Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-22156 (GCVE-0-2021-22156)
Vulnerability from cvelistv5
- Denial of service or arbitrary code execution
- CWE-190 - Integer Overflow or Wraparound
| Vendor | Product | Version | ||
|---|---|---|---|---|
| BlackBerry | QNX Software Development Platform (SDP), QNX OS for Medical and QNX OS for Safety |
Version: QNX SDP 6.5.0 SP1 and earlier Version: QNX OS for Medical 1.1 and earlier Version: QNX OS for Safety 1.0.1 and earlier |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T18:37:17.775Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334"
},
{
"name": "20210818 BlackBerry QNX-2021-001 Vulnerability Affecting Cisco Products: August 2021",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "QNX Software Development Platform (SDP), QNX OS for Medical and QNX OS for Safety",
"vendor": "BlackBerry",
"versions": [
{
"status": "affected",
"version": "QNX SDP 6.5.0 SP1 and earlier"
},
{
"status": "affected",
"version": "QNX OS for Medical 1.1 and earlier"
},
{
"status": "affected",
"version": "QNX OS for Safety 1.0.1 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eAn integer overflow vulnerability in the calloc() function of the C runtime library of affected versions of BlackBerry\u00ae QNX Software Development Platform (SDP) version(s) 6.5.0SP1 and earlier, QNX OS for Medical 1.1 and earlier, and QNX OS for Safety 1.0.1 and earlier that could allow an attacker to potentially perform a denial of service or execute arbitrary code.\u003c/p\u003e"
}
],
"value": "An integer overflow vulnerability in the calloc() function of the C runtime library of affected versions of BlackBerry\u00ae QNX Software Development Platform (SDP) version(s) 6.5.0SP1 and earlier, QNX OS for Medical 1.1 and earlier, and QNX OS for Safety 1.0.1 and earlier that could allow an attacker to potentially perform a denial of service or execute arbitrary code."
}
],
"impacts": [
{
"capecId": "CAPEC-92",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-92 Forced Integer Overflow"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Denial of service or arbitrary code execution",
"lang": "en"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-190",
"description": "CWE-190 Integer Overflow or Wraparound",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-22T15:20:31.911Z",
"orgId": "dbe78b00-5e7b-4fda-8748-329789ecfc5c",
"shortName": "blackberry"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334"
},
{
"name": "20210818 BlackBerry QNX-2021-001 Vulnerability Affecting Cisco Products: August 2021",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@blackberry.com",
"ID": "CVE-2021-22156",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "BlackBerry QNX Software Development Platform (SDP), QNX OS for Medical and QNX OS for Safety",
"version": {
"version_data": [
{
"version_value": "QNX SDP 6.5.0 SP1 and earlier"
},
{
"version_value": "QNX OS for Medical 1.1 and earlier"
},
{
"version_value": "QNX OS for Safety 1.0.1 and earlier"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An integer overflow vulnerability in the calloc() function of the C runtime library of affected versions of BlackBerry\u00ae QNX Software Development Platform (SDP) version(s) 6.5.0SP1 and earlier, QNX OS for Medical 1.1 and earlier, and QNX OS for Safety 1.0.1 and earlier that could allow an attacker to potentially perform a denial of service or execute arbitrary code."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of service or arbitrary code execution"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334",
"refsource": "MISC",
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334"
},
{
"name": "20210818 BlackBerry QNX-2021-001 Vulnerability Affecting Cisco Products: August 2021",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "dbe78b00-5e7b-4fda-8748-329789ecfc5c",
"assignerShortName": "blackberry",
"cveId": "CVE-2021-22156",
"datePublished": "2021-08-17T18:35:38",
"dateReserved": "2021-01-04T00:00:00",
"dateUpdated": "2025-08-22T15:20:31.911Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2021-22156\",\"sourceIdentifier\":\"secure@blackberry.com\",\"published\":\"2021-08-17T19:15:08.057\",\"lastModified\":\"2025-08-22T16:15:33.777\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An integer overflow vulnerability in the calloc() function of the C runtime library of affected versions of BlackBerry\u00ae QNX Software Development Platform (SDP) version(s) 6.5.0SP1 and earlier, QNX OS for Medical 1.1 and earlier, and QNX OS for Safety 1.0.1 and earlier that could allow an attacker to potentially perform a denial of service or execute arbitrary code.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de desbordamiento de enteros en la funci\u00f3n calloc() de la biblioteca de tiempo de ejecuci\u00f3n C de las versiones afectadas de BlackBerry\u00ae QNX Software Development Platform (SDP) versi\u00f3n(es) 6.5.0SP1 y anteriores, QNX OS for Medical versiones 1.1 y anteriores, y QNX OS for Safety versiones 1.0.1 y anteriores, que podr\u00eda permitir a un atacante llevar a cabo potencialmente una denegaci\u00f3n de servicio o ejecutar c\u00f3digo arbitrario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@blackberry.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":9.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secure@blackberry.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blackberry:qnx_software_development_platform:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.5.0\",\"matchCriteriaId\":\"F6FCB90F-1888-4350-A16E-5F4951F903B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blackberry:qnx_software_development_platform:6.5.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"B18FCC7D-290C-4FC7-80B7-C678515E403C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:blackberry:qnx_software_development_platform:6.5.0:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"11F2C680-2F44-4CBC-BC7E-B608726302D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:blackberry:qnx_os_for_medical:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.1.1\",\"matchCriteriaId\":\"75A18CC9-673C-4FA8-875E-08925D2A97AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:blackberry:qnx_os_for_safety:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.2\",\"matchCriteriaId\":\"4C6CE0A1-8E88-405B-BD6D-48FCD084CB07\"}]}]}],\"references\":[{\"url\":\"https://support.blackberry.com/kb/articleDetail?articleNumber=000082334\",\"source\":\"secure@blackberry.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL\",\"source\":\"secure@blackberry.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.blackberry.com/kb/articleDetail?articleNumber=000082334\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
CERTFR-2021-AVI-639
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les systèmes d'exploitation temps réel (RTOS, Real Time OS). Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un déni de service à distance.
