{"api_version":"1","generated_at":"2026-04-22T19:06:51+00:00","cve":"CVE-2021-43527","urls":{"html":"https://cve.report/CVE-2021-43527","api":"https://cve.report/api/cve/CVE-2021-43527.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-43527","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-43527"},"summary":{"title":"CVE-2021-43527","description":"NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \\#7, or PKCS \\#12 are likely to be impacted. Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be impacted, depending on how they configure NSS. *Note: This vulnerability does NOT impact Mozilla Firefox.* However, email clients and PDF viewers that use NSS for signature verification, such as Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted. This vulnerability affects NSS < 3.73 and NSS < 3.68.1.","state":"PUBLIC","assigner":"security@mozilla.org","published_at":"2021-12-08 22:15:00","updated_at":"2023-02-23 01:40:00"},"problem_types":["CWE-787"],"metrics":[],"references":[{"url":"https://security.netapp.com/advisory/ntap-20211229-0002/","name":"https://security.netapp.com/advisory/ntap-20211229-0002/","refsource":"CONFIRM","tags":[],"title":"CVE-2021-43527 Libnss Vulnerability in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.oracle.com/security-alerts/cpuapr2022.html","name":"https://www.oracle.com/security-alerts/cpuapr2022.html","refsource":"MISC","tags":[],"title":"Oracle Critical Patch Update Advisory - April 2022","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1737470","name":"https://bugzilla.mozilla.org/show_bug.cgi?id=1737470","refsource":"MISC","tags":[],"title":"Access Denied","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.mozilla.org/security/advisories/mfsa2021-51/","name":"https://www.mozilla.org/security/advisories/mfsa2021-51/","refsource":"MISC","tags":[],"title":"Memory corruption in NSS via DER-encoded DSA and RSA-PSS signatures — Mozilla","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_73_RTM/","name":"https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_73_RTM/","refsource":"MISC","tags":[],"title":"Directory Listing: /pub/security/nss/releases/NSS_3_73_RTM/","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_68_1_RTM/","name":"https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_68_1_RTM/","refsource":"MISC","tags":[],"title":"Directory Listing: /pub/security/nss/releases/NSS_3_68_1_RTM/","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-594438.pdf","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-594438.pdf","refsource":"CONFIRM","tags":[],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"200"},{"url":"https://www.starwindsoftware.com/security/sw-20220802-0001/","name":"https://www.starwindsoftware.com/security/sw-20220802-0001/","refsource":"MISC","tags":[],"title":"CVE-2021-43527 NSS heap overflow in StarWind products","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.gentoo.org/glsa/202212-05","name":"GLSA-202212-05","refsource":"GENTOO","tags":[],"title":"Mozilla Network Security Service (NSS): Multiple Vulnerabilities (GLSA 202212-05) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-43527","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43527","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"43527","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"nss","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"43527","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"nss_esr","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"43527","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"cloud_backup","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"43527","vulnerable":"1","versionEndIncluding":"11.70.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"e-series_santricity_os_controller","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"43527","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_cloud_native_core_binding_support_function","cpe6":"1.11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"43527","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_cloud_native_core_network_repository_function","cpe6":"1.15.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"43527","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_cloud_native_core_network_repository_function","cpe6":"1.15.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"43527","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_cloud_native_core_network_slice_selection_function","cpe6":"1.8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"43527","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_policy_management","cpe6":"12.6.0.