⚠ Actively exploited
Added to CISA KEV on 2022-04-06. Federal agencies required to patch by 2022-04-27. Required action: Apply updates per vendor instructions..
CVE-2021-31166
Severity
9.8CRITICAL
EPSS
93.0%
top 0.22%
CISA KEV
KEV
Added 2022-04-06
Due 2022-04-27
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedMay 11
KEV addedApr 6
KEV dueApr 27
Latest updateMay 24
CISA Required Action: Apply updates per vendor instructions.
Description
HTTP Protocol Stack Remote Code Execution Vulnerability
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages7 packages
Patches
🔴Vulnerability Details
3💥Exploits & PoCs
1🔍Detection Rules
1Suricata▶
ET EXPLOIT Windows HTTP Protocol Stack UAF/RCE (CVE-2021-31166), http.sys DOS (CVE-2022-21907) Inbound↗2021-05-17