CVE-2021-28660
moderate-risk
Published 2021-03-17
rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows writing beyond the end of the ->ssid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally used for drivers/staging/* (unfinished work); however, system integrators may have situations in which a drivers/staging issue is relevant to their own customer base.
Do I need to act?
-
0.32% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
ADJACENT_NETWORK
/ LOW complexity
Affected Products (12)
Affected Vendors
References (14)
Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/11/18/1
Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/11/21/2
Third Party Advisory
https://security.netapp.com/advisory/ntap-20210507-0008/
Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/11/18/1
Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/11/21/2
Third Party Advisory
https://security.netapp.com/advisory/ntap-20210507-0008/
45
/ 100
moderate-risk
Severity
27/34 · High
Exploitability
1/34 · Minimal
Exposure
17/34 · Moderate