7

CVE-2021-3609

Exploit

.A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.

Data is provided by the National Vulnerability Database (NVD)
LinuxLinux Kernel Version >= 2.6.25 < 4.4.276
LinuxLinux Kernel Version >= 4.5 < 4.9.276
LinuxLinux Kernel Version >= 4.10 < 4.14.240
LinuxLinux Kernel Version >= 4.15 < 4.19.198
LinuxLinux Kernel Version >= 4.20 < 5.4.132
LinuxLinux Kernel Version >= 5.5.0 < 5.10.50
LinuxLinux Kernel Version >= 5.11 < 5.12.17
LinuxLinux Kernel Version >= 5.13 < 5.13.2
Redhat3scale Api Management Version2.0
RedhatBuild Of Quarkus Version1.0
RedhatVirtualization Version4.0
RedhatVirtualization Host Version4.0
RedhatEnterprise Linux Aus Version8.2
RedhatEnterprise Linux Eus Version8.1
RedhatEnterprise Linux Eus Version8.2
RedhatEnterprise Linux Eus Version8.4
NetappH300s Firmware Version-
   NetappH300s Version-
NetappH500s Firmware Version-
   NetappH500s Version-
NetappH700s Firmware Version-
   NetappH700s Version-
NetappH300e Firmware Version-
   NetappH300e Version-
NetappH500e Firmware Version-
   NetappH500e Version-
NetappH700e Firmware Version-
   NetappH700e Version-
NetappH410s Firmware Version-
   NetappH410s Version-
NetappH410c Firmware Version-
   NetappH410c Version-
NetappH610c Firmware Version-
   NetappH610c Version-
NetappH610s Firmware Version-
   NetappH610s Version-
NetappH615c Firmware Version-
   NetappH615c Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.06% 0.2
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7 1 5.9
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 6.9 3.4 10
AV:L/AC:M/Au:N/C:C/I:C/A:C
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.