First published: Tue Sep 28 2021(Updated: )
A denial-of-service (DoS) vulnerability was discovered in the web user interface of F-Secure Internet Gatekeeper. The vulnerability occurs because of an attacker can trigger assertion via malformed HTTP packet to web interface. An unauthenticated attacker could exploit this vulnerability by sending a large username parameter. A successful exploitation could lead to a denial-of-service of the product.
Credit: cve-notifications-us@f-secure.com
Affected Software | Affected Version | How to fix |
---|---|---|
F-secure Internet Gatekeeper | >=5.10<=5.50.47 |
FIX: Hotfix 9 will be published to fix this vulnerability. Download and instructions available at: https://www.f-secure.com/en/business/downloads/internet-gatekeeper
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-33600 is a denial-of-service (DoS) vulnerability discovered in the web user interface of F-Secure Internet Gatekeeper.
CVE-2021-33600 occurs because an attacker can trigger an assertion via a malformed HTTP packet to the web interface.
The impact of CVE-2021-33600 is that an unauthenticated attacker could exploit this vulnerability to cause a denial-of-service (DoS) condition.
CVE-2021-33600 affects F-Secure Internet Gatekeeper versions 5.10 to 5.50.47.
To mitigate CVE-2021-33600, it is recommended to update F-Secure Internet Gatekeeper to a version beyond 5.50.47.