Cette famille de vulnérabilités dans les RTOS a été découverte, décrite puis nommée « BadAlloc » par Microsoft, appellation donnée en raison de l’absence de vérification des entrées dans l’allocateur mémoire de tas. Ces vulnérabilités d'exécution de code à distance (RCE) sont référencées par 26 CVEs et affectent potentiellement un large éventail de domaines, de l'IoT grand public et médical à l'IoT industriel, aux technologies opérationnelles (OT) et aux systèmes de contrôle industriel. Une dizaine d’éditeurs sont concernés.
Solution
- Les intégrateurs de ces RTOS sont invités à prendre contact rapidement avec l’éditeur du produit affecté afin de corriger leurs propres solutions et diffuser le correctif ;
- Les utilisateurs d’équipements basés sur ces RTOS sont invités à prendre contact avec le fournisseur afin de mettre à jour les équipements affectés ;
- Il convient en outre d’appliquer les bonnes pratiques référencées
dans le guide ANSSI [1] et notamment celles ci-après.
- S’assurer que les appareils concernés ne sont pas accessibles depuis Internet.
- S’assurer que les systèmes ne se connectent qu'à des réseaux ou sous-réseaux isolés de confiance. Adopter une démarche de défense en profondeur permet de se protéger contre des menaces qui ne sont pas encore connues, de diminuer le périmètre sur lequel une menace est exercée ou d’en atténuer l’impact. Le simple cloisonnement des réseaux par des pare-feux ne suffit pas. D’autres mécanismes doivent l’accompagner et à différents niveaux (contrôle d’accès physique, durcissement des configurations, protection antivirale...).
- Inclure des mécanismes de détection et de surveillance des installations. Surveiller de façon permanente les appareils à la recherche de comportements anormaux ou non autorisés tels que la communication avec des hôtes locaux ou distants inconnus. Enfin la collecte des informations au travers des journaux d’alarmes et d’événements est indispensable aux analyses ultérieures. Ces journaux pourront dans certains cas apporter des éléments utiles et des preuves dans le cadre d’une enquête judiciaire.
- Réduire la surface d'attaque en éliminant les services sans utilité fonctionnelle ou non sécurisés.
[1] Guide de l'ANSSI sur la sécurité industrielle : https://www.ssi.gouv.fr/uploads/IMG/pdf/Guide_securite_industrielle_Version_finale.pdf
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | RIOT OS version 2020.01.1 | ||
| N/A | N/A | Texas Instruments SimpleLink-CC32XX versions antérieures à 4.10.03 | ||
| N/A | N/A | Media Tek LinkIt SDK versions antérieures à 4.6.1 | ||
| N/A | N/A | NXP MCUXpresso SDK versions antérieures à 2.8.2 | ||
| N/A | N/A | Texas Instruments SimpleLink MSP432E4XX | ||
| N/A | N/A | Windriver VxWorks versions antérieures à 7.0 | ||
| N/A | N/A | Micrium OS, versions antérieures à 5.10.1 | ||
| N/A | N/A | Texas Instruments SimpleLink-CC13XX versions antérieures à 4.40.00 | ||
| N/A | N/A | ARM CMSIS-RTOS2 versions antérieures à 2.1.3 | ||
| N/A | N/A | Micrium uC/OS: uC/LIB versions antérieures à 1.39.00 | ||
| N/A | N/A | Texas Instruments SimpleLink-CC26XX versions antérieures à 4.40.00 | ||
| N/A | N/A | NXP MQX versions antérieures à 5.1 | ||
| N/A | N/A | ARM Mbed OS version 6.3.0 | ||
| N/A | N/A | TencentOS-tiny, version 3.1.0 | ||
| N/A | N/A | Texas Instruments CC32XX versions antérieures à 4.40.00.07 | ||
| N/A | N/A | Redhat newlib versions antérieures à 4.0.0 | ||
| N/A | N/A | BlackBerry QNX SDP versions antérieures à 6.5.0SP1 sans le dernier correctif | ||
| N/A | N/A | BlackBerry QNX OS for Safety versions antérieures à 1.0.2 | ||
| N/A | N/A | ARM mbed-ualloc version 1.3.0 | ||
| Apache | N/A | Apache Nuttx OS version 9.1.0 | ||
| N/A | N/A | Uclibc-NG versions antérieures à 1.0.36 | ||
| Apache | N/A | Amazon FreeRTOS version 10.4.1 | ||
| N/A | N/A | BlackBerry QNX OS for Medical versions antérieures à 1.1.1 | ||
| Apache | N/A | Linux Zephyr RTOS versions antérieures à 2.5.0 | ||
| N/A | N/A | Zephyr Project RTOS versions antérieures à 2.5 | ||
| N/A | N/A | eCosCentric eCosPro RTOS versions 2.0.1 à 4.5.3 | ||
| N/A | N/A | Samsung Tizen RT RTOS versions antérieures à 3.0.GBB | ||
| N/A | N/A | Cesanta Software Mongoose OS version 2.17.0 | ||
| N/A | Google Cloud IoT Device SDK version 1.0.2 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "RIOT OS version 2020.01.1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Texas Instruments SimpleLink-CC32XX versions ant\u00e9rieures \u00e0 4.10.03",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Media Tek LinkIt SDK versions ant\u00e9rieures \u00e0 4.6.1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "NXP MCUXpresso SDK versions ant\u00e9rieures \u00e0 2.8.2",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Texas Instruments SimpleLink MSP432E4XX",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Windriver VxWorks versions ant\u00e9rieures \u00e0 7.0",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Micrium OS, versions ant\u00e9rieures \u00e0 5.10.1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Texas Instruments SimpleLink-CC13XX versions ant\u00e9rieures \u00e0 4.40.00",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "ARM CMSIS-RTOS2 versions ant\u00e9rieures \u00e0 2.1.3",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Micrium uC/OS: uC/LIB versions ant\u00e9rieures \u00e0 1.39.00",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Texas Instruments SimpleLink-CC26XX versions ant\u00e9rieures \u00e0 4.40.00",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "NXP MQX versions ant\u00e9rieures \u00e0 5.1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "ARM Mbed OS version 6.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "TencentOS-tiny, version 3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Texas Instruments CC32XX versions ant\u00e9rieures \u00e0 4.40.00.07",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Redhat newlib versions ant\u00e9rieures \u00e0 4.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "BlackBerry QNX SDP versions ant\u00e9rieures \u00e0 6.5.0SP1 sans le dernier correctif",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "BlackBerry QNX OS for Safety versions ant\u00e9rieures \u00e0 1.0.2",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "ARM mbed-ualloc version 1.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Apache Nuttx OS version 9.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Apache",
