CVE-2021-28484
Linux Fedora vulnerability analysis and mitigation

Overview

The yubihsm-connector utility, which provides an HTTP interface for interacting with a YubiHSM 2, contained a vulnerability (CVE-2021-28484) that was discovered on March 8, 2021, and patched on April 14, 2021. The vulnerability affected all versions up to and including 3.0.0 of the connector utility, which was distributed as part of the YubiHSM 2 SDK 2021.03 release (Yubico Advisory).

Technical details

The vulnerability stemmed from the yubihsm-connector's failure to properly validate request lengths before forwarding them to the YubiHSM 2 device. When receiving HTTP POST requests to the /api/connector endpoint with 0-2 bytes of data in the request body, the connector would enter an infinite loop with no exit condition. This occurred because the YubiHSM 2 would not send any response to commands less than three bytes, while the connector used a locking mechanism to ensure no additional commands were sent until receiving a response for the previous request (Yubico Advisory).

Impact

The vulnerability could lead to a denial of service condition where the yubihsm-connector would become stuck in a loop waiting for the YubiHSM to send data, preventing any further operations until the connector was restarted. This affected multiple components in the YubiHSM 2 SDK ecosystem, including the yubihsm-shell, the PKCS#11 library (yubihsm_pkcs11), and the YubiHSM Key Storage Provider (KSP) for Windows (Yubico Advisory).

Mitigation and workarounds

The vulnerability was fixed in version 3.0.1 of yubihsm-connector. For systems unable to update immediately, Yubico recommended two mitigation strategies: 1) Implementing mutual TLS authentication with an HTTP proxy and reconfiguring the connector to only accept requests from that proxy, or 2) Placing servers with yubihsm-connector on a separate network segment with restricted access (Yubico Advisory).

Additional resources


SourceThis report was generated using AI

Related Linux Fedora vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66287HIGH8.8
  • Alma LinuxAlma Linux
  • webkitgtk-doc
NoYesDec 04, 2025
CVE-2025-12744HIGH8.8
  • Linux FedoraLinux Fedora
  • python3-abrt-container-addon
NoYesDec 03, 2025
CVE-2025-13601HIGH7.7
  • CBL MarinerCBL Mariner
  • glib2-devel
NoYesNov 26, 2025
CVE-2025-13947HIGH7.4
  • Alma LinuxAlma Linux
  • webkitgtk6.0
NoYesDec 03, 2025
CVE-2025-63938MEDIUM6.5
  • Linux DebianLinux Debian
  • tinyproxy
NoYesNov 26, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management