoo"
    }, {
      "branches" : [ {
        "branches" : [ {
          "category" : "product_version",
          "name" : "7.5",
          "product" : {
            "name" : "IBM QRadar SIEM 7.5",
            "product_id" : "T022954",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:qradar_siem:7.5"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "7.4",
          "product" : {
            "name" : "IBM QRadar SIEM 7.4",
            "product_id" : "T024775",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:qradar_siem:7.4"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "QRadar SIEM"
      } ],
      "category" : "vendor",
      "name" : "IBM"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "Open Source Arch Linux",
        "product" : {
          "name" : "Open Source Arch Linux",
          "product_id" : "T013312",
          "product_identification_helper" : {
            "cpe" : "cpe:/o:archlinux:archlinux:-"
          }
        }
      }, {
        "branches" : [ {
          "category" : "product_version_range",
          "name" : "<8.2.4646",
          "product" : {
            "name" : "Open Source vim <8.2.4646",
            "product_id" : "T022478"
          }
        }, {
          "category" : "product_version",
          "name" : "8.2.4646",
          "product" : {
            "name" : "Open Source vim 8.2.4646",
            "product_id" : "T022478-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:vim:vim:8.2.4646"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "<8.2.4647",
          "product" : {
            "name" : "Open Source vim <8.2.4647",
            "product_id" : "T022479"
          }
        }, {
          "category" : "product_version",
          "name" : "8.2.4647",
          "product" : {
            "name" : "Open Source vim 8.2.4647",
            "product_id" : "T022479-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:vim:vim:8.2.4647"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "vim"
      } ],
      "category" : "vendor",
      "name" : "Open Source"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "Oracle Linux",
        "product" : {
          "name" : "Oracle Linux",
          "product_id" : "T004914",
          "product_identification_helper" : {
            "cpe" : "cpe:/o:oracle:linux:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "Oracle"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "Red Hat Enterprise Linux",
        "product" : {
          "name" : "Red Hat Enterprise Linux",
          "product_id" : "67646",
          "product_identification_helper" : {
            "cpe" : "cpe:/o:redhat:enterprise_linux:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "Red Hat"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "Ubuntu Linux",
        "product" : {
          "name" : "Ubuntu Linux",
          "product_id" : "T000126",
          "product_identification_helper" : {
            "cpe" : "cpe:/o:canonical:ubuntu_linux:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "Ubuntu"
    } ]
  },
  "vulnerabilities" : [ {
    "cve" : "CVE-2022-1154",
    "product_status" : {
      "known_affected" : [ "T015519", "T015518", "67646", "T015516", "T013312", "T015127", "T015126", "T012167", "T004914", "T022954", "2951", "T022478", "T000126", "398363", "T024775" ]
    },
    "release_date" : "2022-03-30T22:00:00.000+00:00",
    "title" : "CVE-2022-1154"
  }, {
    "cve" : "CVE-2022-1160",
    "product_status" : {
      "known_affected" : [ "T022954", "2951", "67646", "T022478", "T000126", "T022479", "T013312", "398363", "T024775", "T012167", "T004914" ]
    },
    "release_date" : "2022-03-30T22:00:00.000+00:00",
    "title" : "CVE-2022-1160"
  } ]
}