"scada": false
}
}
},
{
"description": "Uclibc-NG versions ant\u00e9rieures \u00e0 1.0.36",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Amazon FreeRTOS version 10.4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apache",
"scada": false
}
}
},
{
"description": "BlackBerry QNX OS for Medical versions ant\u00e9rieures \u00e0 1.1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Linux Zephyr RTOS versions ant\u00e9rieures \u00e0 2.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Apache",
"scada": false
}
}
},
{
"description": "Zephyr Project RTOS versions ant\u00e9rieures \u00e0 2.5",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "eCosCentric eCosPro RTOS versions 2.0.1 \u00e0 4.5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Samsung Tizen RT RTOS versions ant\u00e9rieures \u00e0 3.0.GBB",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Cesanta Software Mongoose OS version 2.17.0",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Google Cloud IoT Device SDK version 1.0.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\n- Les int\u00e9grateurs de ces RTOS sont invit\u00e9s \u00e0 prendre contact\n rapidement avec l\u2019\u00e9diteur du produit affect\u00e9 afin de corriger leurs\n propres solutions et diffuser le correctif\u00a0;\n- Les utilisateurs d\u2019\u00e9quipements bas\u00e9s sur ces RTOS sont invit\u00e9s \u00e0\n prendre contact avec le fournisseur afin de mettre \u00e0 jour les\n \u00e9quipements affect\u00e9s\u00a0;\n- Il convient en outre d\u2019appliquer les bonnes pratiques r\u00e9f\u00e9renc\u00e9es\n dans le guide ANSSI \\[1\\] et notamment celles ci-apr\u00e8s.\n - S\u2019assurer que les appareils concern\u00e9s ne sont pas accessibles\n depuis Internet.\n - S\u2019assurer que les syst\u00e8mes ne se connectent qu\u0027\u00e0 des r\u00e9seaux ou\n sous-r\u00e9seaux isol\u00e9s de confiance. Adopter une d\u00e9marche de\n d\u00e9fense en profondeur permet de se prot\u00e9ger contre des menaces\n qui ne sont pas encore connues, de diminuer le p\u00e9rim\u00e8tre sur\n lequel une menace est exerc\u00e9e ou d\u2019en att\u00e9nuer l\u2019impact. Le\n simple cloisonnement des r\u00e9seaux par des pare-feux ne suffit\n pas. D\u2019autres m\u00e9canismes doivent l\u2019accompagner et \u00e0 diff\u00e9rents\n niveaux (contr\u00f4le d\u2019acc\u00e8s physique, durcissement des\n configurations, protection antivirale...).\n - Inclure des m\u00e9canismes de d\u00e9tection et de surveillance des\n installations. Surveiller de fa\u00e7on permanente les appareils \u00e0 la\n recherche de comportements anormaux ou non autoris\u00e9s tels que la\n communication avec des h\u00f4tes locaux ou distants inconnus. Enfin\n la collecte des informations au travers des journaux d\u2019alarmes\n et d\u2019\u00e9v\u00e9nements est indispensable aux analyses ult\u00e9rieures. Ces\n journaux pourront dans certains cas apporter des \u00e9l\u00e9ments utiles\n et des preuves dans le cadre d\u2019une enqu\u00eate judiciaire.\n - R\u00e9duire la surface d\u0027attaque en \u00e9liminant les services sans\n utilit\u00e9 fonctionnelle ou non s\u00e9curis\u00e9s.\n\n\\[1\\] Guide de l\u0027ANSSI sur la s\u00e9curit\u00e9 industrielle :\n\u003chttps://www.ssi.gouv.fr/uploads/IMG/pdf/Guide_securite_industrielle_Version_finale.pdf\u003e\n",
"cves": [
{
"name": "CVE-2021-27502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27502"
},
{
"name": "CVE-2021-27504",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27504"
},
{
"name": "CVE-2020-35198",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35198"
},
{
"name": "CVE-2021-31572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31572"
},
{
"name": "CVE-2021-22684",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22684"
},
{
"name": "CVE-2021-22680",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22680"
},
{
"name": "CVE-2021-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26461"
},
{
"name": "CVE-2021-27431",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27431"
},
{
"name": "CVE-2021-31571",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31571"
},
{
"name": "CVE-2021-22156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22156"
},
{
"name": "CVE-2021-26706",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26706"
},
{
"name": "CVE-2021-27419",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27419"
},
{
"name": "CVE-2021-22636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22636"
},
{
"name": "CVE-2021-27429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27429"
},
{
"name": "CVE-2021-27433",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27433"
},
{
"name": "CVE-2021-27421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27421"
},
{
"name": "CVE-2021-27425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27425"
},
{
"name": "CVE-2021-27417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27417"
},
{
"name": "CVE-2021-3420",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3420"
},
{
"name": "CVE-2020-28895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28895"
},
{
"name": "CVE-2021-27427",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27427"
},
{
"name": "CVE-2021-27439",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27439"
},
{
"name": "CVE-2020-13603",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13603"
},
{
"name": "CVE-2021-30636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30636"
},
{
"name": "CVE-2021-27435",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27435"
},
{
"name": "CVE-2021-27411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27411"
}
],
"initial_release_date": "2021-08-18T00:00:00",
"last_revision_date": "2021-08-18T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 BadAlloc icsa-21-119-04 du 20 mai 2021, mis \u00e0 jour le 17 ao\u00fbt 2021",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-119-04"
}
],
