Search for vulnerabilities
Vulnerability details: VCID-6fcz-sa2z-aaaq
Vulnerability ID VCID-6fcz-sa2z-aaaq
Aliases CVE-2021-44533
Summary Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 did not handle multi-value Relative Distinguished Names correctly. Attackers could craft certificate subjects containing a single-value Relative Distinguished Name that would be interpreted as a multi-value Relative Distinguished Name, for example, in order to inject a Common Name that would allow bypassing the certificate subject verification.Affected versions of Node.js that do not accept multi-value Relative Distinguished Names and are thus not vulnerable to such attacks themselves. However, third-party code that uses node's ambiguous presentation of certificate subjects may be vulnerable.
Status Published
Exploitability 0.5
Weighted Severity 6.7
Risk 3.4
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
rhas Moderate https://access.redhat.com/errata/RHSA-2022:4914
cvssv3 7.4 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44533.json
epss 0.0024 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.0024 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.0024 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.0024 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.0024 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.0024 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.0024 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00268 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00282 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00282 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00282 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00364 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00364 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00364 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00399 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00444 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00444 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00460 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00494 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00494 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00494 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00494 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00494 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00494 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00494 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00494 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00494 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00494 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00494 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00494 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00494 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00494 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00494 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00494 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00494 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00494 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00524 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00524 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00524 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00524 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00524 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00524 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00524 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00524 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00524 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.00524 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
epss 0.16901 https://api.first.org/data/v1/epss?cve=CVE-2021-44533
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=2040856
cvssv3.1 5.9 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2021-44533
cvssv3 5.3 https://nvd.nist.gov/vuln/detail/CVE-2021-44533
cvssv3.1 5.3 https://nvd.nist.gov/vuln/detail/CVE-2021-44533
cvssv3.1 5.3 https://www.oracle.com/security-alerts/cpuapr2022.html
generic_textual MODERATE https://www.oracle.com/security-alerts/cpuapr2022.html
cvssv3.1 7.5 https://www.oracle.com/security-alerts/cpujul2022.html
generic_textual HIGH https://www.oracle.com/security-alerts/cpujul2022.html
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44533.json
https://api.first.org/data/v1/epss?cve=CVE-2021-44533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://hackerone.com/reports/1429694
https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/
https://security.netapp.com/advisory/ntap-20220325-0007/
https://www.debian.org/security/2022/dsa-5170
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
1004177 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004177
2040856 https://bugzilla.redhat.com/show_bug.cgi?id=2040856
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
cpe:2.3:a:oracle:graalvm:20.3.5:*:*:*:enterprise:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.5:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:graalvm:21.3.1:*:*:*:enterprise:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:graalvm:22.0.0.2:*:*:*:enterprise:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:22.0.0.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql_cluster:8.0.29:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.0.29:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
CVE-2021-44533 https://nvd.nist.gov/vuln/detail/CVE-2021-44533
GLSA-202405-29 https://security.gentoo.org/glsa/202405-29
RHSA-2022:4914 https://access.redhat.com/errata/RHSA-2022:4914
RHSA-2022:7044 https://access.redhat.com/errata/RHSA-2022:7044
RHSA-2022:7830 https://access.redhat.com/errata/RHSA-2022:7830
RHSA-2022:9073 https://access.redhat.com/errata/RHSA-2022:9073
RHSA-2023:1742 https://access.redhat.com/errata/RHSA-2023:1742
RHSA-2023:3742 https://access.redhat.com/errata/RHSA-2023:3742
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44533.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2021-44533
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2021-44533
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2021-44533
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://www.oracle.com/security-alerts/cpuapr2022.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://www.oracle.com/security-alerts/cpujul2022.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.47513
EPSS Score 0.0024
Published At May 1, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.