CVE-2021-22945
high-risk
Published 2021-09-23
When sending data to an MQTT server, libcurl <= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.
Do I need to act?
-
0.35% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.1/10
Critical
NETWORK
/ LOW complexity
Affected Products (19)
References (20)
Mailing List
http://seclists.org/fulldisclosure/2022/Mar/29
Third Party Advisory
https://security.gentoo.org/glsa/202212-01
Third Party Advisory
https://security.netapp.com/advisory/ntap-20211029-0003/
Third Party Advisory
https://support.apple.com/kb/HT213183
Third Party Advisory
https://www.debian.org/security/2022/dsa-5197
Mailing List
http://seclists.org/fulldisclosure/2022/Mar/29
Third Party Advisory
https://security.gentoo.org/glsa/202212-01
Third Party Advisory
https://security.netapp.com/advisory/ntap-20211029-0003/
Third Party Advisory
https://support.apple.com/kb/HT213183
Third Party Advisory
https://www.debian.org/security/2022/dsa-5197
51
/ 100
high-risk
Severity
31/34 · Critical
Exploitability
1/34 · Minimal
Exposure
19/34 · Moderate