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"43527","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"starwindsoftware","cpe5":"starwind_san_\\&_nas","cpe6":"v8r13","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"43527","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"starwindsoftware","cpe5":"starwind_virtual_san","cpe6":"v8r13","cpe7":"14398","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-43527","qid":"159543","title":"Oracle Enterprise Linux Security Update for nss (ELSA-2021-4903)"},{"cve":"CVE-2021-43527","qid":"159544","title":"Oracle Enterprise Linux Security Update for nss (ELSA-2021-4904)"},{"cve":"CVE-2021-43527","qid":"159569","title":"Oracle Enterprise Linux Security Update for nss (ELSA-2021-9591)"},{"cve":"CVE-2021-43527","qid":"178920","title":"Debian Security Update for nss (DSA 5016-1)"},{"cve":"CVE-2021-43527","qid":"178921","title":"Debian Security Update for nss (DLA 2836-1)"},{"cve":"CVE-2021-43527","qid":"178931","title":"Debian Security Update for nss (DLA 2836-2)"},{"cve":"CVE-2021-43527","qid":"184071","title":"Debian Security Update for nss (CVE-2021-43527)"},{"cve":"CVE-2021-43527","qid":"198590","title":"Ubuntu Security Notification for Thunderbird Vulnerability (USN-5168-2)"},{"cve":"CVE-2021-43527","qid":"198591","title":"Ubuntu Security Notification for NSS Vulnerability (USN-5168-1)"},{"cve":"CVE-2021-43527","qid":"239921","title":"Red Hat Update for nss (RHSA-2021:4904)"},{"cve":"CVE-2021-43527","qid":"239922","title":"Red Hat Update for nss (RHSA-2021:4903)"},{"cve":"CVE-2021-43527","qid":"239923","title":"Red Hat Update for nss (RHSA-2021:4909)"},{"cve":"CVE-2021-43527","qid":"239924","title":"Red Hat Update for nss (RHSA-2021:4919)"},{"cve":"CVE-2021-43527","qid":"239930","title":"Red Hat Update for thunderbird (RHSA-2021:4954)"},{"cve":"CVE-2021-43527","qid":"239931","title":"Red Hat Update for nss (RHSA-2021:4953)"},{"cve":"CVE-2021-43527","qid":"257135","title":"CentOS Security Update for nss (CESA-2021:4904)"},{"cve":"CVE-2021-43527","qid":"282094","title":"Fedora Security Update for nss (FEDORA-2021-d0be347892)"},{"cve":"CVE-2021-43527","qid":"282125","title":"Fedora Security Update for nss (FEDORA-2021-d8e9f6222a)"},{"cve":"CVE-2021-43527","qid":"296061","title":"Oracle Solaris 11.4 Support Repository Update (SRU) 42.113.1 Missing (CPUJAN2022)"},{"cve":"CVE-2021-43527","qid":"353043","title":"Amazon Linux Security Advisory for nss : ALAS-2021-1552"},{"cve":"CVE-2021-43527","qid":"353044","title":"Amazon Linux Security Advisory for nss, nss-util, nss-softokn, nspr : ALAS2-2021-1722"},{"cve":"CVE-2021-43527","qid":"353096","title":"Amazon Linux Security Advisory for nss : AL2012-2021-357"},{"cve":"CVE-2021-43527","qid":"354422","title":"Amazon Linux Security Advisory for nss : ALAS2022-2022-223"},{"cve":"CVE-2021-43527","qid":"354451","title":"Amazon Linux Security Advisory for nss : ALAS2022-2021-002"},{"cve":"CVE-2021-43527","qid":"354534","title":"Amazon Linux Security Advisory for nss : ALAS-2022-223"},{"cve":"CVE-2021-43527","qid":"354756","title":"Amazon Linux Security Advisory for nss-util : ALAS2-2023-1954"},{"cve":"CVE-2021-43527","qid":"354759","title":"Amazon Linux Security Advisory for nss : ALAS2-2023-1952"},{"cve":"CVE-2021-43527","qid":"354764","title":"Amazon Linux Security Advisory for nspr : ALAS2-2023-1953"},{"cve":"CVE-2021-43527","qid":"354779","title":"Amazon Linux Security Advisory for nss-softokn : ALAS2-2023-1955"},{"cve":"CVE-2021-43527","qid":"355198","title":"Amazon Linux Security Advisory for nss : ALAS2023-2023-031"},{"cve":"CVE-2021-43527","qid":"376265","title":"LibreOffice check for Memory corruption via DER-encoded DSA and Rivest-Shamir-Adleman (RSA)-PSS (CVE-2021-43527)"},{"cve":"CVE-2021-43527","qid":"376930","title":"Alibaba Cloud Linux Security Update for nss (ALINUX3-SA-2021:0081)"},{"cve":"CVE-2021-43527","qid":"376947","title":"Alibaba Cloud Linux Security Update for nss (ALINUX2-SA-2021:0070)"},{"cve":"CVE-2021-43527","qid":"390251","title":"Oracle Managed Virtualization (VM) Server for x86 Security Update for nss (OVMSA-2021-0040)"},{"cve":"CVE-2021-43527","qid":"390279","title":"Oracle Managed Virtualization (VM) Server for x86 Security Update for nss (OVMSA-2023-0014)"},{"cve":"CVE-2021-43527","qid":"500460","title":"Alpine Linux Security Update for nss"},{"cve":"CVE-2021-43527","qid":"501646","title":"Alpine Linux Security Update for nss"},{"cve":"CVE-2021-43527","qid":"502128","title":"Alpine Linux Security Update for nss"},{"cve":"CVE-2021-43527","qid":"502319","title":"Alpine Linux Security Update for nss"},{"cve":"CVE-2021-43527","qid":"505126","title":"Alpine Linux Security Update for nss"},{"cve":"CVE-2021-43527","qid":"591224","title":"Siemens RUGGEDCOM ROX products Remote Code Execution (RCE) and Denial of Service (DoS) Vulnerability (SSA-594438)"},{"cve":"CVE-2021-43527","qid":"671355","title":"EulerOS Security Update for nss (EulerOS-SA-2022-1278)"},{"cve":"CVE-2021-43527","qid":"671366","title":"EulerOS Security Update for nss (EulerOS-SA-2022-1310)"},{"cve":"CVE-2021-43527","qid":"671371","title":"EulerOS Security Update for nss (EulerOS-SA-2022-1294)"},{"cve":"CVE-2021-43527","qid":"671484","title":"EulerOS Security Update for nss (EulerOS-SA-2022-1468)"},{"cve":"CVE-2021-43527","qid":"671532","title":"EulerOS Security Update for nss (EulerOS-SA-2022-1477)"},{"cve":"CVE-2021-43527","qid":"690727","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for