CVE-2021-21296
low-risk
Published 2021-02-10
Fleet is an open source osquery manager. In Fleet before version 3.7.0 a malicious actor with a valid node key can send a badly formatted request that causes the Fleet server to exit, resulting in denial of service. This is possible only while a live query is currently ongoing. We believe the impact of this vulnerability to be low given the requirement that the actor has a valid node key. There is no information disclosure, privilege escalation, or code execution. The issue is fixed in Fleet 3.7.0.
Do I need to act?
-
0.68% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
2
CVSS 2.7/10
Low
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (6)
Third Party Advisory
https://github.com/fleetdm/fleet/security/advisories/GHSA-xwh8-9p3f-3x45
Third Party Advisory
https://github.com/fleetdm/fleet/security/advisories/GHSA-xwh8-9p3f-3x45
21
/ 100
low-risk
Severity
14/34 · Moderate
Exploitability
2/34 · Minimal
Exposure
5/34 · Minimal