"reference": "CERTFR-2021-AVI-639",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les syst\u00e8mes\nd\u0027exploitation temps r\u00e9el (*RTOS, Real Time OS*). Elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et un\nd\u00e9ni de service \u00e0 distance.\n\nCette famille de vuln\u00e9rabilit\u00e9s dans les *RTOS* a \u00e9t\u00e9 d\u00e9couverte,\nd\u00e9crite puis nomm\u00e9e \u00ab\u00a0BadAlloc\u00a0\u00bb par Microsoft, appellation donn\u00e9e en\nraison de l\u2019absence de v\u00e9rification des entr\u00e9es dans l\u2019allocateur\nm\u00e9moire de tas. Ces vuln\u00e9rabilit\u00e9s d\u0027ex\u00e9cution de code \u00e0 distance (RCE)\nsont r\u00e9f\u00e9renc\u00e9es par 26 CVEs et affectent potentiellement un large\n\u00e9ventail de domaines, de l\u0027IoT grand public et m\u00e9dical \u00e0 l\u0027IoT\nindustriel, aux technologies op\u00e9rationnelles (OT) et aux syst\u00e8mes de\ncontr\u00f4le industriel. Une dizaine d\u2019\u00e9diteurs sont concern\u00e9s.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans des syst\u00e8mes d\u0027exploitation temps r\u00e9el",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat newlib du 17 novembre 2020",
"url": "https://sourceware.org/git/?p=newlib-cygwin.git;a=commit;h=aa106b29a6a8a1b0df9e334704292cbc32f2d44e"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 ARM CMSIS RTOS2 du 24 juin 2021",
"url": "https://www.keil.com/pack/doc/CMSIS/RTOS2/html/rtos_revisionHistory.html"
},
{
"published_at": null,
"title": "\ufeffBulletin de s\u00e9curit\u00e9 BadAlloc icsa-21-119-04 du 20 mai 2021",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 ARM mbed du 22 mars 2021",
"url": "https://github.com/ARMmbed/mbed-os/pull/14408"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Zephyr Project RTOS du 23 mars 2021",
"url": "https://github.com/zephyrproject-rtos/zephyr/pull/31796"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wind River VxWorks 20210319 du 19 mars 2021",
"url": "https://support2.windriver.com/index.php?page=security-notices\u0026on=view\u0026id=7048"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wind River VxWorks 20210203 du 03 f\u00e9vrier 2021",
"url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=CVE-2020-28895"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 eCosCentric eCosPro RTOS 1002437 du 16 ao\u00fbt 2021",
"url": "https://bugzilla.ecoscentric.com/show_bug.cgi?id=1002437"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 FreeRTOS du 07 d\u00e9cembre 2020",
"url": "https://github.com/FreeRTOS/FreeRTOS-Kernel/pull/224"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 BlackBerry du 17 ao\u00fbt 2021",
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334\u0026language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apache Nuttx OS du 21 juin 2021",
"url": "https://lists.apache.org/thread.html/r806fccf8b003ae812d807c6c7d97950d44ed29b2713418cbe3f2bddd%40%3Cdev.nuttx.apache.org%3E"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Texas Instruments TI-PSIRT-2020-100074 du 29 avril 2021",
"url": "https://www.ti.com/lit/an/swra709/swra709.pdf?ts=1629129702198"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google Cloud IoT Device du 12 avril 2021",
"url": "https://github.com/GoogleCloudPlatform/iot-device-sdk-embedded-c/pull/119/files"
}
]
}
CERTFR-2021-AVI-953
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Schneider. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | SCD6000 Industrial RTU version SCD6000 SY11012 11_M et antérieures | ||
| N/A | N/A | Modicon BMENOC 0311 | ||
| N/A | N/A | EVlink City (EVC1S22P4 / EVC1S7P4), EVlink Parking (EVW2 / EVF2 / EVP2PE), EVlink Smart Wallbox EVB1A toutes versions antérieures à R8 V3.4.0.2 | ||
| N/A | N/A | Modicon BMENOC 0321 | ||
| N/A | N/A | Modicon M580 | ||
| N/A | N/A | EcoStruxure™ Power Monitoring Expert versions V9.0 et antérieures | ||
| N/A | N/A | IGSS Data Collector (dc.exe) version 15.0.0.21320 et antérieures | ||
| N/A | N/A | APDU9xxx with NMC3 version V1.0.0.28 et antérieures | ||
| N/A | N/A | AP7xxxx and AP8xxx with NMC2 version V6.9.6 et antérieures | ||
| N/A | N/A | AP7xxx and AP8xxx with NMC3 version V1.1.0.3 et antérieures |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SCD6000 Industrial RTU version SCD6000 SY11012 11_M et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Modicon BMENOC 0311",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "EVlink City (EVC1S22P4 / EVC1S7P4), EVlink Parking (EVW2 / EVF2 / EVP2PE), EVlink Smart Wallbox EVB1A toutes versions ant\u00e9rieures \u00e0 R8 V3.4.0.2",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Modicon BMENOC 0321",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Modicon M580",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "EcoStruxure\u2122 Power Monitoring Expert versions V9.0 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "IGSS Data Collector (dc.exe) version 15.0.0.21320 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "APDU9xxx with NMC3 version V1.0.0.28 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "AP7xxxx and AP8xxx with NMC2 version V6.9.6 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "AP7xxx and AP8xxx with NMC3 version V1.1.0.3 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-35198",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35198"
},
{
"name": "CVE-2021-22725",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22725"
},
{
"name": "CVE-2019-6848",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6848"
},
{
"name": "CVE-2021-22156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22156"
},
{
"name": "CVE-2021-22823",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22823"
},
{
"name": "CVE-2021-22818",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22818"
},
{
"name": "CVE-2021-22820",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22820"
},
{
"name": "CVE-2021-22821",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22821"
},
{
"name": "CVE-2021-22824",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22824"
},
{
"name": "CVE-2021-22822",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22822"
},
{
"name": "CVE-2019-6849",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6849"
},
{
"name": "CVE-2021-22825",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22825"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2021-22724",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22724"
},
{
"name": "CVE-2020-28895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28895"
},
{
"name": "CVE-2021-22826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22826"
},
{
"name": "CVE-2019-6850",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6850"
},
{
"name": "CVE-2021-22827",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22827"
