apache traffic-server CVE-2021-44759 in Apache and Debian Products
Published on March 23, 2022

Improper authentication vulnerability in TLS origin verification

product logo product logo
Improper Authentication vulnerability in TLS origin validation of Apache Traffic Server allows an attacker to create a man in the middle attack. This issue affects Apache Traffic Server 8.0.0 to 8.1.0.

Vendor Advisory NVD

Weakness Type

What is an authentification Vulnerability?

When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.

CVE-2021-44759 has been classified to as an authentification vulnerability or weakness.


Products Associated with CVE-2021-44759

stack.watch emails you whenever new vulnerabilities are published in Apache Traffic Server or Debian Linux. Just hit a watch button to start following.

 
 

Affected Versions

Apache Software Foundation Apache Traffic Server Version 8.0.0 to 8.1.0 is affected by CVE-2021-44759

Exploit Probability

EPSS
2.00%
Percentile
83.45%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.