{"api_version":"1","generated_at":"2026-04-22T21:39:23+00:00","cve":"CVE-2021-20305","urls":{"html":"https://cve.report/CVE-2021-20305","api":"https://cve.report/api/cve/CVE-2021-20305.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-20305","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-20305"},"summary":{"title":"CVE-2021-20305","description":"A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2021-04-05 22:15:00","updated_at":"2023-11-07 03:29:00"},"problem_types":["CWE-787"],"metrics":[],"references":[{"url":"https://security.netapp.com/advisory/ntap-20211022-0002/","name":"https://security.netapp.com/advisory/ntap-20211022-0002/","refsource":"CONFIRM","tags":[],"title":"CVE-2021-20305 Nettle Vulnerability in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.debian.org/security/2021/dsa-4933","name":"DSA-4933","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-4933-1 nettle","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html","name":"[debian-lts-announce] 20210918 [SECURITY] [DLA 2760-1] nettle security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 2760-1] nettle security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQKWVVMAIDAJ7YAA3VVO32BHLDOH2E63/","name":"FEDORA-2021-454a0f6f76","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 33 Update: gnutls-3.6.16-1.fc33 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MQKWVVMAIDAJ7YAA3VVO32BHLDOH2E63/","name":"FEDORA-2021-454a0f6f76","refsource":"","tags":[],"title":"[SECURITY] Fedora 33 Update: gnutls-3.6.16-1.fc33 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1942533","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1942533","refsource":"MISC","tags":[],"title":"1942533 – (CVE-2021-20305) CVE-2021-20305 nettle: Out of Bound memory access in signature verification","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.gentoo.org/glsa/202105-31","name":"GLSA-202105-31","refsource":"GENTOO","tags":[],"title":"Nettle: Denial of service (GLSA 202105-31) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-20305","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-20305","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"20305","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"20305","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"20305","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"33","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"20305","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"active_iq_unified_manager","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"vmware_vsphere","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"20305","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"ontap_select_deploy_administration_utility","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"20305","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nettle_project","cpe5":"nettle","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"20305","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"20305","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-20305","qid":"159146","title":"Oracle Enterprise Linux Security Update for nettle (ELSA-2021-1145)"},{"cve":"CVE-2021-20305","qid":"159150","title":"Oracle Enterprise Linux Security Update for gnutls and nettle (ELSA-2021-1206)"},{"cve":"CVE-2021-20305","qid":"174949","title":"SUSE Enterprise Linux Security Update for libnettle (SUSE-SU-2021:1399-1)"},{"cve":"CVE-2021-20305","qid":"174959","title":"SUSE Enterprise Linux Security Update for libnettle (SUSE-SU-2021:1412-1)"},{"cve":"CVE-2021-20305","qid":"178677","title":"Debian Security Update for nettle (DSA 4933-1)"},{"cve":"CVE-2021-20305","qid":"178806","title":"Debian Security Update for nettle (DLA 2760-1)"},{"cve":"CVE-2021-20305","qid":"179505","title":"Debian Security Update for nettle (CVE-2021-20305)"},{"cve":"CVE-2021-20305","qid":"198322","title":"Ubuntu Security Notification for Nettle vulnerability (USN-4906-1)"},{"cve":"CVE-2021-20305","qid":"239215","title":"Red Hat Update for nettle (RHSA-2021:1145)"},{"cve":"CVE-2021-20305","qid":"239220","title":"Red Hat Update for gnutls and nettle (RHSA-2021:1206)"},{"cve":"CVE-2021-20305","qid":"239241","title":"Red Hat Update for gnutls and nettle (RHSA-2021:1246)"},{"cve":"CVE-2021-20305","qid":"239242","title":"Red Hat Update for gnutls and nettle (RHSA-2021:1245)"},{"cve":"CVE-2021-20305","qid":"239414","title":"Red Hat Update for nettle (RHSA-2021:2280)"},{"cve":"CVE-2021-20305","qid":"257076","title":"CentOS Security Update for nettle (CESA-2021:1145)"},{"cve":"CVE-2021-20305","qid":"281107","title":"Fedora Security Update for gnutls (FEDORA-2021-454a0f6f76)"},{"cve":"CVE-2021-20305","qid":"296059","title":"Oracle Solaris 11.4 Support Repository Update (SRU) 36.0.1.101.2 Missing (CPUJUL2021)"},{"cve":"CVE-2021-20305","qid":"352269","title":"Amazon Linux Security Advisory for nettle: ALAS2-2021-1629"},{"cve":"CVE-2021-20305","qid":"375673","title":"F5 BIG-IP ASM,LTM,APM BIG-IP Nettle Cryptography Library Vulnerability (K33101555)"},{"cve":"CVE-2021-20305","qid":"377030","title":"Alibaba Cloud Linux Security Update for nettle (ALINUX2-SA-2021:0018)"},{"cve":"CVE-2021-20305","qid":"377158","title":"Alibaba Cloud Linux Security Update for gnutls and nettle (ALINUX3-SA-2021:0029)"},{"cve":"CVE-2021-20305","qid":"501441","title":"Alpine Linux Security Update for nettle"},{"cve":"CVE-2021-20305","qid":"504179","title":"Alpine Linux Security Update for nettle"},{"cve":"CVE-2021-20305","qid":"591406","title":"Siemens SIMATIC S7-1500 CPU GNU/Linux subsystem Multiple Vulnerabilities (SSB-439005, ICSA-22-104-13)"},{"cve":"CVE-2021-20305","qid":"670549","title":"EulerOS Security Update for nettle (EulerOS-SA-2021-2307)"},{"cve":"CVE-2021-20305","qid":"670778","title":"EulerOS Security Update for nettle (EulerOS-SA-2021-2536)"},{"cve":"CVE-2021-20305","qid":"670802","title":"EulerOS Security Update for nettle (EulerOS-SA-2021-2560)"},{"cve":"CVE-2021-20305","qid":"710083","title":"Gentoo Linux Nettle Denial of service (GLSA 202105-31)"},{"cve":"CVE-2021-20305","qid":"730121","title":"McAfee Web Gateway Multiple Vulnerabilities (WP-3484,WP-3744,WP-3745,WP-3746,WP-3747,WP-3793,WP-3800)"},{"cve":"CVE-2021-20305","qid":"750241","title":"OpenSUSE Security Update for libnettle (openSUSE-SU-2021:0635-1)"},{"cve":"CVE-2021-20305","qid":"900066","title":"CBL-Mariner Linux Security Update for nettle 3.4.1"},{"cve":"CVE-2021-20305","qid":"903108","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for nettle (4053)"},{"cve":"CVE-2021-20305","qid":"940036","title":"AlmaLinux Security Update for gnutls and nettle (ALSA-2021:1206)"},{"cve":"CVE-2021-20305","qid":"960830","title":"Rocky Linux Security Update for gnutls and nettle (RLSA-2021:1206)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2021-20305","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"nettle","version":{"version_data":[{"version_value":"nettle 3.7.2"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-327"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1942533","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1942533"},{"refsource":"GENTOO","name":"GLSA-202105-31","url":"https://security.gentoo.org/glsa/202105-31"},{"refsource":"FEDORA","name":"FEDORA-2021-454a0f6f76","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQKWVVMAIDAJ7YAA3VVO32BHLDOH2E63/"},{"refsource":"DEBIAN","name":"DSA-4933","url":"https://www.debian.org/security/2021/dsa-4933"},{"refsource":"MLIST","name":"[debian-lts-announce] 20210918 [SECURITY] [DLA 2760-1] nettle security update","url":"https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20211022-0002/","url":"https://security.netapp.com/advisory/ntap-20211022-0002/"}]},"description":{"description_data":[{"lang":"eng","value":"A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability."}]}},"nvd":{"publishedDate":"2021-04-05 22:15:00","lastModifiedDate":"2023-11-07 03:29:00","problem_types":["CWE-787"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nettle_project:nettle:*:*:*:*:*:*:*:*","versionEndExcluding":"3.7.2","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"20305","Ordinal":"194346","Title":"CVE-2021-20305","CVE":"CVE-2021-20305","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"20305","Ordinal":"1","NoteData":"A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"20305","Ordinal":"2","NoteData":"2021-04-05","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"20305","Ordinal":"3","NoteData":"2021-10-22","Type":"Other","Title":"Modified"}]}}}