Home

Description

Positive Technologies MaxPatrol 8 and XSpider contain a remote denial-of-service vulnerability in the client communication service on TCP port 2002. The service generates a new session identifier for each incoming connection without adequately limiting concurrent requests. An unauthenticated remote attacker can repeatedly issue HTTPS requests to the service, causing excessive allocation of session identifiers. Under load, session identifier collisions may occur, forcing active client sessions to disconnect and resulting in service disruption.

PUBLISHED Reserved 2025-11-14 | Published 2025-11-14 | Updated 2025-11-18 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-400 Uncontrolled Resource Consumption

Product status

Default status
unknown

Any version
affected

Default status
unknown

Any version
affected

Timeline

2021-09-19:Exploit is publicly disclosed.

Credits

AsCiI finder

References

cxsecurity.com/issue/WLB-2021090114 exploit

vulners.com/zdt/1337DAY-ID-36775 exploit

vulners.com/zdt/1337DAY-ID-36775 exploit

cxsecurity.com/issue/WLB-2021090114 exploit

www.ptsecurity.com/ product

www.vulncheck.com/...gies-maxpatrol-8-and-xspider-remote-dos third-party-advisory

cve.org (CVE-2021-4467)

nvd.nist.gov (CVE-2021-4467)

Download JSON