4.3
CVSSv2

CVE-2021-3449

Published: 25/03/2021 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 385
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

On March 25, 2021, the OpenSSL Project released a security advisory, OpenSSL Security Advisory [25 March 2021], that disclosed two vulnerabilities. Exploitation of these vulnerabilities could allow an malicious user to use a valid non-certificate authority (CA) certificate to act as a CA and sign a certificate for an arbitrary organization, user or device, or to cause a denial of service (DoS) condition. This advisory is available at the following link:tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl

debian debian linux 9.0

debian debian linux 10.0

freebsd freebsd 12.2

netapp santricity smi-s provider -

netapp snapcenter -

netapp oncommand workflow automation -

netapp storagegrid -

netapp oncommand insight -

netapp ontap select deploy administration utility -

netapp active iq unified manager -

netapp cloud volumes ontap mediator -

netapp e-series performance analyzer -

tenable tenable.sc

tenable nessus

tenable nessus network monitor 5.11.1

tenable nessus network monitor 5.12.0

tenable nessus network monitor 5.12.1

tenable nessus network monitor 5.13.0

tenable nessus network monitor 5.11.0

tenable log correlation engine

fedoraproject fedora 34

mcafee web gateway cloud service 10.1.1

mcafee web gateway cloud service 9.2.10

mcafee web gateway cloud service 8.2.19

mcafee web gateway 10.1.1

mcafee web gateway 9.2.10

mcafee web gateway 8.2.19

checkpoint quantum security management firmware r80.40

checkpoint quantum security management firmware r81

checkpoint multi-domain management firmware r80.40

checkpoint multi-domain management firmware r81

checkpoint quantum security gateway firmware r80.40

checkpoint quantum security gateway firmware r81

oracle peoplesoft enterprise peopletools 8.57

oracle jd edwards world security a9.4

oracle primavera unifier

oracle peoplesoft enterprise peopletools 8.58

oracle primavera unifier 19.12

oracle enterprise manager for storage management 13.4.0.0

oracle primavera unifier 20.12

oracle zfs storage appliance kit 8.8

oracle secure global desktop 5.6

oracle graalvm 20.3.1.2

oracle graalvm 21.0.0.2

oracle graalvm 19.3.5

oracle mysql server

oracle mysql workbench

oracle peoplesoft enterprise peopletools 8.59

oracle essbase 21.2

oracle mysql connectors

oracle jd edwards enterpriseone tools

oracle primavera unifier 21.12

oracle secure backup

oracle communications communications policy management 12.6.0.0.0

sonicwall sma100 firmware

sonicwall capture client 3.5

sonicwall sonicos 7.0.1.0

siemens ruggedcom rcm1224 firmware

siemens scalance lpe9403 firmware

siemens scalance m-800 firmware

siemens scalance s602 firmware

siemens scalance s612 firmware

siemens scalance s615 firmware

siemens scalance s623 firmware

siemens scalance s627-2m firmware

siemens scalance sc-600 firmware

siemens scalance w700 firmware

siemens scalance w1700 firmware

siemens scalance xb-200 firmware

siemens scalance xc-200 firmware

siemens scalance xf-200ba firmware

siemens scalance xm-400 firmware

siemens scalance xp-200 firmware

siemens scalance xr-300wg firmware

siemens scalance xr524-8c firmware

siemens scalance xr526-8c firmware

siemens scalance xr528-6m firmware

siemens scalance xr552-12 firmware

siemens simatic cloud connect 7 firmware

siemens simatic cloud connect 7 firmware -

siemens simatic cp 1242-7 gprs v2 firmware

siemens simatic cp 1242-7 gprs v2 firmware -

siemens simatic hmi basic panels 2nd generation firmware

siemens simatic hmi comfort outdoor panels firmware

siemens simatic hmi ktp mobile panels firmware

siemens simatic mv500 firmware

siemens simatic net cp 1243-1 firmware

siemens simatic net cp1243-7 lte eu firmware

siemens simatic net cp1243-7 lte us firmware

siemens simatic net cp 1243-8 irc firmware

siemens simatic net cp 1542sp-1 irc firmware

siemens simatic net cp 1543-1 firmware

siemens simatic net cp 1543sp-1 firmware

siemens simatic net cp 1545-1 firmware

siemens simatic pcs 7 telecontrol firmware

siemens simatic pcs neo firmware

siemens simatic pdm firmware

siemens simatic process historian opc ua server firmware

siemens simatic rf166c firmware

siemens simatic rf185c firmware

siemens simatic rf186c firmware

siemens simatic rf186ci firmware

siemens simatic rf188c firmware

siemens simatic rf188ci firmware

siemens simatic rf360r firmware

siemens simatic s7-1200 cpu 1211c firmware

siemens simatic s7-1200 cpu 1212c firmware

siemens simatic s7-1200 cpu 1212fc firmware

siemens simatic s7-1200 cpu 1214 fc firmware

siemens simatic s7-1200 cpu 1214c firmware

siemens simatic s7-1200 cpu 1215 fc firmware

siemens simatic s7-1200 cpu 1215c firmware

siemens simatic s7-1200 cpu 1217c firmware

siemens simatic s7-1500 cpu 1518-4 pn/dp mfp firmware

siemens sinamics connect 300 firmware

siemens tim 1531 irc firmware

siemens simatic wincc runtime advanced

siemens sinema server 14.0

siemens simatic logon

siemens simatic logon 1.5

siemens simatic wincc telecontrol -

siemens sinec nms 1.0

siemens sinec pni -

siemens tia administrator

siemens sinumerik opc ua server

siemens sinec infrastructure network services

nodejs node.js

Vendor Advisories