},
{
"name": "CVE-2021-22819",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22819"
}
],
"initial_release_date": "2021-12-15T00:00:00",
"last_revision_date": "2021-12-15T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-953",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSchneider. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Schneider",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-348-02 du 14 d\u00e9cembre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-348-02"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-348-01 du 14 d\u00e9cembre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-348-01"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SSEVD-2021-348-03 du 14 d\u00e9cembre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-348-03"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2019-281-04 du 14 d\u00e9cembre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2019-281-04"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-348-04 du 14 d\u00e9cembre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-348-04"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-313-05 du 14 d\u00e9cembre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-313-05"
}
]
}
CERTFR-2022-AVI-328
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Schneider. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Schneider Electric | N/A | Modicon M262 Logic Controllers versions antérieures à V5.1.6.1 | ||
| Schneider Electric | N/A | MiCOM C264 versions antérieures à B5.118, D1.92, D4.38, D5.25I et D6.18 | ||
| Schneider Electric | N/A | PowerLogic ION7400 versions antérieures à 3.1.0 | ||
| Schneider Electric | N/A | EPC2000 toutes versions | ||
| Schneider Electric | N/A | EPack toutes versions | ||
| N/A | N/A | Easy Harmony GXU (gamme HMIGXU) Vijeo Designer Basic versions antérieures à 1.2.1 | ||
| Schneider Electric | N/A | nanodac versions antérieures à 10.02 | ||
| N/A | N/A | Versadac toutes versions | ||
| Schneider Electric | N/A | BMXNOR0200H RTU toutes versions | ||
| Schneider Electric | N/A | EPC3000 versions antérieures à V5.20 | ||
| Schneider Electric | N/A | Modicon M241/M251 Logic Controllers versions antérieures à V5.1.9.34 | ||
| Schneider Electric | N/A | SAGE RTU CPU C3414 version antérieures à C3414-500-S02K5_P5 de SAGE RTU CPU3414 | ||
| Schneider Electric | N/A | BMXNOE0100 (H) toutes versions | ||
| N/A | N/A | JACE-8000 versions antérieures à Niagara 4.10u1 | ||
| Schneider Electric | N/A | BMENOC0321, BMENOC0301, BMENOC0311, BMENOS0300 toutes versions | ||
| Schneider Electric | N/A | 6100A, 6180A, 6100XIO, 6180XIO, AeroDAQ toutes versions | ||
| Schneider Electric | N/A | Eurotherm E+PLC100 toutes versions | ||
| N/A | N/A | SCD6000 Industrial RTU versions antérieures à SY-1101207, et N de SCD6000 | ||
| Schneider Electric | N/A | Pro-face SP-5B00, SP-5B10, SP-5B90, gamme ST6000 (modèle GP-ProEX), gamme ET6000 versions antérieures à V4.09.350 | ||
| Schneider Electric | N/A | Momentum MDI (171CBU*), MC80 (BMKC8*), HART (BMEAH*),V1.50 toutes versions | ||
| N/A | N/A | BMECRA31210, BMXCRA31200, BMXCRA31210, 140CRA31200, 140CRA31908 toutes versions | ||
| Schneider Electric | N/A | BMXNOE0100, BMXNOE0110, BMXNGD0100, BMXNOC0401 toutes versions | ||
| Schneider Electric | N/A | Easergy MiCOM P40 toutes versions | ||
| N/A | N/A | Modicon M258/LMC058 Logic Controllers versions antérieures à 5.0.4.18 | ||
| Schneider Electric | N/A | Modicon Quantum CPU et Communication Modules toutes versions | ||
| N/A | N/A | Modicon Premium CPU et Communication Modules toutes versions | ||
| N/A | N/A | Easergy MiCOM P30 versions 660 à 674 | ||
| Schneider Electric | N/A | PowerLogic ION9000 versions antérieures à 3.1.0 | ||
| Schneider Electric | N/A | Easergy C5x (C52/C53) versions antérieures à 1.0.5 | ||
| Schneider Electric | N/A | gammes HMISTO et HMISTU/S5T toutes versions | ||
| Schneider Electric | N/A | PacDrive Eco/Pro/Pro2 Logic Controllers versions antérieures à V1.66.5.1 | ||
| Schneider Electric | N/A | Easergy P5 versions antérieures à 01.401.101 | ||
| Schneider Electric | N/A | CPU Modicon M580 (BMEP* et BMEH*), BMXNOM0200 toutes versions | ||
| N/A | N/A | BMXNOE0110 (H) toutes versions | ||
| Schneider Electric | N/A | Gammes Pro-face GP4000, LT4000M et GP4000H toutes versions | ||
| Schneider Electric | N/A | TCSEGPA23F14F, BMECXM0100 toutes versions | ||
| N/A | N/A | HMISCU Vijeo Designer versions V6.2SP11 et antérieures | ||
| N/A | N/A | PowerLogic PM8000 versions antérieures à 3.1.0 | ||
| N/A | N/A | PacDrive M toutes versions | ||
| N/A | N/A | Easy Harmony ET6 (gamme HMIET) Vijeo Designer Basic versions antérieures à 1.2.1 | ||
| N/A | N/A | Momentum ENT (170ENT11*) toutes versions | ||
| N/A | N/A | Gammes Pro-face GP4100, GP4000E et GP4000M toutes versions | ||
| Schneider Electric | N/A | BMXNOM0200 toutes versions | ||
| N/A | N/A | IGSS Data Server versions antérieures à 15.0.0.22074 | ||
| N/A | N/A | BMENOP0300, BMXNOR0200 toutes versions | ||
| Schneider Electric | N/A | Modicon LMC078 toutes versions | ||
| Schneider Electric | N/A | Harmony/ Magelis, gammes HMIGTU, HMIGTUX et HMIGK versions antérieures à 6.2 SP11 Multi HotFix 4 | ||
| Schneider Electric | Modicon M340 | Modicon M340 versions antérieures à 3.50 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Modicon M262 Logic Controllers versions ant\u00e9rieures \u00e0 V5.1.6.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "MiCOM C264 versions ant\u00e9rieures \u00e0 B5.118, D1.92, D4.38, D5.25I et D6.18",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "PowerLogic ION7400 versions ant\u00e9rieures \u00e0 3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "EPC2000 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "EPack toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Easy Harmony GXU (gamme HMIGXU) Vijeo Designer Basic versions ant\u00e9rieures \u00e0 1.