CVE-2021-32066 vulnerability in Canonical and Other Products
Published on August 1, 2021
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
Products Associated with CVE-2021-32066
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2021-32066 are published in these products:
Exploit Probability
EPSS
0.11%
Percentile
29.90%
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.