Synopsis Moderate: OpenShift Container Platform 4103 security update Type/Severity Security Advisory: Moderate Topic Red Hat OpenShift Container Platform release 4103 is now available withupdates to packages and images that fix several bugs and add enhancementsRed Hat Product Security has rated this update as having a security impact of ...
A NULL pointer dereference was found in the signature_algorithms processing in OpenSSL, a Secure Sockets Layer toolkit, which could result in denial of service Additional details can be found in the upstream advisory: wwwopensslorg/news/secadv/20210325txt For the stable distribution (buster), this problem has been fixed in version 111 ...
A flaw was found in openssl A server crash and denial of service attack could occur if a client sends a TLSv12 renegotiation ClientHello and omits the signature_algorithms extension but includes a signature_algorithms_cert extension The highest threat from this vulnerability is to system availability ...
On March 25, 2021, the OpenSSL Project released a security advisory, OpenSSL Security Advisory [25 March 2021], that disclosed two vulnerabilities Exploitation of these vulnerabilities could allow an attacker to use a valid non-certificate authority (CA) certificate to act as a CA and sign a certificate for an arbitrary organization, user or devic ...
A null pointer dereference flaw was found in openssl A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service The highest threat from this vulnerability is to system availability (CVE-2020-1971) Calls to EVP_CipherUpdate, EVP_En ...
A flaw was found in openssl A server crash and denial of service attack could occur if a client sends a TLSv12 renegotiation ClientHello and omits the signature_algorithms extension but includes a signature_algorithms_cert extension The highest threat from this vulnerability is to system availability (CVE-2021-3449) A flaw was found in openssl ...
An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client If a TLSv12 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a ...
A vulnerability (CVE-2021-3449) exists in JP1/Base and JP1/ File Transmission Server/FTP Affected products and versions are listed below Please upgrade your version to the appropriate version ...
Multiple vulnerabilities have been found in Hitachi Ops Center Common Services CVE-2021-3449, CVE-2021-3450, CVE-2021-23840, CVE-2021-23841 Affected products and versions are listed below Please upgrade your version to the appropriate version ...
Multiple vulnerabilities have been found in Hitachi Ops Center Analyzer viewpoint CVE-2020-1971, CVE-2021-3393, CVE-2021-3449, CVE-2021-3450, CVE-2021-23840, CVE-2021-23841 Affected products and versions are listed below Please upgrade your version to the appropriate version ...
Tenablesc leverages third-party software to help provide underlying functionality One of the third-party components (OpenSSL) was found to contain vulnerabilities, and updated versions have been made available by the providers Out of caution and in line with good practice, Tenable opted to upgrade the bundled OpenSSL components to address the p ...
Nessus leverages third-party software to help provide underlying functionality One of the third-party components (OpenSSL) was found to contain vulnerabilities, and updated versions have been made available by the providers Out of caution and in line with good practice, Tenable opted to upgrade the bundled OpenSSL components to address the poten ...
Nessus Network Monitor leverages third-party software to help provide underlying functionality One of the third-party components (OpenSSL) was found to contain vulnerabilities, and updated versions have been made available by the providers Out of caution and in line with good practice, Tenable opted to upgrade the bundled OpenSSL components to a ...
Tenable Log Correlation Engine leverages third-party software to help provide underlying functionality Two separate third-party components (OpenSSL, jQuery) were found to contain vulnerabilities, and updated versions have been made available by the providers Out of caution and in line with good practice, Tenable opted to upgrade the bundled Open ...

ICS Advisories

Hitachi Energy APM Edge
Critical Infrastructure Sectors: Energy
Siemens SINEC INS
Critical Infrastructure Sectors: Energy

Mailing Lists

On Sun, 28 Mar 2021 18:35:29 +0000 Mark J Cox <mark () openssl org> wrote: Surely you meant to indicate a day (approximately one full rotation of the Earth) here and not a year (one orbit of the Earth around the Sun) Kind regards, jer ...
Hi, As many of you are aware, the OpenSSL project provides pre-notification of vulnerability disclosures The way they do it is by posting to the public OpenSSL mailing lists (see "Forthcoming OpenSSL release" below) and by contacting specific other projects/channels with an offer to provide the actual detail more privately only to those interest ...
The usual process for OpenSSL pre-notifications (as per our security policy at wwwopensslorg/policies/secpolicyhtml ) is to give a heads up message to the private distros list and ask vendors who want details to reconfirm they will abide by the embargo guidelines For those that do, we then add to a private github fork where they can vi ...
On Sat, Mar 27, 2021 at 11:05 AM Solar Designer <solar () openwall com> wrote: While I am neither Wind River nor OpenSSL, I did notice on the linked page that the upper right hand corner says: Released: Apr 22, 2020 Updated: Mar 22, 2021 Without knowing much else, it feels like someone accidentally put a "released" date as last year an ...

