First published: Thu Aug 26 2021(Updated: )
A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-372.9.1.rt7.166.el8 | 0:4.18.0-372.9.1.rt7.166.el8 |
redhat/kernel | <0:4.18.0-372.9.1.el8 | 0:4.18.0-372.9.1.el8 |
redhat/kernel-rt | <0:4.18.0-305.49.1.rt7.121.el8_4 | 0:4.18.0-305.49.1.rt7.121.el8_4 |
redhat/kernel | <0:4.18.0-305.49.1.el8_4 | 0:4.18.0-305.49.1.el8_4 |
redhat/kernel | <5.15 | 5.15 |
Linux Kernel | <=5.14.21 | |
Fedora | =34 | |
Debian | =9.0 | |
Debian | =10.0 | |
NetApp Active IQ Unified Manager for VMware vSphere | ||
NetApp E-Series SANtricity OS Controller | >=11.0<=11.70.1 | |
NetApp SolidFire Enterprise SDS | ||
NetApp SolidFire & HCI Management Node | ||
All of | ||
NetApp FAS Baseboard Management Controller Firmware | ||
NetApp FAS/AFF Baseboard Management Controller | =8300 | |
All of | ||
NetApp FAS Baseboard Management Controller Firmware | ||
NetApp FAS/AFF Baseboard Management Controller | =8700 | |
All of | ||
NetApp Baseboard Management Controller Firmware | ||
NetApp FAS/AFF Baseboard Management Controller | =a400 | |
All of | ||
NetApp AFF A700s Firmware | ||
NetApp AFF A700s Firmware | ||
All of | ||
NetApp H700S | ||
NetApp H700S | ||
All of | ||
NetApp H700E | ||
NetApp H700E | ||
All of | ||
NetApp H500e Firmware | ||
NetApp H500e Firmware | ||
All of | ||
NetApp H410S | ||
NetApp H410S Firmware | ||
All of | ||
NetApp H500E | ||
NetApp H500e Firmware | ||
All of | ||
NetApp H300E | ||
NetApp H300E Firmware | ||
All of | ||
NetApp H300S Firmware | ||
NetApp H300S Firmware | ||
All of | ||
NetApp HCI Compute Node Firmware | ||
NetApp HCI Compute Node | ||
Oracle Communications Cloud Native Core Binding Support Function | =22.1.3 | |
Oracle Communications Cloud Native Core Network Exposure Function | =22.1.1 | |
Oracle Communications Cloud Native Core Policy | =22.2.0 | |
NetApp FAS Baseboard Management Controller Firmware | ||
NetApp FAS/AFF Baseboard Management Controller | =8300 | |
NetApp FAS/AFF Baseboard Management Controller | =8700 | |
NetApp Baseboard Management Controller Firmware | ||
NetApp FAS/AFF Baseboard Management Controller | =a400 | |
NetApp AFF A700s Firmware | ||
NetApp AFF A700s Firmware | ||
NetApp Baseboard Management Controller Firmware | ||
NetApp Baseboard Management Controller H700S | ||
NetApp Baseboard Management Controller H700E Firmware | ||
NetApp Baseboard Management Controller H700E Firmware | ||
NetApp Baseboard Management Controller Firmware | ||
NetApp Baseboard Management Controller H500S | ||
NetApp Baseboard Management Controller Firmware | ||
NetApp Baseboard Management Controller H410S | ||
NetApp Baseboard Management Controller H500E Firmware | ||
NetApp Baseboard Management Controller H500E Firmware | ||
NetApp Baseboard Management Controller Firmware | ||
NetApp Baseboard Management Controller H300E | ||
NetApp Baseboard Management Controller Firmware | ||
NetApp Baseboard Management Controller H300S | ||
NetApp HCI Compute Node Firmware | ||
NetApp HCI Compute Node | ||
NetApp H700S | ||
NetApp H700S | ||
NetApp H700E | ||
NetApp H700E | ||
NetApp H500e Firmware | ||
NetApp H500e Firmware | ||
NetApp H410S | ||
NetApp H410S Firmware | ||
NetApp H500E | ||
NetApp H500e Firmware | ||
NetApp H300E | ||
NetApp H300E Firmware | ||
NetApp H300S Firmware | ||
NetApp H300S Firmware | ||
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-20322 is classified as a high severity vulnerability due to its ability to enable remote users to bypass UDP source port randomization.
CVE-2021-20322 affects various versions of the Linux kernel, specifically kernel versions prior to 5.15 and specific Red Hat kernel packages.
To remediate CVE-2021-20322, update your kernel to a patched version such as 0:4.18.0-372.9.1.el8 or 5.15.
Yes, CVE-2021-20322 can be exploited by off-path remote users to scan open UDP ports effectively.
Mitigations for CVE-2021-20322 include applying the necessary kernel updates and following best practices for network security.