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "nanodac versions ant\u00e9rieures \u00e0 10.02",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Versadac toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "BMXNOR0200H RTU toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "EPC3000 versions ant\u00e9rieures \u00e0 V5.20",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Modicon M241/M251 Logic Controllers versions ant\u00e9rieures \u00e0 V5.1.9.34",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "SAGE RTU CPU C3414 version ant\u00e9rieures \u00e0 C3414-500-S02K5_P5 de SAGE RTU CPU3414",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "BMXNOE0100 (H) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "JACE-8000 versions ant\u00e9rieures \u00e0 Niagara 4.10u1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "BMENOC0321, BMENOC0301, BMENOC0311, BMENOS0300 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "6100A, 6180A, 6100XIO, 6180XIO, AeroDAQ toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Eurotherm E+PLC100 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "SCD6000 Industrial RTU versions ant\u00e9rieures \u00e0 SY-1101207, et N de SCD6000",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Pro-face SP-5B00, SP-5B10, SP-5B90, gamme ST6000 (mod\u00e8le GP-ProEX), gamme ET6000 versions ant\u00e9rieures \u00e0 V4.09.350",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Momentum MDI (171CBU*), MC80 (BMKC8*), HART (BMEAH*),V1.50 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "BMECRA31210, BMXCRA31200, BMXCRA31210, 140CRA31200, 140CRA31908 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "BMXNOE0100, BMXNOE0110, BMXNGD0100, BMXNOC0401 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Easergy MiCOM P40 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Modicon M258/LMC058 Logic Controllers versions ant\u00e9rieures \u00e0 5.0.4.18",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Modicon Quantum CPU et Communication Modules toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Modicon Premium CPU et Communication Modules toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Easergy MiCOM P30 versions 660 \u00e0 674",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "PowerLogic ION9000 versions ant\u00e9rieures \u00e0 3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Easergy C5x (C52/C53) versions ant\u00e9rieures \u00e0 1.0.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "gammes HMISTO et HMISTU/S5T toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "PacDrive Eco/Pro/Pro2 Logic Controllers versions ant\u00e9rieures \u00e0 V1.66.5.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Easergy P5 versions ant\u00e9rieures \u00e0 01.401.101",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "CPU Modicon M580 (BMEP* et BMEH*), BMXNOM0200 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "BMXNOE0110 (H) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Gammes Pro-face GP4000, LT4000M et GP4000H toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "TCSEGPA23F14F, BMECXM0100 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "HMISCU Vijeo Designer versions V6.2SP11 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "PowerLogic PM8000 versions ant\u00e9rieures \u00e0 3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "PacDrive M toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Easy Harmony ET6 (gamme HMIET) Vijeo Designer Basic versions ant\u00e9rieures \u00e0 1.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Momentum ENT (170ENT11*) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Gammes Pro-face GP4100, GP4000E et GP4000M toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "BMXNOM0200 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "IGSS Data Server versions ant\u00e9rieures \u00e0 15.0.0.22074",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "BMENOP0300, BMXNOR0200 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Modicon LMC078 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Harmony/ Magelis, gammes HMIGTU, HMIGTUX et HMIGK versions ant\u00e9rieures \u00e0 6.2 SP11 Multi HotFix 4",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Modicon M340 versions ant\u00e9rieures \u00e0 3.50",
"product": {
"name": "Modicon M340",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-35198",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35198"
},
{
"name": "CVE-2021-22156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22156"
},
{
"name": "CVE-2022-0222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0222"
},
{
"name": "CVE-2020-28895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28895"
},
{
"name": "CVE-2022-24324",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24324"
}
],
"initial_release_date": "2022-04-12T00:00:00",
"last_revision_date": "2022-04-12T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-328",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-04-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSchneider. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Schneider",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2022-102-02 du 12 avril 2022",
"url": "https://download.schneider-electric.com/files?p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2022-102-02_Modicon_M340_Controller_and_Communication_Modules_Security_Notification.pdf\u0026p_Doc_Ref=SEVD-2022-102-02"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2022-102-01 du 12 avril 2022",
"url": "https://download.schneider-electric.com/files?p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2022-102-01_IGSS_Security_Notification.pdf\u0026p_Doc_Ref=SEVD-2022-102-01"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-313-05 du 09 novembre 2021 mis \u00e0 jour le 12 avril 2022",
"url": "https://download.schneider-electric.com/files?p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2021-313-05_Badalloc_Vulnerabilities_Security_Notification_V6.0.pdf\u0026p_Doc_Ref=SEVD-2021-313-05"
}
]
}
gsd-2021-22156
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2021-22156",
"description": "An integer overflow vulnerability in the calloc() function of the C runtime library of affected versions of BlackBerry\u00ae QNX Software Development Platform (SDP) version(s) 6.5.0SP1 and earlier, QNX OS for Medical 1.1 and earlier, and QNX OS for Safety 1.0.1 and earlier that could allow an attacker to potentially perform a denial of service or execute arbitrary code.",
"id": "GSD-2021-22156"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-22156"
],
"details": "An integer overflow vulnerability in the calloc() function of the C runtime library of affected versions of BlackBerry\u00ae QNX Software Development Platform (SDP) version(s) 6.5.0SP1 and earlier, QNX OS for Medical 1.1 and earlier, and QNX OS for Safety 1.0.1 and earlier that could allow an attacker to potentially perform a denial of service or execute arbitrary code.",
