According to the OpenSSL team's description, the data structure used to implement ASN.1 strings may allow an attacker to create a buffer overflow. This makes it possible to specifically crash the application as part of a denial of service attack by manipulating data packets.
We have included the fix for this vulnerability in NRSW versions 4.5.0.106, 4.4.0.113 and 4.3.0.114.
Further information:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712