Github Repositories

CVE-2021-3449 OpenSSL denial-of-service exploit πŸ‘¨πŸ»β€πŸ’»

CVE-2021-3449 OpenSSL <111k DoS exploit Usage: go run -host hostname:port This program implements a proof-of-concept exploit of CVE-2021-3449 affecting OpenSSL servers pre-111k if TLSv12 secure renegotiation is accepted It connects to a TLSv12 server and immediately initiates an RFC 5746 "secure renegotiation" The attack involves a maliciously-crafted

CVE-2021-3449 OpenSSL <111k DoS exploit Usage: go run -host hostname:port This program implements a proof-of-concept exploit of CVE-2021-3449 affecting OpenSSL servers pre-111k if TLSv12 secure renegotiation is accepted It connects to a TLSv12 server and immediately initiates an RFC 5746 "secure renegotiation" The attack involves a maliciously-crafted

PenTest during a pool in Epitech

NSAPool-PenTest PenTest audit What we found At first, we can notice that there is more than one page we can access to At looking at it more closely we can see that we can access it by two ways : HTTPS and HTTP One of the solution could be to only authorize HTTPS connection for more safety Then by pinging the website with the command : ping labepidoceu We succeeded in getti

CVE info of GIT commits for OpenSSL

openssl-cve Table of Contents Overview YAML Format Proposal for CVE Git Commits YAML Format Proposal for CVE Checking Rules Help is Needed from OpenSSL Developers Overview CVE info of GIT commits for OpenSSL This repo provides CVE info of GIT commits for the OpenSSL git repo Such CVE info can be used by the bomsh tool to create the CVE database for OpenSSL, which is then use

Git Repository for my Bachelor Thesis "Analysis of attack vectors for embedded Linux"

Analysis of attack vectors for embedded Linux Git Repository for my Bachelor Thesis "Analysis of attack vectors for embedded Linux" The goal of this bachelor thesis was to create a training course that would give developers a brief insight into how quickly security vulnerabilities can sometimes be exploited Unpatched systems can often be very easily taken over or cri

Recent Articles

OpenSSL shuts down two high-severity bugs: Flaws enable cert shenanigans, denial-of-service attacks
The Register β€’ Thomas Claburn in San Francisco β€’ 25 Mar 2021

Debian, Ubuntu ahead of the curve in patching at least – don't be late yourself How do you fix a problem like open-source security? Google has an idea, though constraints may not go down well

Two high-severity vulnerabilities in the OpenSSL software library were disclosed on Thursday alongside the release of a patched version of the software, OpenSSL 1.1.1k. OpenSSL is widely used to implement the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols, which support encrypted network connections. Alternatives include BoringSSL and LibreSSL, among others. The first flaw, a certificate check bypass (CVE-2021-3450), arose as a result of code implemented in v1.1.1h to pe...

References

CWE-476https://www.openssl.org/news/secadv/20210325.txthttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJdhttps://www.debian.org/security/2021/dsa-4875https://security.netapp.com/advisory/ntap-20210326-0006/https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.aschttp://www.openwall.com/lists/oss-security/2021/03/27/1http://www.openwall.com/lists/oss-security/2021/03/27/2http://www.openwall.com/lists/oss-security/2021/03/28/3http://www.openwall.com/lists/oss-security/2021/03/28/4https://security.gentoo.org/glsa/202103-03https://www.tenable.com/security/tns-2021-06https://www.tenable.com/security/tns-2021-05https://kc.mcafee.com/corporate/index?page=content&id=SB10356https://www.tenable.com/security/tns-2021-09https://security.netapp.com/advisory/ntap-20210513-0002/https://www.tenable.com/security/tns-2021-10https://www.oracle.com/security-alerts/cpuApr2021.htmlhttps://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdfhttps://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013https://www.oracle.com//security-alerts/cpujul2021.htmlhttps://lists.debian.org/debian-lts-announce/2021/08/msg00029.htmlhttps://www.oracle.com/security-alerts/cpuoct2021.htmlhttps://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdfhttps://www.oracle.com/security-alerts/cpuapr2022.htmlhttps://www.oracle.com/security-alerts/cpujul2022.htmlhttps://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/https://access.redhat.com/errata/RHSA-2022:0056https://nvd.nist.govhttps://github.com/terorie/cve-2021-3449https://www.cisa.gov/uscert/ics/advisories/icsa-21-336-06https://www.debian.org/security/2021/dsa-4875https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd