// For flags

CVE-2021-4122

cryptsetup: disable encryption via header rewrite

Severity Score

4.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

It was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium, such as a flash disk, could use this flaw to force a user into permanently disabling the encryption layer of that medium.

Se ha detectado que un encabezado LUKS especialmente diseñada podía engañar a cryptsetup para que deshabilitara el cifrado durante la recuperación del dispositivo. Un atacante con acceso físico al medio, como un disco flash, podría usar este fallo para forzar a un usuario a deshabilitar permanentemente la capa de cifrado de ese medio.

Red Hat Single Sign-On is an integrated sign-on solution, available as a Red Hat JBoss Middleware for OpenShift containerized image. The Red Hat Single Sign-On for OpenShift image provides an authentication server that you can use to log in centrally, log out, and register. You can also manage user accounts for web applications, mobile applications, and RESTful web services. This erratum releases a new image for Red Hat Single Sign-On 7.4.10 for use within the OpenShift Container Platform 3.10, OpenShift Container Platform 3.11, and within the OpenShift Container Platform 4.3 cloud computing Platform-as-a-Service for on-premise or private cloud deployments, aligning with the standalone product release. Issues addressed include code execution, deserialization, and remote SQL injection vulnerabilities.

*Credits: N/A
CVSS Scores
Attack Vector
Physical
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Physical
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Complete
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-12-15 CVE Reserved
  • 2022-02-02 CVE Published
  • 2024-08-03 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-345: Insufficient Verification of Data Authenticity
  • CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cryptsetup Project
Search vendor "Cryptsetup Project"
Cryptsetup
Search vendor "Cryptsetup Project" for product "Cryptsetup"
< 2.3.7
Search vendor "Cryptsetup Project" for product "Cryptsetup" and version " < 2.3.7"
-
Affected
Cryptsetup Project
Search vendor "Cryptsetup Project"
Cryptsetup
Search vendor "Cryptsetup Project" for product "Cryptsetup"
>= 2.4.0 < 2.4.3
Search vendor "Cryptsetup Project" for product "Cryptsetup" and version " >= 2.4.0 < 2.4.3"
-
Affected