Attacker Value
Unknown
(1 user assessed)
Exploitability
Unknown
(1 user assessed)
User Interaction
None
Privileges Required
None
Attack Vector
Network
1

CVE-2021-3537

Disclosure Date: May 14, 2021
Exploited in the Wild
Add MITRE ATT&CK tactics and techniques that apply to this CVE.
Command and Control
Techniques
Validation
Validated
Validated
Validated
Defense Evasion
Techniques
Validation
Validated
Validated
Initial Access
Techniques
Validation
Validated
Validated

Description

A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.

Add Assessment

2
Ratings
Technical Analysis

Seems to use Arpa or loopback addresses to change the behavior of the os and the applications.
Certificate changes
Random files and exes added to the applications list.
Firewall rules change regardless of privilege’s
Like the attacker lives inside the computers applications

CVSS V3 Severity and Metrics
Base Score:
5.9 Medium
Impact Score:
3.6
Exploitability Score:
2.2
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector (AV):
Network
Attack Complexity (AC):
High
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
None
Integrity (I):
None
Availability (A):
High

General Information

Vendors

  • debian,
  • fedoraproject,
  • netapp,
  • oracle,
  • redhat,
  • xmlsoft

Products

  • active iq unified manager -,
  • clustered data ontap -,
  • clustered data ontap antivirus connector -,
  • communications cloud native core network function cloud native environment 1.10.0,
  • debian linux 9.0,
  • enterprise linux 6.0,
  • enterprise linux 7.0,
  • enterprise linux 8.0,
  • enterprise manager base platform 13.4.0.0,
  • enterprise manager base platform 13.5.0.0,
  • enterprise manager ops center 12.4.0.0,
  • fedora 33,
  • fedora 34,
  • hci h410c firmware -,
  • jboss core services -,
  • libxml2,
  • manageability software development kit -,
  • mysql workbench,
  • ontap select deploy administration utility -,
  • openjdk 8,
  • peoplesoft enterprise peopletools 8.58,
  • real user experience insight 13.4.1.0,
  • real user experience insight 13.5.1.0,
  • snapdrive -

Exploited in the Wild

Reported by:
Technical Analysis