CVE-2021-47662

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to trigger a shutdown button via HTTPS connections, causing denial of service. Any system running the affected software with HTTPS enabled is vulnerable to disruption.

💻 Affected Systems

Products:
  • Specific product information not provided in CVE description
Versions: Version range not specified in provided information
Operating Systems: OS information not specified
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with HTTPS enabled. The exact product and version details require checking the referenced advisory.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage for all affected systems, potentially disrupting critical operations until manual intervention restores service.

🟠

Likely Case

Intermittent service disruptions as attackers trigger shutdowns, requiring system reboots and causing availability issues.

🟢

If Mitigated

Limited impact with proper network segmentation and authentication controls preventing unauthorized access to the shutdown endpoint.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation via HTTPS makes internet-facing systems particularly vulnerable to disruption.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable but may have additional network controls reducing exposure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Simple HTTPS request to trigger shutdown endpoint

Exploitation requires network access to the HTTPS service but no authentication credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: Not provided in CVE description

Restart Required: No

Instructions:

1. Check vendor advisory for specific patch details
2. Apply security updates when available
3. Verify HTTPS service functionality post-update

🔧 Temporary Workarounds

Network Access Control

linux

Restrict HTTPS access to trusted IP addresses only

iptables -A INPUT -p tcp --dport 443 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP

Authentication Enforcement

all

Implement authentication for all HTTPS endpoints including shutdown functionality

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems from untrusted networks
  • Deploy web application firewall rules to block requests to shutdown endpoints from unauthorized sources

🔍 How to Verify

Check if Vulnerable:

Test if unauthenticated HTTPS requests to the shutdown endpoint cause service disruption

Check Version:

Check specific product documentation for version identification commands

Verify Fix Applied:

Verify that authentication is required for shutdown functionality and unauthorized requests are rejected

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated HTTPS requests to shutdown endpoints
  • Unexpected service termination events
  • Multiple connection attempts from single sources

Network Indicators:

  • Spike in HTTPS traffic followed by service unavailability
  • Requests to known shutdown URIs from unauthorized sources

SIEM Query:

source_port=443 AND (uri_contains="shutdown" OR uri_contains="terminate") AND auth_status="failed"

🔗 References

📤 Share & Export