Vulnerability Details : CVE-2021-22569
An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.
Products affected by CVE-2021-22569
- cpe:2.3:a:oracle:communications_cloud_native_core_console:1.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.1:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:spatial_and_graph_mapviewer:21c:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:spatial_and_graph_mapviewer:19c:*:*:*:*:*:*:*
- cpe:2.3:a:google:google-protobuf:*:*:*:*:*:ruby:*:*
- cpe:2.3:a:google:protobuf-java:*:*:*:*:*:*:*:*
- cpe:2.3:a:google:protobuf-java:*:*:*:*:*:*:*:*
- cpe:2.3:a:google:protobuf-java:*:*:*:*:*:*:*:*
- cpe:2.3:a:google:protobuf-kotlin:*:*:*:*:*:*:*:*
- cpe:2.3:a:google:protobuf-kotlin:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-22569
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 42 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-22569
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
Google Inc. | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2021-22569
-
The product performs multiple related behaviors, but the behaviors are performed in the wrong order in ways which may produce resultant weaknesses.Assigned by: cve-coordination@google.com (Secondary)
References for CVE-2021-22569
-
https://www.oracle.com/security-alerts/cpuapr2022.html
Oracle Critical Patch Update Advisory - April 2022Patch;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2022/01/12/4
oss-security - CVE-2021-22569: Protobuf Java, Kotlin, JRuby DoSMailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2023/04/msg00019.html
[SECURITY] [DLA 3393-1] protobuf security update
-
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39330
39330 - protobuf-java:ProtobufFuzzer: Timeout in ProtobufFuzzer - oss-fuzzExploit;Issue Tracking;Mailing List;Vendor Advisory
-
https://cloud.google.com/support/bulletins#gcp-2022-001
Security Bulletins | Customer Care | Google CloudVendor Advisory
-
http://www.openwall.com/lists/oss-security/2022/01/12/7
oss-security - Re: CVE-2021-22569: Protobuf Java, Kotlin, JRuby DoSMailing List;Third Party Advisory
Jump to