The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade cargo
to version 0.67.1 or higher.
cargo is a Cargo, a package manager for Rust.
Affected versions of this package are vulnerable to Key Exchange without Entity Authentication due to missing SSH host key and server's public key verifications when cloning indexes and dependencies via SSH. An attacker could exploit this to perform man-in-the-middle (MITM) attacks.
Note:
Even if you don't explicitly use SSH for alternate registry indexes or crate dependencies, you might be affected by this vulnerability if you have configured git to replace HTTPS connections to GitHub with SSH (through git's [url.<base>.insteadOf
][1] setting), as that'd cause you to clone the crates.io index through SSH.
If an upgrade is impossible, it is recommended to configure Cargo to use the git
CLI instead of its built-in git support. That way, all git network operations will be performed by the git
CLI, which is not affected by this vulnerability. You can do so by adding this snippet to your Cargo configuration file:
[net]
git-fetch-with-cli = true