U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVSS v3.1 Statistics for F-Secure as of 10/15/2022

46
320
 
40
159
Reference
0-69.9%
Reference
49.7
Contributor
70-94.9%
 
Provider
95-100%
CVE CNA Value Alignment NIST Value Reason
CVE-2021-33599   (3 of 8) Attack Vector (AV) Network Attack Vector (AV) Local Applied AV:L due to local vector identified
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) None No confidentiality impacts identified
Integrity (I) Low Integrity (I) None No integrity impacts identified
Availability (A) None Availability (A) High No limiting factors for availability listed
CVE-2021-33600   (2 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) None User Interaction not identified
Scope (S) Changed Scope (S) Unchanged Unclear if Scope change occurs. No identification of security boundaries being crossed.
Confidentiality (C) Low Confidentiality (C) None No confidentiality impacts identified
Integrity (I) Low Integrity (I) None No integrity impacts identified
Availability (A) None Availability (A) High No limiting factors for availability listed
CVE-2021-33601   (6 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) Low
User Interaction (UI) Required User Interaction (UI) None User Interaction not identified
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) High Information leaked is sensitive such as passwords or other vital secrets
Integrity (I) High Integrity (I) High
Availability (A) High Availability (A) High
CVE-2021-33602   (4 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) None User Interaction not identified
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) None No confidentiality impacts identified
Integrity (I) Low Integrity (I) None No integrity impacts identified
Availability (A) Low Availability (A) Low
CVE-2021-33603   (4 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) None No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) None No limiting factors for integrity listed
Availability (A) Low Availability (A) High No limiting factors for availability listed
CVE-2021-40828   (5 of 8) Attack Vector (AV) Adjacent Network Attack Vector (AV) Adjacent Network
Attack Complexity (AC) High Attack Complexity (AC) Low No Race Condition, implementation specific secrets required or MiTM identified for NVD analyst
Privileges Required (PR) High Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) None User Interaction not identified
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) High Confidentiality (C) High
Integrity (I) High Integrity (I) High
Availability (A) High Availability (A) High
CVE-2021-40829   (5 of 8) Attack Vector (AV) Adjacent Network Attack Vector (AV) Adjacent Network
Attack Complexity (AC) High Attack Complexity (AC) Low No Race Condition, implementation specific secrets required or MiTM identified for NVD analyst
Privileges Required (PR) High Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) None User Interaction not identified
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) High Confidentiality (C) High
Integrity (I) High Integrity (I) High
Availability (A) High Availability (A) High
CVE-2021-40830   (5 of 8) Attack Vector (AV) Adjacent Network Attack Vector (AV) Adjacent Network
Attack Complexity (AC) High Attack Complexity (AC) Low No Race Condition, implementation specific secrets required or MiTM identified for NVD analyst
Privileges Required (PR) High Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) None User Interaction not identified
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) High Confidentiality (C) High
Integrity (I) High Integrity (I) High
Availability (A) High Availability (A) High
CVE-2021-40831   (5 of 8) Attack Vector (AV) Adjacent Network Attack Vector (AV) Network Applied AV:N due to lack of available Information for NVD Analyst
Attack Complexity (AC) High Attack Complexity (AC) Low No Race Condition, implementation specific secrets required or MiTM identified for NVD analyst
Privileges Required (PR) High Privileges Required (PR) High
User Interaction (UI) Required User Interaction (UI) None User Interaction not identified
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) High Confidentiality (C) High
Integrity (I) High Integrity (I) High
Availability (A) High Availability (A) High
CVE-2021-40832   (4 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) None No confidentiality impacts identified
Integrity (I) Low Integrity (I) None No integrity impacts identified
Availability (A) Low Availability (A) High No limiting factors for availability listed
CVE-2021-40833   (3 of 8) Attack Vector (AV) Network Attack Vector (AV) Local AV:L due to file parsed local to vulnerable component
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) None No confidentiality impacts identified
Integrity (I) Low Integrity (I) None No integrity impacts identified
Availability (A) Low Availability (A) High No limiting factors for availability listed
CVE-2021-40834   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) High Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) None No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) Low
Availability (A) Low Availability (A) None No limiting factors for availability listed
CVE-2021-40835   (6 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) None No confidentiality impacts identified
Integrity (I) Low Integrity (I) Low
Availability (A) None Availability (A) None
CVE-2021-40836   (4 of 8) Attack Vector (AV) Network Attack Vector (AV) Local AV:L due to file parsed local to vulnerable component
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) None No confidentiality impacts identified
Integrity (I) None Integrity (I) None
Availability (A) Low Availability (A) High No limiting factors for availability listed
CVE-2021-40837   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) None User Interaction not identified
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) None No confidentiality impacts identified
Integrity (I) None Integrity (I) None
Availability (A) Low Availability (A) Low
CVE-2021-44747   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) None No confidentiality impacts identified
Integrity (I) None Integrity (I) None
Availability (A) Low Availability (A) High No limiting factors for availability listed
CVE-2021-44748   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) Low Confidentiality (C) Low
Integrity (I) Low Integrity (I) Low
Availability (A) Low Availability (A) None No availability impacts identified
CVE-2021-44749   (3 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) Low Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Changed Security boundary cross identified
Confidentiality (C) Low Confidentiality (C) High No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) High No limiting factors for integrity listed
Availability (A) Low Availability (A) High No limiting factors for availability listed
CVE-2021-44750   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Local AV:L due to file parsed local to vulnerable component
Attack Complexity (AC) High Attack Complexity (AC) Low No Race Condition, implementation specific secrets required or MiTM identified for NVD analyst
Privileges Required (PR) High Privileges Required (PR) Low Attacker as "user" is mentioned, but not identified as high privileges
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) High Confidentiality (C) High
Integrity (I) High Integrity (I) High
Availability (A) High Availability (A) High
CVE-2021-44751   (4 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) High Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) None User Interaction not identified
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) None No confidentiality impacts identified
Integrity (I) Low Integrity (I) Low
Availability (A) Low Availability (A) None No availability impacts identified
CVE-2022-28868   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) High Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) None No confidentiality impacts identified
