CVE-2021-40438
critical-risk
Published 2021-09-16
A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.
Do I need to act?
!
94.4% chance of exploitation in next 30 days
EPSS score — higher than 6% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.0/10
Critical
NETWORK
/ HIGH complexity
Affected Products (20)
References (39)
Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf
Third Party Advisory
https://security.gentoo.org/glsa/202208-20
Third Party Advisory
https://security.netapp.com/advisory/ntap-20211008-0004/
Mailing List
https://www.debian.org/security/2021/dsa-4982
Third Party Advisory
https://www.tenable.com/security/tns-2021-17
Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf
and 19 more references
82
/ 100
critical-risk
Severity
26/34 · High
Exploitability
27/34 · High
Exposure
29/34 · Critical