Description
A flaw was found in 389-ds-base. If an asterisk is imported as password hashes, either accidentally or maliciously, then instead of being inactive, any password will successfully match during authentication. This flaw allows an attacker to successfully authenticate as a user whose password was disabled.
Published: 2022-04-18
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3399-1 389-ds-base security update
Debian DLA Debian DLA DLA-4021-1 389-ds-base security update
EUVD EUVD EUVD-2021-26948 A flaw was found in 389-ds-base. If an asterisk is imported as password hashes, either accidentally or maliciously, then instead of being inactive, any password will successfully match during authentication. This flaw allows an attacker to successfully authenticate as a user whose password was disabled.
History

Mon, 03 Nov 2025 21:30:00 +0000

Type Values Removed Values Added
References

Subscriptions

Port389 389-ds-base
Redhat Directory Server Enterprise Linux Rhel Eus
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-11-03T20:33:48.435Z

Reserved: 2021-07-16T00:00:00.000Z

Link: CVE-2021-3652

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-04-18T17:15:15.443

Modified: 2025-11-03T21:15:42.273

Link: CVE-2021-3652

cve-icon Redhat

Severity : Low

Publid Date: 2021-06-29T00:00:00Z

Links: CVE-2021-3652 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses