
Cloud Vulnerability DB
A community-led vulnerabilities database
A Denial of Service (DoS) vulnerability was discovered in mbed TLS 3.0.0 and earlier versions, specifically in the mbedtlspkcs12derivation function. The vulnerability (CVE-2021-43666) was identified when processing an input password with a length of 0, causing the function to enter an infinite loop and fail to exit (NVD, GitHub Issue).
The vulnerability exists in the mbedtlspkcs12derivation function of mbed TLS when processing PKCS12 derivations. When an input password with zero length is provided to the function, it enters an infinite loop state, preventing the function from completing its execution. The vulnerability has been assigned a CVSS v3.1 score of 7.5 (HIGH) and a CVSS v2.0 score of 5.0 (MEDIUM), indicating its significant security impact (NVD).
The primary impact of this vulnerability is the potential for Denial of Service attacks. When exploited, the vulnerability can cause the affected application to become unresponsive, as the mbedtlspkcs12derivation function enters an infinite loop and fails to return either a result or an error code (GitHub Issue).
The vulnerability has been fixed in subsequent releases of mbed TLS. Users are recommended to upgrade their mbed TLS installations to versions after 3.0.0. For Debian 10 (buster) users, the fix is available in version 2.16.9-0~deb10u1 (Debian LTS).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."