 
        | Release Date: | 2022-07-25 | |
| Impact: | None | What is this? | 
LibreOffice supports the storage of passwords for web connections in the user's configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where master key was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords vulerable to a brute force attack if an attacker has access to the users stored config. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7; 7.3 versions prior to 7.3.3.
See more information about CVE-2022-26307 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS metrics and score provided are preliminary and subject to review.
| Base Score: | 8.8 | 
| Vector String: | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | 
| Version: | 3.0 | 
| Attack Vector: | Network | 
| Attack Complexity: | Low | 
| Privileges Required: | Low | 
| User Interaction: | None | 
| Scope: | Unchanged | 
| Confidentiality Impact: | High | 
| Integrity Impact: | High | 
| Availability Impact: | High | 
| Platform | Errata | Release Date | 
| Oracle Linux version 8 (libreoffice) | ELSA-2023-0089 | 2023-01-18 | 
| Oracle Linux version 9 (libreoffice) | ELSA-2023-0304 | 2023-01-24 | 
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: