Skip to main content

CVE-2021-46854: n/a in n/a

High
VulnerabilityCVE-2021-46854cvecve-2021-46854
Published: Wed Nov 23 2022 (11/23/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

mod_radius in ProFTPD before 1.3.7c allows memory disclosure to RADIUS servers because it copies blocks of 16 characters.

AI-Powered Analysis

AILast updated: 06/22/2025, 07:50:25 UTC

Technical Analysis

CVE-2021-46854 is a high-severity vulnerability affecting the mod_radius module in ProFTPD versions prior to 1.3.7c. ProFTPD is a widely used FTP server software, and mod_radius is a module that integrates RADIUS authentication for user access control. The vulnerability arises because mod_radius copies blocks of 16 characters without proper bounds checking, leading to a memory disclosure issue. Specifically, this flaw allows an unauthenticated remote attacker to send crafted RADIUS requests that cause the server to leak memory contents. The vulnerability does not require any authentication or user interaction, and it can be exploited remotely over the network (AV:N). The attack complexity is low (AC:L), meaning exploitation is straightforward. The vulnerability impacts confidentiality (C:H) by potentially exposing sensitive memory data, but it does not affect integrity or availability (I:N, A:N). Although no known exploits are currently reported in the wild, the presence of this vulnerability in a critical authentication module poses a significant risk. The vulnerability is classified under CWE-401, which relates to improper handling of memory leading to information disclosure. Since ProFTPD is commonly deployed on Unix-like systems for FTP services, organizations using this software with mod_radius enabled are at risk of sensitive data leakage, including authentication credentials or other memory-resident information. The lack of a patch link suggests that users should verify they are running version 1.3.7c or later, where this issue is addressed.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for those relying on ProFTPD with mod_radius for FTP services and RADIUS-based authentication. Confidential information such as user credentials, session tokens, or other sensitive data stored in memory could be exposed to remote attackers, leading to unauthorized access or further compromise. This is particularly critical for sectors handling sensitive data, including finance, healthcare, government, and critical infrastructure. The vulnerability's remote exploitability without authentication increases the attack surface, potentially allowing attackers to gather intelligence or prepare for more targeted attacks. Additionally, organizations with compliance obligations under GDPR may face regulatory and reputational consequences if data leakage occurs. While the vulnerability does not directly impact system integrity or availability, the confidentiality breach alone can facilitate lateral movement or privilege escalation in a broader attack chain.

Mitigation Recommendations

1. Immediate upgrade to ProFTPD version 1.3.7c or later, where the vulnerability is fixed. 2. If upgrading is not immediately feasible, disable the mod_radius module to eliminate the attack vector. 3. Restrict network access to the RADIUS server and FTP services using firewall rules, allowing only trusted IP addresses to communicate. 4. Monitor network traffic for unusual RADIUS requests or anomalies that could indicate exploitation attempts. 5. Conduct memory and log analysis to detect any signs of information leakage or suspicious activity. 6. Implement network segmentation to isolate FTP servers from critical internal systems. 7. Review and tighten RADIUS server configurations to minimize exposure. 8. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting anomalous RADIUS traffic. 9. Educate system administrators about the vulnerability and ensure timely application of security patches in the future.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-11-23T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983dc4522896dcbef37e

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 6/22/2025, 7:50:25 AM

Last updated: 7/26/2025, 5:24:14 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats