CVE-2021-31882
MEDIUM
Published 2021-11-09T11:31:55
Actions:
CVSS Score
V3.1
6.5
/10
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score Metrics
Exploitability: N/A
Impact: N/A
EPSS Score
v2023.03.01
0.012
probability
of exploitation in the wild
There is a 1.2% chance that this vulnerability will be exploited in the wild within the next 30 days.
Updated: 2025-01-25
Exploit Probability
Percentile: 0.849
Higher than 84.9% of all CVEs
Attack Vector Metrics
Impact Metrics
Description
A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303). The DHCP client application does not validate the length of the Domain Name Server IP option(s) (0x06) when processing DHCP ACK packets. This may lead to Denial-of-Service conditions. (FSMD-2021-0011)
Available Exploits
No exploits available for this CVE.
Related News
No news articles found for this CVE.
Affected Products
Affected Versions:
Affected Versions:
References
Published: 2021-11-09T11:31:55
Last Modified: 2025-03-11T09:47:42.320Z
Copied to clipboard!