HomeF5CVE-2021-3618

CVE-2021-3618

HIGH
7.4CVSS
Published: 2022-03-23
Updated: 2024-11-21
AI Analysis

Description

ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector
network
Complexity
high
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
none
Weaknesses
CWE-295CWE-295

Metadata

Primary Vendor
F5
Published
3/23/2022
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

f5 : nginxsendmail : sendmailvsftpd_project : vsftpdfedoraproject : fedorafedoraproject : fedorafedoraproject : fedoradebian : debian_linux

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2021-3618 | HIGH Severity | CVEDatabase.com | CVEDatabase.com