CVE-2021-22191 vulnerability in Wireshark and Other Products
Published on March 15, 2021
Improper URL handling in Wireshark 3.4.0 to 3.4.3 and 3.2.0 to 3.2.11 could allow remote code execution via via packet injection or crafted capture file.
Vulnerability Analysis
CVE-2021-22191 can be exploited with network access, requires user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be low. considered to have a small impact on confidentiality and integrity and availability.
Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality Impact:
LOW
Integrity Impact:
LOW
Availability Impact:
LOW
Products Associated with CVE-2021-22191
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2021-22191 are published in these products:
Affected Versions
The Wireshark Foundation Wireshark:- Version >=3.4.0, <3.4.4 is affected.
- Version >=3.2.0, <3.2.12 is affected.
Exploit Probability
EPSS
0.27%
Percentile
50.33%
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.