ID CVE-2021-3652
Summary A flaw was found in 389-ds-base. If an asterisk is imported as password hashes, either accidentally or maliciously, then instead of being inactive, any password will successfully match during authentication. This flaw allows an attacker to successfully authenticate as a user whose password was disabled.
References
Vulnerable Configurations
  • cpe:2.3:a:port389:389-ds-base:-:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:-:*:*:*:*:*:*:*
  • cpe:2.3:a:port389:389-ds-base:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:port389:389-ds-base:1.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:1.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:port389:389-ds-base:1.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:1.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:port389:389-ds-base:1.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:1.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:port389:389-ds-base:1.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:1.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:port389:389-ds-base:1.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:1.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:port389:389-ds-base:1.2.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:1.2.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:port389:389-ds-base:1.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:1.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:port389:389-ds-base:1.2.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:1.2.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:port389:389-ds-base:1.2.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:1.2.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:port389:389-ds-base:1.2.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:1.2.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:port389:389-ds-base:1.2.7.4:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:1.2.7.4:*:*:*:*:*:*:*
  • cpe:2.3:a:port389:389-ds-base:1.2.7.5:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:1.2.7.5:*:*:*:*:*:*:*
  • cpe:2.3:a:port389:389-ds-base:1.2.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:1.2.8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:port389:389-ds-base:1.2.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:1.2.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:port389:389-ds-base:1.2.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:1.2.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:port389:389-ds-base:1.2.8.3:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:1.2.8.3:*:*:*:*:*:*:*
  • cpe:2.3:a:port389:389-ds-base:1.2.9.0:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:1.2.9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:port389:389-ds-base:1.2.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:1.2.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:port389:389-ds-base:1.2.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:1.2.9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:port389:389-ds-base:1.2.9.3:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:1.2.9.3:*:*:*:*:*:*:*
  • cpe:2.3:a:port389:389-ds-base:1.2.9.4:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:1.2.9.4:*:*:*:*:*:*:*
  • cpe:2.3:a:port389:389-ds-base:1.2.9.5:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:1.2.9.5:*:*:*:*:*:*:*
  • cpe:2.3:a:port389:389-ds-base:1.2.9.6:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:1.2.9.6:*:*:*:*:*:*:*
  • cpe:2.3:a:port389:389-ds-base:1.2.9.8:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:1.2.9.8:*:*:*:*:*:*:*
  • cpe:2.3:a:port389:389-ds-base:1.2.9.9:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:1.2.9.9:*:*:*:*:*:*:*
  • cpe:2.3:a:port389:389-ds-base:1.2.9.10:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:1.2.9.10:*:*:*:*:*:*:*
  • cpe:2.3:a:port389:389-ds-base:1.2.10.0:*:*:*:*:*:*:*
    cpe:2.3:a:port389:389-ds-base:1.2.10.0:*:*:*:*:*:*:*
CVSS
Base: 6.4 (as of 24-04-2023 - 09:15)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:N
Last major update 24-04-2023 - 09:15
Published 18-04-2022 - 17:15
Last modified 24-04-2023 - 09:15
Back to Top