Vulnerability Details : CVE-2021-3412
It was found that all versions of 3Scale developer portal lacked brute force protections. An attacker could use this gap to bypass login controls, and access privileged information, or possibly conduct further attacks.
Products affected by CVE-2021-3412
- cpe:2.3:a:redhat:3scale_api_management:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:3scale:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-3412
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 38 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-3412
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
7.3
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
3.9
|
3.4
|
NIST |
CWE ids for CVE-2021-3412
-
The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.Assigned by:
- nvd@nist.gov (Secondary)
- secalert@redhat.com (Primary)
References for CVE-2021-3412
-
https://bugzilla.redhat.com/show_bug.cgi?id=1928301
1928301 – (CVE-2021-3412) CVE-2021-3412 3scale: lack of brute force protection on dev portal loginIssue Tracking;Vendor Advisory
Jump to