Lucene search

K
nvd[email protected]NVD:CVE-2021-41991
HistoryOct 18, 2021 - 2:15 p.m.

CVE-2021-41991

2021-10-1814:15:10
CWE-190
web.nvd.nist.gov
1

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.069 Low

EPSS

Percentile

93.9%

The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.

Affected configurations

NVD
Node
strongswanstrongswanRange4.2.105.9.4
Node
debiandebian_linuxMatch9.0
OR
debiandebian_linuxMatch10.0
OR
debiandebian_linuxMatch11.0
Node
fedoraprojectfedoraMatch33
OR
fedoraprojectfedoraMatch34
OR
fedoraprojectfedoraMatch35
Node
siemenssinema_remote_connect_serverMatch-
Node
siemenssiplus_et_200sp_cp_1542sp-1_irc_tx_railMatch-
AND
siemenssiplus_et_200sp_cp_1542sp-1_irc_tx_rail_firmwareMatch-
Node
siemenssimatic_cp_1243-1Match-
AND
siemenssimatic_cp_1243-1_firmwareMatch-
Node
siemenssimatic_cp_1242-7_gprs_v2Match-
AND
siemenssimatic_cp_1242-7_gprs_v2_firmwareMatch-
Node
siemenssimatic_net_cp_1243-8_ircMatch-
AND
siemenssimatic_net_cp_1243-8_irc_firmwareMatch-
Node
siemensscalance_sc632-2cMatch-
AND
siemensscalance_sc632-2c_firmwareMatch-
Node
siemenssiplus_et_200sp_cp_1543sp-1_isecMatch-
AND
siemenssiplus_et_200sp_cp_1543sp-1_isec_firmwareMatch-
Node
siemenscp_1543-1Match-
AND
siemenscp_1543-1_firmwareMatch-
Node
siemenssimatic_net_cp_1545-1_firmwareMatch-
AND
siemenssimatic_net_cp_1545-1Match-
Node
siemenssimatic_cp_1543sp-1_firmwareMatch-
AND
siemenssimatic_cp_1543sp-1Match-
Node
siemenssimatic_net_cp1243-7_lte_eu_firmwareMatch-
AND
siemenssimatic_net_cp1243-7_lte_euMatch-
Node
siemenssimatic_cp_1243-7_lte\/us_firmwareMatch-
AND
siemenssimatic_cp_1243-7_lte\/usMatch-
Node
siemenssimatic_cp_1542sp-1_firmwareMatch-
AND
siemenssimatic_cp_1542sp-1Match-
Node
siemensscalance_sc636-2c_firmwareMatch-
AND
siemensscalance_sc636-2cMatch-
Node
siemenssimatic_cp_1542sp-1_irc_firmwareMatch-
AND
siemenssimatic_cp_1542sp-1_ircMatch-
Node
siemensscalance_sc642-2c_firmwareMatch-
AND
siemensscalance_sc642-2cMatch-
Node
siemensscalance_sc646-2c_firmwareRange<2.3
AND
siemensscalance_sc646-2cMatch-
Node
siemensscalance_sc622-2c_firmwareMatch-
AND
siemensscalance_sc622-2cMatch-
Node
siemenssiplus_s7-1200_cp_1243-1_rail_firmwareMatch-
AND
siemenssiplus_s7-1200_cp_1243-1_railMatch-
Node
siemenssiplus_s7-1200_cp_1243-1_firmwareMatch-
AND
siemenssiplus_s7-1200_cp_1243-1Match-
Node
siemenssiplus_net_cp_1543-1_firmwareMatch-
AND
siemenssiplus_net_cp_1543-1Match-
Node
siemenssiplus_et_200sp_cp_1543sp-1_isec_tx_rail_firmwareMatch-
AND
siemenssiplus_et_200sp_cp_1543sp-1_isec_tx_railMatch-

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.069 Low

EPSS

Percentile

93.9%