CVE-2021-38296 vulnerability in Readdle and Other Products
Published on March 10, 2022
Apache Spark Key Negotiation Vulnerability
Weakness Type
Authentication Bypass by Capture-replay
A capture-replay flaw exists when the design of the software makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes). Capture-replay attacks are common and can be difficult to defeat without cryptography. They are a subset of network injection attacks that rely on observing previously-sent valid commands, then changing them slightly if necessary and resending the same commands to the server.
Products Associated with CVE-2021-38296
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2021-38296 are published in these products:
Affected Versions
Apache Software Foundation Apache Spark:- Version up to and including version 3.1.2, <= 3.1.2 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.