{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T06:52:27.236","vulnerabilities":[{"cve":{"id":"CVE-2021-41119","sourceIdentifier":"security-advisories@github.com","published":"2022-04-13T19:15:08.990","lastModified":"2024-11-21T06:25:30.633","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Wire-server is the system server for the wire back-end services. Releases prior to v2022-03-01 are subject to a denial of service attack via a crafted object causing a hash collision. This collision causes the server to spend at least quadratic time parsing it which can lead to a denial of service for a heavily used server. The issue has been fixed in wire-server 2022-03-01 and is already deployed on all Wire managed services. On premise instances of wire-server need to be updated to 2022-03-01, so that their backends are no longer affected. There are no known workarounds for this issue."},{"lang":"es","value":"Wire-server es el servidor del sistema para los servicios de back-end de wire. Las versiones anteriores a v2022-03-01, están sujetas a un ataque de denegación de servicio por medio de un objeto diseñado que causa una colisión de hash. Esta colisión hace que el servidor emplee al menos un tiempo cuadrático en analizarlo, lo que puede conllevar a una denegación de servicio para un servidor muy usado. El problema ha sido corregido en wire-server 01-03-2022 y ya está implementado en todos los servicios administrados de Wire. Las instancias locales de wire-server deben actualizarse a versión 01-03-2022, para que sus backends ya no estén afectados. No se presentan medidas de mitigación conocidas para este problema"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-400"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-400"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:wire:wire-server:*:*:*:*:*:*:*:*","versionEndExcluding":"2022-03-01","matchCriteriaId":"90144601-EF7E-4BEB-B24F-5ECB072B585D"}]}]}],"references":[{"url":"https://cs-syd.eu/posts/2021-09-11-json-vulnerability","source":"security-advisories@github.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/wireapp/wire-server/security/advisories/GHSA-phxv-pffh-fq2r","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://cs-syd.eu/posts/2021-09-11-json-vulnerability","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/wireapp/wire-server/security/advisories/GHSA-phxv-pffh-fq2r","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}