
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical security vulnerability was identified in the vec-const crate versions prior to 2.0.0 for Rust, tracked as CVE-2021-45680. The vulnerability was discovered and disclosed on December 26, 2021, affecting the vec-const project's implementation of vector construction from constant slices (NVD CVE, MITRE CVE).
The vulnerability stems from an implementation flaw where the crate attempts to construct a Vec from a pointer to a const slice, which can lead to memory corruption. The severity of this vulnerability is rated as HIGH with a CVSS v3.1 Base Score of 7.5 (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The vulnerability is classified as CWE-787 (Out-of-bounds Write) (NVD CVE).
The vulnerability can result in memory corruption when exploited, potentially leading to system instability or crashes. The high CVSS score particularly reflects the significant impact on system availability, though confidentiality and integrity impacts are not directly indicated (NVD CVE).
The vulnerability has been addressed in version 2.0.0 of the vec-const crate. Users are strongly advised to upgrade to this version or later to mitigate the security risk (NVD CVE).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."