{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T05:11:21.835","vulnerabilities":[{"cve":{"id":"CVE-2021-38575","sourceIdentifier":"infosec@edk2.groups.io","published":"2021-12-01T18:15:07.760","lastModified":"2025-11-03T20:15:49.503","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NetworkPkg/IScsiDxe has remotely exploitable buffer overflows."},{"lang":"es","value":"NetworkPkg/IScsiDxe presenta unos desbordamientos de búfer explotables de forma remota"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"infosec@edk2.groups.io","type":"Secondary","description":[{"lang":"en","value":"CWE-124"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:tianocore:edk2:*:*:*:*:*:*:*:*","versionEndIncluding":"202105","matchCriteriaId":"D81E5FE6-D7EC-49DA-BB6A-E58F9D7D3FBB"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:insyde:kernel:5.0:*:*:*:*:*:*:*","matchCriteriaId":"FFCC4619-B867-4E23-AF05-FF92B43628AF"},{"vulnerable":true,"criteria":"cpe:2.3:o:insyde:kernel:5.1:*:*:*:*:*:*:*","matchCriteriaId":"FB40061A-BEDF-4D72-BF2D-D1B10EB80A60"},{"vulnerable":true,"criteria":"cpe:2.3:o:insyde:kernel:5.2:*:*:*:*:*:*:*","matchCriteriaId":"9D6AFE61-A2A4-49DF-A8EE-B2F425DA7A08"},{"vulnerable":true,"criteria":"cpe:2.3:o:insyde:kernel:5.3:*:*:*:*:*:*:*","matchCriteriaId":"D21132C0-F2CF-4134-A165-926155031913"},{"vulnerable":true,"criteria":"cpe:2.3:o:insyde:kernel:5.4:*:*:*:*:*:*:*","matchCriteriaId":"6549F7F1-A438-4C84-9D66-C89C697E2A9B"},{"vulnerable":true,"criteria":"cpe:2.3:o:insyde:kernel:5.5:*:*:*:*:*:*:*","matchCriteriaId":"DE339FA1-8572-4365-B420-530D62686C08"}]}]}],"references":[{"url":"https://bugzilla.tianocore.org/show_bug.cgi?id=3356","source":"infosec@edk2.groups.io","tags":["Exploit","Issue Tracking","Vendor Advisory"]},{"url":"https://www.insyde.com/security-pledge/SA-2023025","source":"infosec@edk2.groups.io","tags":["Third Party Advisory"]},{"url":"https://bugzilla.tianocore.org/show_bug.cgi?id=3356","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Issue Tracking","Vendor Advisory"]},{"url":"https://lists.debian.org/debian-lts-announce/2025/06/msg00007.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.insyde.com/security-pledge/SA-2023025","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}