
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-20231 is a security vulnerability discovered in GnuTLS, affecting versions prior to 3.7.1. The vulnerability was identified as a use-after-free issue in the client sending key_share extension, which could lead to memory corruption and other security implications. The issue was discovered and disclosed in March 2021 (GnuTLS Advisory).
The vulnerability is classified with a CVSS v3.1 Base Score of 9.8 (CRITICAL) with the vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The issue occurs specifically in TLS 1.3 implementations when the client sends a large Client Hello message, particularly when HRR (Hello Retry Request) is sent in a resumed session that previously negotiated large FFDHE parameters. The vulnerability stems from dereferencing a pointer that becomes invalid after a realloc() operation (NVD, GnuTLS Advisory).
The vulnerability's successful exploitation could lead to memory corruption, potentially resulting in disclosure of sensitive information, addition or modification of data, or Denial of Service (DoS). The critical CVSS score of 9.8 indicates the potential for high impact across confidentiality, integrity, and availability (NetApp Advisory).
The primary mitigation is to upgrade to GnuTLS version 3.7.1 or later versions, which contains the fix for this vulnerability. The fix was implemented through a patch that addresses the use-after-free issue in the key_share extension handling (GnuTLS Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."