⚠ Actively exploited
Added to CISA KEV on 2022-04-06. Federal agencies required to patch by 2022-04-27. Required action: Apply updates per vendor instructions..
CVE-2021-3156
Severity
7.8HIGH
EPSS
92.3%
top 0.28%
CISA KEV
KEV
Added 2022-04-06
Due 2022-04-27
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedJan 26
KEV addedApr 6
KEV dueApr 27
Latest updateMay 24
CISA Required Action: Apply updates per vendor instructions.
Description
Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages14 packages
Also affects: Ontap Tools 9, Debian Linux 10.0, 9.0, Fedora 32, 33
Patches
🔴Vulnerability Details
6💥Exploits & PoCs
3🔍Detection Rules
3📋Vendor Advisories
9Oracle
▶
Oracle▶
Oracle Oracle Food and Beverage Applications Risk Matrix: Workstation 310 (Sudo) — CVE-2021-3156↗2021-07-15
🕵️Threat Intelligence
5Wiz
▶
Wiz
▶