CVE-2021-34999

5.5 MEDIUM

📋 TL;DR

This vulnerability in OpenBSD's kernel multicast routing implementation allows local attackers to read uninitialized kernel memory, potentially disclosing sensitive information. Attackers need local low-privileged access first, then can combine this with other vulnerabilities for privilege escalation. Only OpenBSD systems with multicast routing enabled are affected.

💻 Affected Systems

Products:
  • OpenBSD Kernel
Versions: OpenBSD versions prior to the fix
Operating Systems: OpenBSD
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if multicast routing is enabled (not default). Requires local access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker combines this information disclosure with another vulnerability to achieve kernel-level arbitrary code execution and full system compromise.

🟠

Likely Case

Local attacker reads kernel memory contents that may contain sensitive data like encryption keys, passwords, or other process information.

🟢

If Mitigated

With proper access controls limiting local user privileges, impact is reduced to information disclosure only without privilege escalation.

🌐 Internet-Facing: LOW - Requires local access, cannot be exploited remotely.
🏢 Internal Only: MEDIUM - Local attackers on affected systems can exploit this, but requires multicast routing to be enabled.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and multicast routing enabled. Must be combined with other vulnerabilities for full exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: OpenBSD versions with the security patch applied

Vendor Advisory: https://www.openbsd.org/errata.html

Restart Required: Yes

Instructions:

1. Update OpenBSD to latest patched version via syspatch or source update. 2. Reboot system to load patched kernel.

🔧 Temporary Workarounds

Disable Multicast Routing

all

Disable multicast routing functionality if not required

sysctl net.inet.ip.mforwarding=0
sysctl net.inet6.ip6.mforwarding=0

🧯 If You Can't Patch

  • Disable multicast routing via sysctl commands
  • Implement strict access controls to limit local user privileges

🔍 How to Verify

Check if Vulnerable:

Check OpenBSD version and if multicast routing is enabled: sysctl net.inet.ip.mforwarding net.inet6.ip6.mforwarding

Check Version:

uname -a

Verify Fix Applied:

Verify OpenBSD version is patched and check errata page for CVE-2021-34999 fix

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • Unexpected multicast routing errors

Network Indicators:

  • Unusual multicast traffic patterns

SIEM Query:

source="kernel" AND "multicast" AND ("error" OR "panic")

🔗 References

📤 Share & Export