{"api_version":"1","generated_at":"2026-04-22T21:38:52+00:00","cve":"CVE-2021-4197","urls":{"html":"https://cve.report/CVE-2021-4197","api":"https://cve.report/api/cve/CVE-2021-4197.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-4197","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-4197"},"summary":{"title":"CVE-2021-4197","description":"An unprivileged write to the file handler flaw in the Linux kernel's control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2022-03-23 20:15:00","updated_at":"2023-11-07 03:40:00"},"problem_types":["CWE-287"],"metrics":[],"references":[{"url":"https://lore.kernel.org/lkml/20211209214707.805617-1-tj%40kernel.org/T/","name":"https://lore.kernel.org/lkml/20211209214707.805617-1-tj%40kernel.org/T/","refsource":"","tags":[],"title":"[PATCHSET cgroup/for-5.16-fixes] cgroup: Use open-time creds and namespace for migration perm checks","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.debian.org/security/2022/dsa-5127","name":"DSA-5127","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-5127-1 linux","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.netapp.com/advisory/ntap-20220602-0006/","name":"https://security.netapp.com/advisory/ntap-20220602-0006/","refsource":"CONFIRM","tags":[],"title":"CVE-2021-4197 Linux Kernel Vulnerability in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.debian.org/security/2022/dsa-5173","name":"DSA-5173","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-5173-1 linux","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/","name":"https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/","refsource":"MISC","tags":[],"title":"[PATCHSET cgroup/for-5.16-fixes] cgroup: Use open-time creds and namespace for migration perm checks","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2035652","name":"https://bugzilla.redhat.com/show_bug.cgi?id=2035652","refsource":"MISC","tags":[],"title":"2035652 – (CVE-2021-4197) CVE-2021-4197 kernel: cgroup: Use open-time creds and namespace for migration perm checks","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.oracle.com/security-alerts/cpujul2022.html","name":"N/A","refsource":"N/A","tags":[],"title":"Oracle Critical Patch Update Advisory - July 2022","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-4197","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4197","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"4197","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"broadcom","cpe5":"brocade_fabric_operating_system_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"4197","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"4197","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linux","cpe5":"linux_kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"4197","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"4197","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netapp","cpe5":"h300s","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"4197","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"h300s_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"4197","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netapp","cpe5":"h410c","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"4197","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"h410c_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"4197","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netapp","cpe5":"h410s","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"4197","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"h410s_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"4197","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netapp","cpe5":"h500s","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"4197","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"h500s_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"4197","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netapp","cpe5":"h700s","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"4197","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"h700s_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"4197","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_cloud_native_core_binding_support_function","cpe6":"22.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"4197","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_cloud_native_core_binding_support_function","cpe6":"22.1.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"4197","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_cloud_native_core_binding_support_function","cpe6":"22.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-4197","qid":"159825","title":"Oracle Enterprise Linux Security Update for kernel (ELSA-2022-1988)"},{"cve":"CVE-2021-4197","qid":"159896","title":"Oracle Enterprise Linux Security Update for unbreakable enterprise kernel (ELSA-2022-9479)"},{"cve":"CVE-2021-4197","qid":"159899","title":"Oracle Enterprise Linux Security Update for unbreakable enterprise kernel-container (ELSA-2022-9480)"},{"cve":"CVE-2021-4197","qid":"179258","title":"Debian Security Update for linux (DSA 5127-1)"},{"cve":"CVE-2021-4197","qid":"180605","title":"Debian Security Update for linux (DSA 5173-1)"},{"cve":"CVE-2021-4197","qid":"181945","title":"Debian Security Update for linux (CVE-2021-4197)"},{"cve":"CVE-2021-4197","qid":"198659","title":"Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-5278-1)"},{"cve":"CVE-2021-4197","qid":"198708","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5337-1)"},{"cve":"CVE-2021-4197","qid":"198731","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5368-1)"},{"cve":"CVE-2021-4197","qid":"198824","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5467-1)"},{"cve":"CVE-2021-4197","qid":"198858","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5515-1)"},{"cve":"CVE-2021-4197","qid":"240275","title":"Red Hat Update for kernel-rt (RHSA-2022:1975)"},{"cve":"CVE-2021-4197","qid":"240298","title":"Red Hat Update for kernel security (RHSA-2022:1988)"},{"cve":"CVE-2021-4197","qid":"240544","title":"Red Hat Update for kernel-rt (RHSA-2022:5633)"},{"cve":"CVE-2021-4197","qid":"240545","title":"Red Hat Update for kernel (RHSA-2022:5626)"},{"cve":"CVE-2021-4197","qid":"282240","title":"Fedora Security Update for kernel (FEDORA-2022-d918ad60e5)"},{"cve":"CVE-2021-4197","qid":"282241","title":"Fedora Security Update for kernel (FEDORA-2022-ade480f201)"},{"cve":"CVE-2021-4197","qid":"353184","title":"Amazon Linux Security Advisory for kernel : ALAS-2022-1571"},{"cve":"CVE-2021-4197","qid":"353189","title":"Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.4-2022-023"},{"cve":"CVE-2021-4197","qid":"353190","title":"Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.10-2022-011"},{"cve":"CVE-2021-4197","qid":"353195","title":"Amazon Linux Security Advisory for kernel : ALAS2-2022-1761"},{"cve":"CVE-2021-4197","qid":"376925","title":"Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-2022:0125)"},{"cve":"CVE-2021-4197","qid":"377124","title":"Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-2022:0029)"},{"cve":"CVE-2021-4197","qid":"6140363","title":"AWS Bottlerocket Security Update for kernel (GHSA-5536-w268-777r)"},{"cve":"CVE-2021-4197","qid":"671448","title":"EulerOS Security Update for kernel (EulerOS-SA-2022-1450)"},{"cve":"CVE-2021-4197","qid":"671474","title":"EulerOS Security Update for kernel (EulerOS-SA-2022-1429)"},{"cve":"CVE-2021-4197","qid":"671505","title":"EulerOS Security Update for kernel (EulerOS-SA-2022-1489)"},{"cve":"CVE-2021-4197","qid":"671535","title":"EulerOS Security Update for kernel (EulerOS-SA-2022-1508)"},{"cve":"CVE-2021-4197","qid":"671611","title":"EulerOS Security Update for kernel (EulerOS-SA-2022-1537)"},{"cve":"CVE-2021-4197","qid":"671703","title":"EulerOS Security Update for kernel (EulerOS-SA-2022-1735)"},{"cve":"CVE-2021-4197","qid":"751654","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0197-1)"},{"cve":"CVE-2021-4197","qid":"751657","title":"OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2022:0198-1)"},{"cve":"CVE-2021-4197","qid":"751666","title":"OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2022:0169-1)"},{"cve":"CVE-2021-4197","qid":"751695","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0367-1)"},{"cve":"CVE-2021-4197","qid":"751696","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0364-1)"},{"cve":"CVE-2021-4197","qid":"751697","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0366-1)"},{"cve":"CVE-2021-4197","qid":"751698","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0362-1)"},{"cve":"CVE-2021-4197","qid":"751701","title":"OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2022:0366-1)"},{"cve":"CVE-2021-4197","qid":"751702","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0371-1)"},{"cve":"CVE-2021-4197","qid":"751703","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0372-1)"},{"cve":"CVE-2021-4197","qid":"751993","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0198-1)"},{"cve":"CVE-2021-4197","qid":"753194","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0288-1)"},{"cve":"CVE-2021-4197","qid":"753267","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0169-1)"},{"cve":"CVE-2021-4197","qid":"753462","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0289-1)"},{"cve":"CVE-2021-4197","qid":"900777","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (9138)"},{"cve":"CVE-2021-4197","qid":"901915","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (9141)"},{"cve":"CVE-2021-4197","qid":"902012","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (9138-1)"},{"cve":"CVE-2021-4197","qid":"902096","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (9141-1)"},{"cve":"CVE-2021-4197","qid":"905833","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (9138-2)"},{"cve":"CVE-2021-4197","qid":"906384","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (9141-2)"},{"cve":"CVE-2021-4197","qid":"940517","title":"AlmaLinux Security Update for kernel (ALSA-2022:1988)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2021-4197","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"kernel","version":{"version_data":[{"version_value":"Linux kernel 5.17-rc1"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-287"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://bugzilla.redhat.com/show_bug.cgi?id=2035652","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2035652"},{"refsource":"MISC","name":"https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/","url":"https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/"},{"refsource":"DEBIAN","name":"DSA-5127","url":"https://www.debian.org/security/2022/dsa-5127"},{"refsource":"DEBIAN","name":"DSA-5173","url":"https://www.debian.org/security/2022/dsa-5173"},{"url":"https://www.oracle.com/security-alerts/cpujul2022.html","refsource":"MISC","name":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20220602-0006/","url":"https://security.netapp.com/advisory/ntap-20220602-0006/"}]},"description":{"description_data":[{"lang":"eng","value":"An unprivileged write to the file handler flaw in the Linux kernel's control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system."}]}},"nvd":{"publishedDate":"2022-03-23 20:15:00","lastModifiedDate":"2023-11-07 03:40:00","problem_types":["CWE-287"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":7.2},"severity":"HIGH","exploitabilityScore":3.9,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20","versionEndExcluding":"5.4.189","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.15","versionEndExcluding":"4.19.238","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.2","versionEndExcluding":"4.14.276","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"5.10.111","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.11","versionEndExcluding":"5.15.14","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"4197","Ordinal":"224646","Title":"CVE-2021-4197","CVE":"CVE-2021-4197","Year":"2021"},"notes":[]}}}