{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T00:24:05.961","vulnerabilities":[{"cve":{"id":"CVE-2021-3436","sourceIdentifier":"vulnerabilities@zephyrproject.org","published":"2021-10-05T21:15:09.293","lastModified":"2024-11-21T06:21:30.360","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"BT: Possible to overwrite an existing bond during keys distribution phase when the identity address of the bond is known. Zephyr versions >= 1.14.2, >= 2.4.0, >= 2.5.0 contain Use of Multiple Resources with Duplicate Identifier (CWE-694). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-j76f-35mc-4h63"},{"lang":"es","value":"BT: Posibilidad de sobrescribir un vínculo existente durante la fase de distribución de claves cuando se conoce la dirección de identidad del vínculo. Zephyr versiones posteriores a 1.14.2 incluyéndola, versiones posteriores a 2.4.0 incluyéndola, versiones posteriores a 2.5.0 incluyéndola, contienen Uso de Múltiples Recursos con Identificador Duplicado (CWE-694). Para más información, consulte https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-j76f-35mc-4h63"}],"metrics":{"cvssMetricV31":[{"source":"vulnerabilities@zephyrproject.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":2.5}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:P","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"vulnerabilities@zephyrproject.org","type":"Secondary","description":[{"lang":"en","value":"CWE-694"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zephyrproject:zephyr:1.14.2:*:*:*:*:*:*:*","matchCriteriaId":"B74694FC-5442-4F7E-AACF-0E1753F50148"},{"vulnerable":true,"criteria":"cpe:2.3:o:zephyrproject:zephyr:2.4.0:*:*:*:*:*:*:*","matchCriteriaId":"59AB4423-CBB9-4BC1-9FBB-2690DAA3FDF8"},{"vulnerable":true,"criteria":"cpe:2.3:o:zephyrproject:zephyr:2.5.0:*:*:*:*:*:*:*","matchCriteriaId":"CAA88796-7B3D-4328-BAFA-D28BFBE601D9"}]}]}],"references":[{"url":"http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-j76f-35mc-4h63","source":"vulnerabilities@zephyrproject.org","tags":["Exploit","Patch","Third Party Advisory"]},{"url":"http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-j76f-35mc-4h63","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Third Party Advisory"]}]}}]}