nss (47695a9c-5377-11ec-8be6-d4c9ef517024)"},{"cve":"CVE-2021-43527","qid":"690729","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for nss (47695a9c-5377-11ec-8be6-d4c9ef517024)"},{"cve":"CVE-2021-43527","qid":"710692","title":"Gentoo Linux Mozilla Network Security Service (NSS) Multiple Vulnerabilities (GLSA 202212-05)"},{"cve":"CVE-2021-43527","qid":"730371","title":"McAfee Web Gateway Multiple Vulnerabilities (WP-3335,WP-4131,WP-4159,WP-4237,WP-4259,WP-4329,WP-4348,WP-4355,WP-4376,WP-4407,WP-4421)"},{"cve":"CVE-2021-43527","qid":"751449","title":"SUSE Enterprise Linux Security Update for mozilla-nss (SUSE-SU-2021:3934-1)"},{"cve":"CVE-2021-43527","qid":"751453","title":"SUSE Enterprise Linux Security Update for mozilla-nss (SUSE-SU-2021:3939-1)"},{"cve":"CVE-2021-43527","qid":"751464","title":"OpenSUSE Security Update for mozilla-nss (openSUSE-SU-2021:3934-1)"},{"cve":"CVE-2021-43527","qid":"752379","title":"SUSE Enterprise Linux Security Update for mozilla-nspr, mozilla-nss (SUSE-SU-2022:2536-1)"},{"cve":"CVE-2021-43527","qid":"752380","title":"SUSE Enterprise Linux Security Update for mozilla-nss (SUSE-SU-2022:2533-1)"},{"cve":"CVE-2021-43527","qid":"752409","title":"SUSE Enterprise Linux Security Update for mozilla-nss (SUSE-SU-2022:2595-1)"},{"cve":"CVE-2021-43527","qid":"900336","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for nss (7020)"},{"cve":"CVE-2021-43527","qid":"900957","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for nss (7024-1)"},{"cve":"CVE-2021-43527","qid":"940321","title":"AlmaLinux Security Update for nss (ALSA-2021:4903)"},{"cve":"CVE-2021-43527","qid":"960047","title":"Rocky Linux Security Update for nss (RLSA-2021:4903)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2021-43527","ASSIGNER":"security@mozilla.org","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Mozilla","product":{"product_data":[{"product_name":"NSS","version":{"version_data":[{"version_value":"3.73","version_affected":"<"},{"version_value":"3.68.1","version_affected":"<"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Memory corruption via DER-encoded DSA and RSA-PSS signatures"}]}]},"references":{"reference_data":[{"url":"https://www.mozilla.org/security/advisories/mfsa2021-51/","refsource":"MISC","name":"https://www.mozilla.org/security/advisories/mfsa2021-51/"},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1737470","refsource":"MISC","name":"https://bugzilla.mozilla.org/show_bug.cgi?id=1737470"},{"url":"https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_73_RTM/","refsource":"MISC","name":"https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_73_RTM/"},{"url":"https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_68_1_RTM/","refsource":"MISC","name":"https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_68_1_RTM/"},{"url":"https://www.oracle.com/security-alerts/cpuapr2022.html","refsource":"MISC","name":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20211229-0002/","url":"https://security.netapp.com/advisory/ntap-20211229-0002/"},{"refsource":"CONFIRM","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-594438.pdf","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-594438.pdf"},{"refsource":"MISC","name":"https://www.starwindsoftware.com/security/sw-20220802-0001/","url":"https://www.starwindsoftware.com/security/sw-20220802-0001/"},{"refsource":"GENTOO","name":"GLSA-202212-05","url":"https://security.gentoo.org/glsa/202212-05"}]},"description":{"description_data":[{"lang":"eng","value":"NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \\#7, or PKCS \\#12 are likely to be impacted. Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be impacted, depending on how they configure NSS. *Note: This vulnerability does NOT impact Mozilla Firefox.* However, email clients and PDF viewers that use NSS for signature verification, such as Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted. This vulnerability affects NSS < 3.73 and NSS < 3.68.1."}]}},"nvd":{"publishedDate":"2021-12-08 22:15:00","lastModifiedDate":"2023-02-23 01:40:00","problem_types":["CWE-787"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:nss_esr:*:*:*:*:*:*:*:*","versionEndExcluding":"3.68.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:nss:*:*:*:*:*:*:*:*","versionEndExcluding":"3.73","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0","versionEndIncluding":"11.70.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.8.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.11.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_policy_management:12.6.0.0.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8r13:14398:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:starwindsoftware:starwind_san_\\&_nas:v8r13:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"43527","Ordinal":"220594","Title":"CVE-2021-43527","CVE":"CVE-2021-43527","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"43527","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}