{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-2226","assignerOrgId":"f16b083a-5664-49f3-a51e-8d479e5ed7fe","assignerShortName":"mozilla","dateUpdated":"2025-04-15T15:01:41.069Z","dateReserved":"2022-06-27T00:00:00.000Z","datePublished":"2022-12-22T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"f16b083a-5664-49f3-a51e-8d479e5ed7fe","shortName":"mozilla","dateUpdated":"2022-12-22T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"An OpenPGP digital signature includes information about the date when the signature was created. When displaying an email that contains a digital signature, the email's date will be shown. If the dates were different, then Thunderbird didn't report the email as having an invalid signature. If an attacker performed a replay attack, in which an old email with old contents are resent at a later time, it could lead the victim to believe that the statements in the email are current. Fixed versions of Thunderbird will require that the signature's date roughly matches the displayed date of the email. This vulnerability affects Thunderbird < 102 and Thunderbird < 91.11."}],"affected":[{"vendor":"Mozilla","product":"Thunderbird","versions":[{"version":"unspecified","lessThan":"102","status":"affected","versionType":"custom"},{"version":"unspecified","lessThan":"91.11","status":"affected","versionType":"custom"}]}],"references":[{"url":"https://www.mozilla.org/security/advisories/mfsa2022-26/"},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1775441"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"An email with a mismatching OpenPGP signature date was accepted as valid"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T00:32:09.375Z"},"title":"CVE Program Container","references":[{"url":"https://www.mozilla.org/security/advisories/mfsa2022-26/","tags":["x_transferred"]},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1775441","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-294","lang":"en","description":"CWE-294 Authentication Bypass by Capture-replay"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":6.5,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","integrityImpact":"HIGH","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-04-15T15:00:48.251530Z","id":"CVE-2022-2226","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-15T15:01:41.069Z"}}]}}