CVE-2021-41033
moderate-risk
Published 2021-09-13
In all released versions of Eclipse Equinox, at least until version 4.21 (September 2021), installation can be vulnerable to man-in-the-middle attack if using p2 repos that are HTTP; that can then be exploited to serve incorrect p2 metadata and entirely alter the local installation, particularly by installing plug-ins that may then run malicious code.
Do I need to act?
-
0.43% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.1/10
High
NETWORK
/ HIGH complexity
Affected Products (2)
Equinox
Equinox
Affected Vendors
References (2)
Vendor Advisory
https://bugs.eclipse.org/bugs/show_bug.cgi?id=575688
Vendor Advisory
https://bugs.eclipse.org/bugs/show_bug.cgi?id=575688
33
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
2/34 · Minimal
Exposure
7/34 · Low