CVE-2021-23017
high-risk
Published 2021-06-01
A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
Do I need to act?
!
73.5% chance of exploitation in next 30 days
EPSS score — higher than 26% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.7/10
High
NETWORK
/ HIGH complexity
Affected Products (20)
Enterprise Session Border Controller
Enterprise Session Border Controller
Affected Vendors
References (28)
Third Party Advisory
http://packetstormsecurity.com/files/167720/Nginx-1.20.0-Denial-Of-Service.html
Third Party Advisory
https://security.netapp.com/advisory/ntap-20210708-0006/
Third Party Advisory
http://packetstormsecurity.com/files/167720/Nginx-1.20.0-Denial-Of-Service.html
and 8 more references
63
/ 100
high-risk
Severity
23/34 · High
Exploitability
19/34 · Moderate
Exposure
21/34 · High