Lucene search

K
nvd[email protected]NVD:CVE-2021-20322
HistoryFeb 18, 2022 - 6:15 p.m.

CVE-2021-20322

2022-02-1818:15:09
CWE-330
web.nvd.nist.gov

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

0.003 Low

EPSS

Percentile

68.2%

A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.

Affected configurations

NVD
Node
linuxlinux_kernelRange5.14.21
Node
fedoraprojectfedoraMatch34
Node
debiandebian_linuxMatch9.0
OR
debiandebian_linuxMatch10.0
Node
netappactive_iq_unified_managerMatch-vmware_vsphere
OR
netappe-series_santricity_os_controllerRange11.011.70.1
OR
netappsolidfire\,_enterprise_sds_\&_hci_storage_nodeMatch-
OR
netappsolidfire_\&_hci_management_nodeMatch-
Node
netappfas_baseboard_management_controller_firmwareMatch-
AND
netappfas_baseboard_management_controllerMatch8300
Node
netappfas_baseboard_management_controller_firmwareMatch-
AND
netappfas_baseboard_management_controllerMatch8700
Node
netappaff_baseboard_management_controller_firmwareMatch-
AND
netappaff_baseboard_management_controllerMatcha400
Node
netappaff_a700sMatch-
AND
netappaff_a700s_firmwareMatch-
Node
netapph700sMatch-
AND
netapph700s_firmwareMatch-
Node
netapph700eMatch-
AND
netapph700e_firmwareMatch-
Node
netapph500sMatch-
AND
netapph500s_firmwareMatch-
Node
netapph410sMatch-
AND
netapph410s_firmwareMatch-
Node
netapph500eMatch-
AND
netapph500e_firmwareMatch-
Node
netapph300e_firmwareMatch-
AND
netapph300eMatch-
Node
netapph300s_firmwareMatch-
AND
netapph300sMatch-
Node
netapphci_compute_nodeMatch-
AND
netapphci_compute_node_firmwareMatch-
Node
oraclecommunications_cloud_native_core_binding_support_functionMatch22.1.3
OR
oraclecommunications_cloud_native_core_network_exposure_functionMatch22.1.1
OR
oraclecommunications_cloud_native_core_policyMatch22.2.0

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

0.003 Low

EPSS

Percentile

68.2%