"id": "GSD-2021-22156",
"modified": "2023-12-13T01:23:24.842054Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@blackberry.com",
"ID": "CVE-2021-22156",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "BlackBerry QNX Software Development Platform (SDP), QNX OS for Medical and QNX OS for Safety",
"version": {
"version_data": [
{
"version_value": "QNX SDP 6.5.0 SP1 and earlier"
},
{
"version_value": "QNX OS for Medical 1.1 and earlier"
},
{
"version_value": "QNX OS for Safety 1.0.1 and earlier"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An integer overflow vulnerability in the calloc() function of the C runtime library of affected versions of BlackBerry\u00ae QNX Software Development Platform (SDP) version(s) 6.5.0SP1 and earlier, QNX OS for Medical 1.1 and earlier, and QNX OS for Safety 1.0.1 and earlier that could allow an attacker to potentially perform a denial of service or execute arbitrary code."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of service or arbitrary code execution"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334",
"refsource": "MISC",
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334"
},
{
"name": "20210818 BlackBerry QNX-2021-001 Vulnerability Affecting Cisco Products: August 2021",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:blackberry:qnx_software_development_platform:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "6.5.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:blackberry:qnx_software_development_platform:6.5.0:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:blackberry:qnx_software_development_platform:6.5.0:sp1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:blackberry:qnx_os_for_medical:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.1.1",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:blackberry:qnx_os_for_safety:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.0.2",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secure@blackberry.com",
"ID": "CVE-2021-22156"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "An integer overflow vulnerability in the calloc() function of the C runtime library of affected versions of BlackBerry\u00ae QNX Software Development Platform (SDP) version(s) 6.5.0SP1 and earlier, QNX OS for Medical 1.1 and earlier, and QNX OS for Safety 1.0.1 and earlier that could allow an attacker to potentially perform a denial of service or execute arbitrary code."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334",
"refsource": "MISC",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334"
},
{
"name": "20210818 BlackBerry QNX-2021-001 Vulnerability Affecting Cisco Products: August 2021",
"refsource": "CISCO",
"tags": [
"Third Party Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
},
"lastModifiedDate": "2021-08-30T11:26Z",
"publishedDate": "2021-08-17T19:15Z"
}
}
}
ghsa-x456-hhph-f575
Vulnerability from github
An integer overflow vulnerability in the calloc() function of the C runtime library of affected versions of BlackBerry® QNX Software Development Platform (SDP) version(s) 6.5.0SP1 and earlier, QNX OS for Medical 1.1 and earlier, and QNX OS for Safety 1.0.1 and earlier that could allow an attacker to potentially perform a denial of service or execute arbitrary code.
{
"affected": [],
"aliases": [
"CVE-2021-22156"
],
"database_specific": {
"cwe_ids": [
"CWE-190"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-08-17T19:15:00Z",
"severity": "CRITICAL"
},
"details": "An integer overflow vulnerability in the calloc() function of the C runtime library of affected versions of BlackBerry\u00ae QNX Software Development Platform (SDP) version(s) 6.5.0SP1 and earlier, QNX OS for Medical 1.1 and earlier, and QNX OS for Safety 1.0.1 and earlier that could allow an attacker to potentially perform a denial of service or execute arbitrary code.",
"id": "GHSA-x456-hhph-f575",
"modified": "2025-08-22T18:31:10Z",
"published": "2022-05-24T22:33:53Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22156"
},
{
"type": "WEB",
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334"
},
{
"type": "WEB",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
fkie_cve-2021-22156
Vulnerability from fkie_nvd
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| URL | Tags | ||
|---|---|---|---|
| secure@blackberry.com | https://support.blackberry.com/kb/articleDetail?articleNumber=000082334 | Patch, Vendor Advisory | |
| secure@blackberry.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.blackberry.com/kb/articleDetail?articleNumber=000082334 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| blackberry | qnx_software_development_platform | * | |
| blackberry | qnx_software_development_platform | 6.5.0 | |
| blackberry | qnx_software_development_platform | 6.5.0 | |
| blackberry | qnx_os_for_medical | * | |
| blackberry | qnx_os_for_safety | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:blackberry:qnx_software_development_platform:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6FCB90F-1888-4350-A16E-5F4951F903B3",
"versionEndExcluding": "6.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:blackberry:qnx_software_development_platform:6.5.0:-:*:*:*:*:*:*",
"matchCriteriaId": "B18FCC7D-290C-4FC7-80B7-C678515E403C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:blackberry:qnx_software_development_platform:6.5.0:sp1:*:*:*:*:*:*",
"matchCriteriaId": "11F2C680-2F44-4CBC-BC7E-B608726302D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:blackberry:qnx_os_for_medical:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75A18CC9-673C-4FA8-875E-08925D2A97AB",
"versionEndIncluding": "1.1.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:blackberry:qnx_os_for_safety:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4C6CE0A1-8E88-405B-BD6D-48FCD084CB07",
"versionEndIncluding": "1.0.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An integer overflow vulnerability in the calloc() function of the C runtime library of affected versions of BlackBerry\u00ae QNX Software Development Platform (SDP) version(s) 6.5.0SP1 and earlier, QNX OS for Medical 1.1 and earlier, and QNX OS for Safety 1.0.1 and earlier that could allow an attacker to potentially perform a denial of service or execute arbitrary code."
