CVE-2021-37625

7.5 HIGH

📋 TL;DR

CVE-2021-37625 is a denial-of-service vulnerability in Skytable database servers where incorrect error handling in socket acceptance causes the server to exit its main run loop and shut down. Attackers can trigger this using incomplete TLS connections or specially crafted TCP packets, causing complete service disruption. Anyone running vulnerable Skytable versions with network exposure is affected.

💻 Affected Systems

Products:
  • Skytable
Versions: All versions prior to 0.6.4
Operating Systems: All platforms running Skytable
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all Skytable deployments with network connectivity enabled

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database server shutdown leading to sustained service unavailability and data inaccessibility

🟠

Likely Case

Service disruption requiring manual restart, potentially causing application downtime

🟢

If Mitigated

Minimal impact if patched or network-restricted, with possible brief connection issues

🌐 Internet-Facing: HIGH - Directly exploitable over network with low complexity
🏢 Internal Only: MEDIUM - Requires internal network access but still easily exploitable

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access but no authentication; attack vectors clearly documented in advisory

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.6.4 and later

Vendor Advisory: https://github.com/skytable/skytable/security/advisories/GHSA-q27r-h25m-hcc7

Restart Required: Yes

Instructions:

1. Stop Skytable service. 2. Update to version 0.6.4 or later using package manager or manual installation. 3. Restart Skytable service.

🔧 Temporary Workarounds

Network Restriction

linux

Restrict network access to Skytable using firewall rules

iptables -A INPUT -p tcp --dport 2003 -s trusted_ip_range -j ACCEPT
iptables -A INPUT -p tcp --dport 2003 -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit connections to trusted sources only
  • Deploy Skytable behind a reverse proxy with connection validation and rate limiting

🔍 How to Verify

Check if Vulnerable:

Check Skytable version; if version < 0.6.4, system is vulnerable

Check Version:

skytable --version

Verify Fix Applied:

Confirm version is 0.6.4 or later and test connectivity with incomplete TLS handshake

📡 Detection & Monitoring

Log Indicators:

  • Unexpected server shutdown messages
  • Run loop exit logs
  • Connection errors from incomplete TLS handshakes

Network Indicators:

  • Multiple incomplete TLS connections from single source
  • TCP packets with unusual flags triggering backoff

SIEM Query:

source="skytable.log" AND ("shutdown" OR "exit" OR "run loop")

🔗 References

📤 Share & Export