Lucene search

K
nvd[email protected]NVD:CVE-2021-3772
HistoryMar 02, 2022 - 11:15 p.m.

CVE-2021-3772

2022-03-0223:15:09
CWE-354
web.nvd.nist.gov
1

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H

0.004 Low

EPSS

Percentile

72.8%

A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.

Affected configurations

NVD
Node
linuxlinux_kernelRange<5.15.0
Node
redhatenterprise_linuxMatch8.0
Node
debiandebian_linuxMatch9.0
OR
debiandebian_linuxMatch10.0
Node
oraclecommunications_cloud_native_core_binding_support_functionMatch22.1.3
OR
oraclecommunications_cloud_native_core_network_exposure_functionMatch22.1.1
OR
oraclecommunications_cloud_native_core_policyMatch22.2.0
Node
netappe-series_santricity_os_controllerMatch11.0
OR
netappe-series_santricity_os_controllerMatch11.0.0
OR
netappe-series_santricity_os_controllerMatch11.20
OR
netappe-series_santricity_os_controllerMatch11.25
OR
netappe-series_santricity_os_controllerMatch11.30
OR
netappe-series_santricity_os_controllerMatch11.30.5r3
OR
netappe-series_santricity_os_controllerMatch11.40
OR
netappe-series_santricity_os_controllerMatch11.40.3r2
OR
netappe-series_santricity_os_controllerMatch11.40.5
OR
netappe-series_santricity_os_controllerMatch11.50.1
OR
netappe-series_santricity_os_controllerMatch11.50.2-
OR
netappe-series_santricity_os_controllerMatch11.50.2p1
OR
netappe-series_santricity_os_controllerMatch11.60
OR
netappe-series_santricity_os_controllerMatch11.60.0
OR
netappe-series_santricity_os_controllerMatch11.60.1
OR
netappe-series_santricity_os_controllerMatch11.60.3
OR
netappe-series_santricity_os_controllerMatch11.70.1
OR
netappe-series_santricity_os_controllerMatch11.70.2
OR
netappsolidfire_\&_hci_management_nodeMatch-
OR
netappsolidfire_\&_hci_storage_nodeMatch-
OR
netapphci_compute_nodeMatch-
Node
netapph300s_firmwareMatch-
AND
netapph300sMatch-
Node
netapph500s_firmwareMatch-
AND
netapph500sMatch-
Node
netapph700s_firmwareMatch-
AND
netapph700sMatch-
Node
netapph410s_firmwareMatch-
AND
netapph410sMatch-
Node
netapph410c_firmwareMatch-
AND
netapph410cMatch-
Node
netapph610c_firmwareMatch-
AND
netapph610cMatch-
Node
netapph610s_firmwareMatch-
AND
netapph610sMatch-
Node
netapph615c_firmwareMatch-
AND
netapph615cMatch-

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H

0.004 Low

EPSS

Percentile

72.8%