Vulnerability Details : CVE-2021-21551

Dell dbutil_2_3.sys driver contains an insufficient access control vulnerability which may lead to escalation of privileges, denial of service, or information disclosure. Local authenticated user access is required.
Vulnerability category: BypassGain privilegeDenial of serviceInformation leak
Published 2021-05-04 16:15:08
Updated 2022-07-14 15:42:46
Source Dell
View at NVD,   CVE.org
At least one public exploit which can be used to exploit this vulnerability exists!
CVE-2021-21551 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Dell dbutil Driver Insufficient Access Control Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Dell dbutil driver contains an insufficient access control vulnerability which may lead to escalation of privileges, denial-of-service, or information disclosure.
Added on 2022-03-31 Action due date 2022-04-21

Exploit prediction scoring system (EPSS) score for CVE-2021-21551

Probability of exploitation activity in the next 30 days: 0.15%

Percentile, the proportion of vulnerabilities that are scored at or less: ~ 51 % EPSS Score History EPSS FAQ

Metasploit modules for CVE-2021-21551

  • Dell DBUtil_2_3.sys IOCTL memmove
    Disclosure Date : 2021-05-04
    exploit/windows/local/cve_2021_21551_dbutil_memmove
    The DBUtil_2_3.sys driver distributed by Dell exposes an unprotected IOCTL interface that can be abused by an attacker read and write kernel-mode memory. Authors: - Kasif Dekel - SentinelLabs - Spencer McIntyre

CVSS scores for CVE-2021-21551

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Source
4.6
MEDIUM AV:L/AC:L/Au:N/C:P/I:P/A:P
3.9
6.4
[email protected]
7.8
HIGH CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.8
5.9
[email protected]
8.8
HIGH CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2.0
6.0
[email protected]

CWE ids for CVE-2021-21551

References for CVE-2021-21551

Products affected by CVE-2021-21551

This web site uses cookies for managing your session and website analytics (Google analytics) purposes as described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!