CVE-2021-20322
📋 TL;DR
This Linux kernel vulnerability allows remote attackers to bypass UDP source port randomization by exploiting flaws in ICMP error processing. Attackers can scan open UDP ports more effectively, compromising confidentiality and potentially integrity of systems relying on UDP randomization. All Linux systems with affected kernel versions are vulnerable.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Aff Baseboard Management Controller Firmware by Netapp
View all CVEs affecting Aff Baseboard Management Controller Firmware →
Communications Cloud Native Core Binding Support Function by Oracle
View all CVEs affecting Communications Cloud Native Core Binding Support Function →
Communications Cloud Native Core Network Exposure Function by Oracle
View all CVEs affecting Communications Cloud Native Core Network Exposure Function →
Communications Cloud Native Core Policy by Oracle
View all CVEs affecting Communications Cloud Native Core Policy →
E Series Santricity Os Controller by Netapp
Fas Baseboard Management Controller Firmware by Netapp
View all CVEs affecting Fas Baseboard Management Controller Firmware →
Fas Baseboard Management Controller Firmware by Netapp
View all CVEs affecting Fas Baseboard Management Controller Firmware →
Fedora by Fedoraproject
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Solidfire \& Hci Management Node by Netapp
⚠️ Risk & Real-World Impact
Worst Case
Attackers could map all open UDP ports on vulnerable systems, enabling targeted attacks against services that rely on UDP port randomization for security, potentially leading to service compromise or data exfiltration.
Likely Case
Remote attackers performing network reconnaissance can more efficiently discover open UDP ports, reducing the effectiveness of UDP-based security mechanisms and exposing vulnerable services.
If Mitigated
With proper patching and network controls, the risk is minimal as the vulnerability only enables reconnaissance, not direct code execution or privilege escalation.
🎯 Exploit Status
Exploitation requires network access and knowledge of the target's IP address. The technique is well-documented in security research but no public exploit code is widely available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Linux kernel 5.15-rc6 and later with specific commits applied
Vendor Advisory: https://bugzilla.redhat.com/show_bug.cgi?id=2014230
Restart Required: Yes
Instructions:
1. Update Linux kernel to version 5.15-rc6 or later. 2. Apply specific kernel commits: 4785305c05b2, 6457378fe796, 67d6d681e15b, a00df2caffed. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable ICMP redirect acceptance
linuxPrevents processing of ICMP redirect messages that could be exploited
sysctl -w net.ipv4.conf.all.accept_redirects=0
sysctl -w net.ipv6.conf.all.accept_redirects=0
Rate limit ICMP errors
linuxLimits the rate at which ICMP errors are processed
sysctl -w net.ipv4.icmp_ratelimit=100
sysctl -w net.ipv4.icmp_ratemask=0
🧯 If You Can't Patch
- Implement strict network segmentation to limit exposure to untrusted networks
- Deploy network-based intrusion detection systems to monitor for UDP port scanning activities
🔍 How to Verify
Check if Vulnerable:
Check kernel version with 'uname -r' and compare against patched versions. Review if specific kernel commits are present in /proc/version.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is 5.15-rc6 or later and check that sysctl settings for ICMP redirects are disabled.
📡 Detection & Monitoring
Log Indicators:
- Unusual ICMP error message frequency in kernel logs
- Increased UDP port scan activity in firewall logs
Network Indicators:
- Rapid ICMP redirect/fragmentation needed messages to UDP ports
- Unusual UDP traffic patterns suggesting port scanning
SIEM Query:
source_port:udp AND (icmp.type:3 OR icmp.type:5) AND event_count > threshold
🔗 References
- https://bugzilla.redhat.com/show_bug.cgi?id=2014230
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=4785305c05b25a242e5314cc821f54ade4c18810
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=6457378fe796815c973f631a1904e147d6ee33b1
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6&id=67d6d681e15b578c1725bad8ad079e05d1c48a8e
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6&id=a00df2caffed3883c341d5685f830434312e4a43
- https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
- https://security.netapp.com/advisory/ntap-20220303-0002/
- https://www.debian.org/security/2022/dsa-5096
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://bugzilla.redhat.com/show_bug.cgi?id=2014230
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=4785305c05b25a242e5314cc821f54ade4c18810
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=6457378fe796815c973f631a1904e147d6ee33b1
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6&id=67d6d681e15b578c1725bad8ad079e05d1c48a8e
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6&id=a00df2caffed3883c341d5685f830434312e4a43
- https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
- https://security.netapp.com/advisory/ntap-20220303-0002/
- https://www.debian.org/security/2022/dsa-5096
- https://www.oracle.com/security-alerts/cpujul2022.html