{"vulnerability": "CVE-2021-3053", "sightings": [{"uuid": "916735af-2be6-4bbe-8657-a2b91e205475", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30533", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:04.000000Z"}, {"uuid": "db289d60-a74f-42e1-b334-1fb1f45ce254", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30533", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971670", "content": "", "creation_timestamp": "2024-12-24T20:32:35.778801Z"}, {"uuid": "2cc65bdf-e108-40cf-acef-694e4b0570bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30533", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:30.000000Z"}, {"uuid": "5cd800a9-ef39-4403-9d9d-5ca5a10946e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2021-30533", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/1087ee46-bf14-42f4-8e22-edb7b00d4083", "content": "", "creation_timestamp": "2026-02-02T12:27:19.340913Z"}, {"uuid": "d81a9f6b-928c-40b2-8e2d-cc021239d013", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30533", "type": "seen", "source": "Telegram/Icj_BPa7uVhXz56GpiBF2vLSSWpVYAE-CRHLUN6H9xI6sMKe", "content": "", "creation_timestamp": "2025-02-06T02:39:17.000000Z"}, {"uuid": "649640b2-5196-4956-beac-fddd3c1bd66f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3053", "type": "seen", "source": "https://t.me/cibsecurity/28504", "content": "\u203c CVE-2021-3053 \u203c\n\nAn improper handling of exceptional conditions vulnerability exists in the Palo Alto Networks PAN-OS dataplane that enables an unauthenticated network-based attacker to send specifically crafted traffic through the firewall that causes the service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.9; PAN-OS 10.0 versions earlier than PAN-OS 10.0.5. This issue does not affect Prisma Access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-08T20:45:31.000000Z"}]}