U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2021-32558

Change History

Initial Analysis by NIST 8/06/2021 3:45:18 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:* versions from (including) 13.0.0 up to (excluding) 13.38.3
     *cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:* versions from (including) 16.0.0 up to (excluding) 16.19.1
     *cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:* versions from (including) 17.0.0 up to (excluding) 17.9.4
     *cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:* versions from (including) 18.0.0 up to (excluding) 18.15.1
     *cpe:2.3:a:digium:certified_asterisk:16.8:-:*:*:*:*:*:*
     *cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc1:*:*:*:*:*:*
     *cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc2:*:*:*:*:*:*
     *cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc3:*:*:*:*:*:*
     *cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc4:*:*:*:*:*:*
     *cpe:2.3:a:digium:certified_asterisk:16.8:cert2:*:*:*:*:*:*
     *cpe:2.3:a:digium:certified_asterisk:16.8:cert3:*:*:*:*:*:*
     *cpe:2.3:a:digium:certified_asterisk:16.8:cert4:*:*:*:*:*:*
     *cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc1:*:*:*:*:*:*
     *cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc2:*:*:*:*:*:*
     *cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc3:*:*:*:*:*:*
     *cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc4:*:*:*:*:*:*
     *cpe:2.3:a:digium:certified_asterisk:16.8:cert5:*:*:*:*:*:*
     *cpe:2.3:a:digium:certified_asterisk:16.8:cert6:*:*:*:*:*:*
     *cpe:2.3:a:digium:certified_asterisk:16.8:cert7:*:*:*:*:*:*
     *cpe:2.3:a:digium:certified_asterisk:16.8:cert8:*:*:*:*:*:*
     *cpe:2.3:a:digium:certified_asterisk:16.8:cert9:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
NIST (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Added CWE

								
							
							
						
NIST CWE-74
Changed Reference Type
http://packetstormsecurity.com/files/163639/Asterisk-Project-Security-Advisory-AST-2021-008.html No Types Assigned
http://packetstormsecurity.com/files/163639/Asterisk-Project-Security-Advisory-AST-2021-008.html Patch, Third Party Advisory, VDB Entry
Changed Reference Type
http://seclists.org/fulldisclosure/2021/Jul/49 No Types Assigned
http://seclists.org/fulldisclosure/2021/Jul/49 Mailing List, Patch, Third Party Advisory
Changed Reference Type
https://downloads.asterisk.org/pub/security/AST-2021-008.html No Types Assigned
https://downloads.asterisk.org/pub/security/AST-2021-008.html Patch, Vendor Advisory
Changed Reference Type
https://issues.asterisk.org/jira/browse/ASTERISK-29392 No Types Assigned
https://issues.asterisk.org/jira/browse/ASTERISK-29392 Exploit, Issue Tracking, Patch, Vendor Advisory
Changed Reference Type
https://lists.debian.org/debian-lts-announce/2021/08/msg00005.html No Types Assigned
https://lists.debian.org/debian-lts-announce/2021/08/msg00005.html Mailing List, Third Party Advisory