Integrity (I) Low Integrity (I) Low
Availability (A) Low Availability (A) None No availability impacts identified
CVE-2022-28869   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) High Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) None No confidentiality impacts identified
Integrity (I) Low Integrity (I) Low
Availability (A) Low Availability (A) None No availability impacts identified
CVE-2022-28870   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) High Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) None No confidentiality impacts identified
Integrity (I) Low Integrity (I) Low
Availability (A) Low Availability (A) None No availability impacts identified
CVE-2022-28871   (3 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) High Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) None User Interaction not identified
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) None No confidentiality impacts identified
Integrity (I) Low Integrity (I) None No integrity impacts identified
Availability (A) Low Availability (A) High No limiting factors for availability listed
CVE-2022-28872   (4 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) High Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) High No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) High No limiting factors for integrity listed
Availability (A) Low Availability (A) High No limiting factors for availability listed
CVE-2022-28873   (5 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) High Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) Low
Integrity (I) Low Integrity (I) None No integrity impacts identified
Availability (A) Low Availability (A) None No availability impacts identified
CVE-2022-28874   (3 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) High Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) None User Interaction not identified
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) None No confidentiality impacts identified
Integrity (I) Low Integrity (I) None No integrity impacts identified
Availability (A) Low Availability (A) High No limiting factors for availability listed
CVE-2022-28875   (4 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) High Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) None No confidentiality impacts identified
Integrity (I) Low Integrity (I) None No integrity impacts identified
Availability (A) Low Availability (A) High No limiting factors for availability listed
CVE-2022-28876   (3 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) High Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) None User Interaction not identified
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) None No confidentiality impacts identified
Integrity (I) Low Integrity (I) None No integrity impacts identified
Availability (A) Low Availability (A) High No limiting factors for availability listed
CVE-2022-28877   (3 of 8) Attack Vector (AV) Network Attack Vector (AV) Local Applied AV:L due to local vector identified
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) High Privileges Required (PR) High
User Interaction (UI) Required User Interaction (UI) None User Interaction not identified
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) High No limiting factors for confidentiality listed
Integrity (I) Low Integrity (I) High No limiting factors for integrity listed
Availability (A) Low Availability (A) High No limiting factors for availability listed
CVE-2022-28878   (3 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) High Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) None User Interaction not identified
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) None No confidentiality impacts identified
Integrity (I) Low Integrity (I) None No integrity impacts identified
Availability (A) Low Availability (A) High No limiting factors for availability listed
CVE-2022-28879   (3 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) High Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) None User Interaction not identified
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) None No confidentiality impacts identified
Integrity (I) Low Integrity (I) None No integrity impacts identified
Availability (A) Low Availability (A) High No limiting factors for availability listed
CVE-2022-28880   (3 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) High Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) None User Interaction not identified
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) None No confidentiality impacts identified
Integrity (I) Low Integrity (I) None No integrity impacts identified
Availability (A) Low Availability (A) High No limiting factors for availability listed
CVE-2022-28881   (3 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) High Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) None User Interaction not identified
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) None No confidentiality impacts identified
Integrity (I) Low Integrity (I) None No integrity impacts identified
Availability (A) Low Availability (A) High No limiting factors for availability listed
CVE-2022-28882   (3 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) High Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) None User Interaction not identified
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) None No confidentiality impacts identified
Integrity (I) Low Integrity (I) None No integrity impacts identified
Availability (A) Low Availability (A) High No limiting factors for availability listed
CVE-2022-28883   (4 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) High Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) None User Interaction not identified
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) None No confidentiality impacts identified
Integrity (I) None Integrity (I) None
Availability (A) Low Availability (A) High No limiting factors for availability listed
CVE-2022-28884   (3 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) High Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) None User Interaction not identified
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) None No confidentiality impacts identified
Integrity (I) Low Integrity (I) None No integrity impacts identified
Availability (A) Low Availability (A) High No limiting factors for availability listed
CVE-2022-28885   (3 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) High Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) None User Interaction not identified
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) None No confidentiality impacts identified
Integrity (I) Low Integrity (I) None No integrity impacts identified
Availability (A) Low Availability (A) High No limiting factors for availability listed
CVE-2022-28886   (3 of 8) Attack Vector (AV) Network Attack Vector (AV) Local AV:L due to file parsed local to vulnerable component
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) High Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) Required
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) None No confidentiality impacts identified
Integrity (I) Low Integrity (I) None No integrity impacts identified
Availability (A) Low Availability (A) High No limiting factors for availability listed
CVE-2022-28887   (3 of 8) Attack Vector (AV) Network Attack Vector (AV) Network
Attack Complexity (AC) Low Attack Complexity (AC) Low
Privileges Required (PR) High Privileges Required (PR) None No privileges needed by attacker identified by NVD analyst
User Interaction (UI) Required User Interaction (UI) None User Interaction not identified
Scope (S) Unchanged Scope (S) Unchanged
Confidentiality (C) Low Confidentiality (C) None No confidentiality impacts identified
Integrity (I) Low Integrity (I) None No integrity impacts identified
Availability (A) Low Availability (A) High No limiting factors for availability listed