PatchSiren cyber security CVE debrief
CVE-2022-24112 Apache CVE debrief
CVE-2022-24112 is an Apache APISIX authentication bypass vulnerability that CISA added to its Known Exploited Vulnerabilities catalog on the same day it was published. Because it is in the KEV list, defenders should treat it as a high-priority issue and follow vendor update guidance promptly.
- Vendor
- Apache
- Product
- APISIX
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2022-08-25
- Original CVE updated
- 2022-08-25
- Advisory published
- 2022-08-25
- Advisory updated
- 2022-08-25
Who should care
Organizations running Apache APISIX, especially teams responsible for internet-facing gateways, API management layers, and patch management for Apache software, should prioritize this vulnerability.
Technical summary
The published record identifies the issue as an authentication bypass in Apache APISIX. The supplied source corpus does not include additional technical details such as affected versions, attack preconditions, or exploit mechanics, so any response should remain limited to the fact that authentication controls can be bypassed and that the issue is known to be exploited in the wild per CISA KEV.
Defensive priority
High. Presence in CISA’s Known Exploited Vulnerabilities catalog indicates demonstrated exploitation risk and warrants accelerated remediation.
Recommended defensive actions
- Apply updates per vendor instructions as referenced in the CISA KEV entry.
- Identify any Apache APISIX deployments in your environment, with special attention to exposed or internet-facing instances.
- Prioritize patching and mitigation workflows for systems that provide authentication-protected access through APISIX.
- Verify remediation status and confirm vulnerable instances are no longer present after updating.
- Monitor vendor and official vulnerability notices for any additional guidance or clarifications.
Evidence notes
Evidence is limited to the supplied official metadata: the CVE record, the CISA KEV source item, and the linked official CVE/NVD/CISA resources. The corpus confirms the vulnerability name, product, vendor, and KEV status, but does not provide version ranges, exploit details, or CVSS metrics. Published and modified dates are both 2022-08-25 in the supplied timeline and source data.
Official resources
-
CVE-2022-24112 CVE record
CVE.org
-
CVE-2022-24112 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply updates per vendor instructions.
-
Source item URL
cisa_kev
Publicly disclosed on 2022-08-25 and added to CISA’s Known Exploited Vulnerabilities catalog on 2022-08-25.