CVE-2021-3618

Severity CVSS v4.0:
Pending analysis
Type:
CWE-295 Improper Certificate Validation
Publication date:
23/03/2022
Last modified:
09/02/2023

Description

ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:* 1.21.0 (excluding)
cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:* 8.17 (excluding)
cpe:2.3:a:vsftpd_project:vsftpd:*:*:*:*:*:*:*:* 3.0.4 (excluding)
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*