CVE-2021-34426
Keybase vulnerability analysis and mitigation

Overview

A vulnerability was discovered in the Keybase Client for Windows before version 5.6.0 when a user executed the "keybase git lfs-config" command on the command-line. This vulnerability was tracked as CVE-2021-34426 (NVD).

Technical details

The vulnerability has a CVSS v3.1 score indicating local attack vector, low attack complexity, and low privileges required. The vulnerability affects the command-line interface of Keybase Client for Windows, specifically when executing the git lfs-config command (NVD).

Impact

The vulnerability could potentially lead to high impacts on confidentiality, integrity, and availability of the affected system when exploited (NVD).

Mitigation and workarounds

Users should upgrade to Keybase Client for Windows version 5.6.0 or later to address this vulnerability (NVD).

Additional resources


SourceThis report was generated using AI

Related Keybase vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2021-34422CRITICAL9
  • KeybaseKeybase
  • keybase
NoYesNov 11, 2021
CVE-2021-34426HIGH7.8
  • KeybaseKeybase
  • keybase
NoYesDec 14, 2021
CVE-2021-23827MEDIUM5.5
  • KeybaseKeybase
  • cpe:2.3:a:keybase:keybase
NoYesFeb 23, 2021
CVE-2021-34421MEDIUM4.3
  • KeybaseKeybase
  • cpe:2.3:a:keybase:keybase
NoYesNov 11, 2021
CVE-2022-22779LOW3.7
  • Zoom ClientZoom Client
  • keybase
NoYesFeb 09, 2022

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management