The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-42376

CVE-2021-42376: Busybox Hush Applet DoS Vulnerability

CVE-2021-42376 is a denial of service flaw in Busybox's hush applet caused by NULL pointer dereference. Attackers can exploit crafted shell commands to trigger DoS. This article covers technical details, impact, and mitigations.

Published: March 4, 2026

CVE-2021-42376 Overview

A NULL pointer dereference vulnerability exists in Busybox's hush applet that leads to denial of service when processing a crafted shell command. The vulnerability occurs due to missing validation after a \\x03 delimiter character is encountered during command parsing. While exploitability requires specific conditions involving filtered command input, successful exploitation can crash the affected application, causing service disruption.

Critical Impact

Attackers can cause denial of service by crashing the Busybox hush shell through specially crafted shell commands containing the \\x03 delimiter character, potentially disrupting embedded systems and IoT devices that rely on Busybox for core functionality.

Affected Products

  • Busybox (all versions prior to patch)
  • Fedora Project Fedora 33 and 34
  • NetApp Cloud Backup
  • NetApp HCI Management Node
  • NetApp SolidFire
  • NetApp H-Series Storage Systems (H300S, H500S, H700S, H300E, H500E, H700E, H410S) and associated firmware

Discovery Timeline

  • 2021-11-15 - CVE-2021-42376 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2021-42376

Vulnerability Analysis

This vulnerability is classified as CWE-476 (NULL Pointer Dereference), which occurs when an application dereferences a pointer that it expects to be valid but is actually NULL. In the context of Busybox's hush applet, the shell interpreter fails to properly validate input after encountering the \\x03 delimiter character during command parsing.

The hush shell is a lightweight POSIX-compliant shell implementation included in Busybox, commonly used in embedded Linux systems, IoT devices, and containerized environments where a minimal footprint is required. When the parser encounters the special \\x03 character (ASCII ETX - End of Text), it fails to check whether subsequent required data structures are properly initialized before attempting to access them.

The attack requires local access to execute shell commands, making remote exploitation impractical in most scenarios. However, in environments where user input is filtered and passed to shell commands, an attacker could potentially inject the crafted payload to trigger the crash.

Root Cause

The root cause is insufficient input validation in the hush applet's command parsing logic. When processing shell commands, the parser encounters the \\x03 delimiter character and proceeds to dereference a pointer without first verifying that the pointer references valid memory. This missing NULL check allows an attacker to trigger a segmentation fault by providing input that leaves the pointer in an uninitialized or NULL state.

Attack Vector

Exploitation requires local access to the system where Busybox is installed. The attacker must be able to execute or inject shell commands that will be processed by the hush applet.

The attack mechanism involves:

  1. The attacker crafts a shell command containing the \\x03 delimiter character
  2. The command is passed to the hush shell for processing
  3. The parser encounters the \\x03 character and fails to properly initialize required data structures
  4. The subsequent code attempts to dereference a NULL pointer
  5. The shell process crashes, resulting in denial of service

While this vulnerability has a local attack vector, it is particularly concerning for embedded systems and IoT devices where Busybox is commonly deployed as the primary shell and system utility suite. A crash in these environments could disrupt critical device functionality or automated processes that rely on shell command execution.

Detection Methods for CVE-2021-42376

Indicators of Compromise

  • Unexpected crashes or segmentation faults in Busybox hush shell processes
  • Core dump files generated by hush applet crashes containing evidence of NULL pointer access
  • Process termination signals (SIGSEGV) logged for Busybox-related processes
  • Repeated shell process restarts in system logs

Detection Strategies

  • Monitor system logs for segmentation fault events associated with Busybox or hush shell processes
  • Implement application crash monitoring to detect abnormal termination patterns in shell processes
  • Review input validation in applications that pass user-controlled data to shell commands
  • Audit systems to identify Busybox installations and verify version information against known vulnerable versions

Monitoring Recommendations

  • Configure logging to capture shell process crashes and associated command history when available
  • Implement process monitoring on embedded systems and IoT devices running Busybox to detect service disruptions
  • Set up alerts for repeated process restarts that may indicate exploitation attempts
  • Monitor for unusual patterns of shell command execution failures

How to Mitigate CVE-2021-42376

Immediate Actions Required

  • Inventory all systems running Busybox to identify potentially affected deployments
  • Update Busybox to the latest patched version that addresses CVE-2021-42376
  • For embedded systems with firmware-level Busybox installations, apply firmware updates from the respective vendor
  • Review and restrict which users have local access to systems running vulnerable Busybox versions

Patch Information

Patches are available from the Busybox project and downstream distributions. Organizations should consult the following resources for patching guidance:

  • Claroty Research Report - Original vulnerability research from Claroty Team82
  • JFrog Blog Post - Detailed technical analysis and patch information
  • NetApp Security Advisory - Guidance for NetApp product users
  • Fedora Package Announcements - Updates for Fedora 33 and 34 users

Workarounds

  • If patching is not immediately possible, consider using an alternative shell implementation (such as ash or sh) where available
  • Implement input sanitization to filter or reject shell commands containing the \\x03 character before they reach the hush applet
  • Restrict local access to systems running vulnerable Busybox versions to trusted users only
  • For embedded devices, consider network segmentation to limit attacker access to vulnerable systems
bash
# Check Busybox version to determine if vulnerable
busybox --help 2>&1 | head -1

# Verify which applets are enabled (check for hush)
busybox --list | grep hush

# If using package manager, check for available updates
# Fedora/RHEL:
dnf check-update busybox

# Debian/Ubuntu:
apt list --upgradable 2>/dev/null | grep busybox

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechBusybox

  • SeverityMEDIUM

  • CVSS Score5.5

  • EPSS Probability0.04%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-476
  • Technical References
  • Claroty Research Report

  • JFrog Blog Post

  • Fedora Package Announcement

  • Fedora Package Announcement

  • NetApp Security Advisory
  • Related CVEs
  • CVE-2021-42375: Busybox ash Applet DoS Vulnerability

  • CVE-2021-42373: Busybox Man Applet DOS Vulnerability

  • CVE-2026-29126: IDC SFX2100 Privilege Escalation Flaw

  • CVE-2026-26157: BusyBox Path Traversal Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English