
Cloud Vulnerability DB
A community-led vulnerabilities database
A use-after-free vulnerability (CVE-2021-42382) was discovered in BusyBox's awk applet, affecting versions 1.26-1.33.1. The vulnerability was identified in the getvar_s function when processing crafted awk patterns (Claroty Research, NVD).
The vulnerability occurs in the getvar_s function of BusyBox's awk applet when processing specially crafted awk patterns. The issue is a use-after-free condition that can be triggered when the awk applet processes untrusted input through command-line arguments. The vulnerability has been assigned a CVSS v3.1 score of 7.2 (High) with the vector CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H (NetApp Advisory).
When successfully exploited, this vulnerability can lead to denial of service conditions and potentially remote code execution. However, the impact is typically mitigated by the fact that applets usually run as separate forked processes. The vulnerability is particularly concerning as BusyBox is widely used in embedded Linux systems, with research showing it affects approximately 40% of examined embedded firmware images (JFrog Blog).
The vulnerability has been fixed in BusyBox version 1.34.0. For systems unable to upgrade, a workaround is available by compiling BusyBox without the vulnerable functionality. This can be done by commenting out CONFIG_AWK=y in the .config file after running make defconfig in BusyBox's source directory (JFrog Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."