
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability CVE-2021-23555 affects the vm2 package versions before 3.9.6. This sandbox bypass vulnerability allows attackers to gain direct access to host error objects generated by node internals during generation of stacktraces, which can lead to execution of arbitrary code on the host machine. The vulnerability was disclosed on December 6, 2021, and was patched in version 3.9.6 released on February 8, 2022 (Snyk Advisory, GitHub Commit).
The vulnerability has been assigned a CVSS v3.1 base score of 9.8 CRITICAL with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The vulnerability allows attackers to bypass the sandbox protection by accessing host error objects that are generated during stacktrace creation. This access can be leveraged to execute arbitrary code on the host machine, effectively breaking out of the sandbox environment (Snyk Advisory).
The vulnerability can result in a complete compromise of the system's confidentiality, integrity, and availability. Successful exploitation allows attackers to execute arbitrary code on the host machine, potentially leading to full system compromise. The vulnerability affects applications that use vm2 for sandboxing untrusted code execution (Snyk Advisory).
The recommended mitigation is to upgrade vm2 to version 3.9.6 or higher, which contains the security fix for this vulnerability. The fix was implemented through internal restructuring and security improvements (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."