U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2021-41593

Change History

Initial Analysis 10/14/2021 3:00:49 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:*:*:*:*:*:*:*:* versions up to (excluding) 0.11.0
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.0:-:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.0:beta:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.0:beta_rc1:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.0:beta_rc2:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.0:beta_rc3:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.0:beta_rc4:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.1:beta:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.1:beta_rc1:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.1:beta_rc2:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.1:beta_rc3:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.1:beta_rc4:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.11.1:beta_rc5:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.12.0:beta:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.12.0:beta_rc1:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.12.0:beta_rc2:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.12.0:beta_rc3:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.12.0:beta_rc4:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.12.0:beta_rc5:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.12.0:beta_rc6:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.12.1:beta:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.12.1:beta_rc1:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.12.1:beta_rc2:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.12.1:beta_rc3:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.12.1:beta_rc4:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.12.1:beta_rc5:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.12.1:beta_rc6:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.13.0:beta:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.13.0:beta_rc1:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.13.0:beta_rc2:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.13.0:beta_rc3:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.13.0:beta_rc4:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.13.0:beta_rc5:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.13.1:beta:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.13.1:beta_rc1:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.13.1:beta_rc2:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.13.2:beta:*:*:*:*:*:*
     *cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:0.13.3:beta_rc2:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
NIST (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
Added CWE

								
							
							
						
NIST CWE-863
Changed Reference Type
https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing No Types Assigned
https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing Press/Media Coverage, Third Party Advisory
Changed Reference Type
https://github.com/lightningnetwork/lnd/blob/master/docs/release-notes/release-notes-0.13.3.md No Types Assigned
https://github.com/lightningnetwork/lnd/blob/master/docs/release-notes/release-notes-0.13.3.md Release Notes, Third Party Advisory
Changed Reference Type
https://github.com/lightningnetwork/lnd/releases/tag/v0.13.3-beta No Types Assigned
https://github.com/lightningnetwork/lnd/releases/tag/v0.13.3-beta Third Party Advisory
Changed Reference Type
https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-May/002714.html No Types Assigned
https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-May/002714.html Mailing List, Vendor Advisory
Changed Reference Type
https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003257.html No Types Assigned
https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003257.html Mailing List, Vendor Advisory
Changed Reference Type
https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003264.html No Types Assigned
https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003264.html Exploit, Mailing List, Vendor Advisory