PatchSiren

PatchSiren cyber security CVE debrief

CVE-2021-3825 Pardus CVE debrief

CVE-2021-3825 is a critical authentication and data exposure issue in the Lider module of LiderAhenk. According to the CVE description and NVD data, versions 2.1.15 and below expose an unsecured configuration API that can leak configuration data, including valid LDAP credentials. Because those credentials can unlock broader directory and identity access, the impact can extend well beyond the original API exposure.

Vendor
Pardus
Product
Liderahenk
CVSS
CRITICAL 9.6
CISA KEV
Not listed in stored evidence
Original CVE published
2021-10-01
Original CVE updated
2026-05-18
Advisory published
2021-10-01
Advisory updated
2026-05-18

Who should care

Administrators and security teams running LiderAhenk/Lider module deployments, especially any environment where the configuration API is reachable by unauthorized users or over a shared network. Identity, directory, and endpoint-management teams should also care because leaked LDAP credentials can affect authentication and authorization systems.

Technical summary

NVD lists the affected CPE as pardus:liderahenk with a vulnerable version range ending at 2.1.15. The reported issue is an unsecured API that leaks configuration data. The CVE metadata indicates CWE-306, and the CVSS vector is AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H, reflecting the possibility that unauthorized access to the API can expose high-value credentials and cause broad downstream impact. The supplied references include NVD, the CVE record, USOM advisories, and a third-party advisory describing the issue.

Defensive priority

Immediate / highest priority for any exposed deployment. The combination of credential leakage, critical CVSS scoring, and likely identity-system impact makes this a high-risk issue to remediate quickly.

Recommended defensive actions

  • Upgrade Lider module/LiderAhenk to a version newer than 2.1.15 if available.
  • Restrict access to the configuration API so it is not reachable by unauthorized users or untrusted network segments.
  • Audit current deployments to confirm whether the configuration API is exposed and whether any sensitive configuration data is returned.
  • Rotate any LDAP credentials that may have been exposed through the API, and review dependent services for unauthorized access.
  • Review logs and access controls for the API and related directory services to identify suspicious use.
  • Apply network segmentation and least-privilege controls around management and configuration interfaces.

Evidence notes

The description, NVD CPE range, and CVSS data supplied with the CVE indicate that versions up to 2.1.15 are affected and that the issue involves unsecured configuration API access. NVD also lists CWE-306. References supplied in the record point to the official NVD and CVE records, USOM advisories, and a third-party advisory URL, but this debrief only relies on the supplied metadata and official record links.

Official resources

Published by the CVE record on 2021-10-01T15:15:07.883Z and later modified on 2026-05-18T09:16:22.340Z.