7.5
CVE-2021-45485
- EPSS 0.52%
- Published 25.12.2021 02:15:06
- Last modified 21.11.2024 06:32:18
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
In the IPv6 implementation in the Linux kernel before 5.13.3, net/ipv6/output_core.c has an information leak because of certain use of a hash table which, although big, doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses.
Data is provided by the National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version < 5.13.3
Netapp ≫ E-series Santricity Os Controller Version-
Netapp ≫ Solidfire & Hci Management Node Version-
Netapp ≫ Brocade Fabric Operating System Firmware Version-
Oracle ≫ Communications Cloud Native Core Binding Support Function Version22.1.3
Oracle ≫ Communications Cloud Native Core Network Exposure Function Version22.1.1
Oracle ≫ Communications Cloud Native Core Policy Version22.2.0
Netapp ≫ Fabric-attached Storage 8300 Firmware Version-
Netapp ≫ Fabric-attached Storage 8700 Firmware Version-
Netapp ≫ Aff A400 Firmware Version-
Netapp ≫ Fabric-attached Storage A400 Firmware Version-
Netapp ≫ Hci Compute Node Firmware Version-
Netapp ≫ H300e Firmware Version-
Netapp ≫ H300s Firmware Version-
Netapp ≫ H410c Firmware Version-
Netapp ≫ H410s Firmware Version-
Netapp ≫ H500e Firmware Version-
Netapp ≫ H500s Firmware Version-
Netapp ≫ H610c Firmware Version-
Netapp ≫ H610s Firmware Version-
Netapp ≫ H615c Firmware Version-
Netapp ≫ H700e Firmware Version-
Netapp ≫ H700s Firmware Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.52% | 0.659 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:P/I:N/A:N
|
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
The product uses a broken or risky cryptographic algorithm or protocol.