// For flags

CVE-2021-38575

edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe

Severity Score

8.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

NetworkPkg/IScsiDxe has remotely exploitable buffer overflows.

NetworkPkg/IScsiDxe presenta unos desbordamientos de bĂșfer explotables de forma remota

A flaw was found in edk2. Missing checks in the IScsiHexToBin function in NetworkPkg/IScsiDxe lead to a buffer overflow allowing a remote attacker, who can inject himself in the communication between edk2 and the iSCSI target, to write arbitrary data to any address in the edk2 firmware and potentially execute code. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-08-11 CVE Reserved
  • 2021-09-21 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • 2024-10-23 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
  • CWE-124: Buffer Underwrite ('Buffer Underflow')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Tianocore
Search vendor "Tianocore"
Edk2
Search vendor "Tianocore" for product "Edk2"
<= 202105
Search vendor "Tianocore" for product "Edk2" and version " <= 202105"
-
Affected
Insyde
Search vendor "Insyde"
Kernel
Search vendor "Insyde" for product "Kernel"
5.0
Search vendor "Insyde" for product "Kernel" and version "5.0"
-
Affected
Insyde
Search vendor "Insyde"
Kernel
Search vendor "Insyde" for product "Kernel"
5.1
Search vendor "Insyde" for product "Kernel" and version "5.1"
-
Affected
Insyde
Search vendor "Insyde"
Kernel
Search vendor "Insyde" for product "Kernel"
5.2
Search vendor "Insyde" for product "Kernel" and version "5.2"
-
Affected
Insyde
Search vendor "Insyde"
Kernel
Search vendor "Insyde" for product "Kernel"
5.3
Search vendor "Insyde" for product "Kernel" and version "5.3"
-
Affected
Insyde
Search vendor "Insyde"
Kernel
Search vendor "Insyde" for product "Kernel"
5.4
Search vendor "Insyde" for product "Kernel" and version "5.4"
-
Affected
Insyde
Search vendor "Insyde"
Kernel
Search vendor "Insyde" for product "Kernel"
5.5
Search vendor "Insyde" for product "Kernel" and version "5.5"
-
Affected