7.5

CVE-2021-45485

In the IPv6 implementation in the Linux kernel before 5.13.3, net/ipv6/output_core.c has an information leak because of certain use of a hash table which, although big, doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses.

Data is provided by the National Vulnerability Database (NVD)
LinuxLinux Kernel Version < 5.13.3
NetappAff A400 Firmware Version-
   NetappAff A400 Version-
NetappHci Compute Node Firmware Version-
   NetappHci Compute Node Version-
NetappH300e Firmware Version-
   NetappH300e Version-
NetappH300s Firmware Version-
   NetappH300s Version-
NetappH410c Firmware Version-
   NetappH410c Version-
NetappH410s Firmware Version-
   NetappH410s Version-
NetappH500e Firmware Version-
   NetappH500e Version-
NetappH500s Firmware Version-
   NetappH500s Version-
NetappH610c Firmware Version-
   NetappH610c Version-
NetappH610s Firmware Version-
   NetappH610s Version-
NetappH615c Firmware Version-
   NetappH615c Version-
NetappH700e Firmware Version-
   NetappH700e Version-
NetappH700s Firmware Version-
   NetappH700s Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.52% 0.659
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:P/I:N/A:N
CWE-327 Use of a Broken or Risky Cryptographic Algorithm

The product uses a broken or risky cryptographic algorithm or protocol.