
Cloud Vulnerability DB
A community-led vulnerabilities database
Improper Input Validation vulnerability (CVE-2021-41585) was identified in Apache Traffic Server's socket connection handling mechanism. The vulnerability affects Apache Traffic Server versions from 5.0.0 to 9.1.0, where an attacker could exploit this issue to prevent the server from accepting new connections (NVD, CVE).
The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. The issue is classified under CWE-20 (Improper Input Validation) and specifically affects the server's ability to handle incoming socket connections (NVD).
When successfully exploited, this vulnerability can cause the Apache Traffic Server to stop accepting new connections, effectively creating a denial of service condition. This impact is particularly significant as it affects the server's core functionality of handling incoming connections (NVD).
Fixed versions have been released and deployed across various distributions. Debian has addressed this in multiple releases: bullseye (8.1.11+ds-0+deb11u2), bookworm (9.2.5+ds-0+deb12u1), and sid (9.2.5+ds-1) (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."