Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2021-43399 |
CWE-ID | CWE-787 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
YubiHSM2 SDK Universal components / Libraries / Programming Languages & Components yubihsm-shell Universal components / Libraries / Programming Languages & Components |
Vendor | Yubico |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU58706
Risk: Low
CVSSv3.1: 2 [CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-43399
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
Description The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in the yh_com_sign_ssh_certificate() function of libyubihsm in YubiHSM 2 SDK. A local user can pass specially crafted input via the ‘certify’ command to yubihsm-shell or via the “-a sign-ssh-certificate” command-line flag and crash the running process.
MitigationInstall updates from vendor's website.
Vulnerable software versionsYubiHSM2 SDK: 1.0.0 - 2021.08
yubihsm-shell: 1.0.0 - 2021.08
External linkshttp://www.yubico.com/support/security-advisories/ysa-2021-04
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.