Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2021-4467
PUBLISHED
More InfoOfficial Page
Assigner-VulnCheck
Assigner Org ID-83251b91-4cc7-4094-a5c7-464a1b83ea10
View Known Exploited Vulnerability (KEV) details
Published At-14 Nov, 2025 | 22:51
Updated At-18 Nov, 2025 | 16:33
Rejected At-
▼CVE Numbering Authority (CNA)
Positive Technologies MaxPatrol 8 & XSpider Remote DoS

Positive Technologies MaxPatrol 8 and XSpider contain a remote denial-of-service vulnerability in the client communication service on TCP port 2002. The service generates a new session identifier for each incoming connection without adequately limiting concurrent requests. An unauthenticated remote attacker can repeatedly issue HTTPS requests to the service, causing excessive allocation of session identifiers. Under load, session identifier collisions may occur, forcing active client sessions to disconnect and resulting in service disruption.

Affected Products
Vendor
Positive Technologies
Product
MaxPatrol 8 (Server)
Default Status
unknown
Versions
Affected
  • From 0 through 09.2020 (custom)
Vendor
Positive Technologies
Product
XSpider (Server)
Default Status
unknown
Versions
Affected
  • From 0 through 09.2020 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-400CWE-400 Uncontrolled Resource Consumption
Type: CWE
CWE ID: CWE-400
Description: CWE-400 Uncontrolled Resource Consumption
Metrics
VersionBase scoreBase severityVector
4.08.7HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Version: 4.0
Base score: 8.7
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-227CAPEC-227 Sustained Client Engagement
CAPEC ID: CAPEC-227
Description: CAPEC-227 Sustained Client Engagement
Solutions

Configurations

Workarounds

Exploits

Credits

finder
AsCiI
Timeline
EventDate
Exploit is publicly disclosed.2021-09-19 16:00:00
Event: Exploit is publicly disclosed.
Date: 2021-09-19 16:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://vulners.com/zdt/1337DAY-ID-36775
exploit
https://cxsecurity.com/issue/WLB-2021090114
exploit
https://www.ptsecurity.com/
product
https://www.vulncheck.com/advisories/positive-technologies-maxpatrol-8-and-xspider-remote-dos
third-party-advisory
Hyperlink: https://vulners.com/zdt/1337DAY-ID-36775
Resource:
exploit
Hyperlink: https://cxsecurity.com/issue/WLB-2021090114
Resource:
exploit
Hyperlink: https://www.ptsecurity.com/
Resource:
product
Hyperlink: https://www.vulncheck.com/advisories/positive-technologies-maxpatrol-8-and-xspider-remote-dos
Resource:
third-party-advisory
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://cxsecurity.com/issue/WLB-2021090114
exploit
https://vulners.com/zdt/1337DAY-ID-36775
exploit
Hyperlink: https://cxsecurity.com/issue/WLB-2021090114
Resource:
exploit
Hyperlink: https://vulners.com/zdt/1337DAY-ID-36775
Resource:
exploit
Details not found