CVE-2026-21381

high-risk
Published 2026-04-06

Transient DOS when receiving a service data frame with excessive length during device matching over a neighborhood awareness network protocol connection.

Do I need to act?

-
0.03% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.6/10 High
NETWORK / HIGH complexity

Affected Vendors

53
/ 100
high-risk
Severity 23/34 · High
Exploitability 0/34 · Minimal
Exposure 30/34 · Critical