CVE-2021-44732
moderate-risk
Published 2021-12-20
Mbed TLS before 3.0.1 has a double free in certain out-of-memory conditions, as demonstrated by an mbedtls_ssl_set_session() failure.
Do I need to act?
-
0.93% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (4)
References (15)
Issue Tracking
https://bugs.gentoo.org/829660
Release Notes
https://github.com/ARMmbed/mbedtls/releases
Release Notes
https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.12
Release Notes
https://github.com/ARMmbed/mbedtls/releases/tag/v2.28.0
Release Notes
https://github.com/ARMmbed/mbedtls/releases/tag/v3.1.0
Issue Tracking
https://bugs.gentoo.org/829660
Release Notes
https://github.com/ARMmbed/mbedtls/releases
Release Notes
https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.12
Release Notes
https://github.com/ARMmbed/mbedtls/releases/tag/v2.28.0
Release Notes
https://github.com/ARMmbed/mbedtls/releases/tag/v3.1.0
45
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
3/34 · Minimal
Exposure
10/34 · Low