},
{
"lang": "es",
"value": "Una vulnerabilidad de desbordamiento de enteros en la funci\u00f3n calloc() de la biblioteca de tiempo de ejecuci\u00f3n C de las versiones afectadas de BlackBerry\u00ae QNX Software Development Platform (SDP) versi\u00f3n(es) 6.5.0SP1 y anteriores, QNX OS for Medical versiones 1.1 y anteriores, y QNX OS for Safety versiones 1.0.1 y anteriores, que podr\u00eda permitir a un atacante llevar a cabo potencialmente una denegaci\u00f3n de servicio o ejecutar c\u00f3digo arbitrario."
}
],
"id": "CVE-2021-22156",
"lastModified": "2025-08-22T16:15:33.777",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 6.0,
"source": "secure@blackberry.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-08-17T19:15:08.057",
"references": [
{
"source": "secure@blackberry.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334"
},
{
"source": "secure@blackberry.com",
"tags": [
"Third Party Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL"
}
],
"sourceIdentifier": "secure@blackberry.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
],
"source": "secure@blackberry.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
cisco-sa-qnx-toxjvpdl
Vulnerability from csaf_cisco
Notes
{
"document": {
"acknowledgments": [
{
"summary": "This vulnerability was publicly disclosed by BlackBerry on August 17, 2021."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"notes": [
{
"category": "summary",
"text": "On August 17, 2021, BlackBerry released a security advisory, QNX-2021-001 [\"https://support.blackberry.com/kb/articleDetail?articleNumber=000082334\"], that disclosed an integer overflow vulnerability in the following BlackBerry software releases:\r\n\r\nQNX Software Development Platform (SDP) \u2013 6.5.0SP1 and earlier\r\nQNX OS for Medical \u2013 1.1 and earlier\r\nQNX OS for Safety \u2013 1.0.1 and earlier\r\n\r\nA successful exploit could allow an attacker to execute arbitrary code or cause a denial of service (DoS).\r\n\r\nFor a description of this vulnerability, see QNX-2021-001 [\"https://support.blackberry.com/kb/articleDetail?articleNumber=000082334\"].\r\n\r\nThis advisory is available at the following link:\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL\"]",
"title": "Summary"
},
{
"category": "general",
"text": "Cisco has completed its investigation into its product line to determine which products may be affected by this vulnerability. No products are known to be affected. The bugs are accessible through the Cisco Bug Search Tool [\"https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID\"] and contain additional platform-specific information, including workarounds (if available) and fixed software releases.",
"title": "Vulnerable Products"
},
{
"category": "general",
"text": "The following Cisco products leverage the affected QNX software; however, Cisco has confirmed that the vulnerability is not exploitable on these platforms.\r\n\r\nRouting and Switching - Enterprise and Service Provider\r\n\r\nChannelized shared port adapters (SPAs) (CSCvz34866 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz34866\"])\r\nCircuit Emulation over Packet (CEoP) SPAs (CSCvz34865 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz34865\"])\r\nIOS XR 32-bit Software (CSCvz34871 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz34871\"])\r\nNote: IOS XR 64-bit Software does not leverage QNX software.\r\nRF Gateway 10 (CSCvz34869 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz34869\"])\r\n\r\nNo other Cisco products are known to be affected by this vulnerability.",
"title": "Products Confirmed Not Vulnerable"
},
{
"category": "general",
"text": "Any workarounds are documented in the product-specific Cisco bugs, which are identified in the Vulnerable Products [\"#vp\"] section of this advisory.",
"title": "Workarounds"
},
{
"category": "general",
"text": "For information about fixed software releases [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], consult the Cisco bugs identified in the Vulnerable Products [\"#vp\"] section of this advisory.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.",
"title": "Fixed Software"
},
{
"category": "general",
"text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
"title": "Vulnerability Policy"
},
{
"category": "general",
"text": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of this vulnerability against Cisco products or services.",
"title": "Exploitation and Public Announcements"
},
{
"category": "general",
"text": "This vulnerability was publicly disclosed by BlackBerry on August 17, 2021.",
"title": "Source"
},
{
"category": "legal_disclaimer",
"text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
"title": "Legal Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "Emergency Support:\r\n+1 877 228 7302 (toll-free within North America)\r\n+1 408 525 6532 (International direct-dial)\r\nNon-emergency Support:\r\nEmail: psirt@cisco.com\r\nSupport requests that are received via e-mail are typically acknowledged within 48 hours.",
"issuing_authority": "Cisco product security incident response is the responsibility of the Cisco Product Security Incident Response Team (PSIRT). The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability information that is related to Cisco products and networks. The on-call Cisco PSIRT works 24x7 with Cisco customers, independent security researchers, consultants, industry organizations, and other vendors to identify possible security issues with Cisco products and networks.\r\nMore information can be found in Cisco Security Vulnerability Policy available at https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html",
"name": "Cisco",
"namespace": "https://wwww.cisco.com"
},
"references": [
{
"category": "self",
"summary": "BlackBerry QNX-2021-001 Vulnerability Affecting Cisco Products: August 2021",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL"
},
{
"category": "external",
"summary": "Cisco Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
},
{
"category": "external",
"summary": "QNX-2021-001",
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334"
},
{
"category": "external",
"summary": "QNX-2021-001",
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334"
},
{
"category": "external",
"summary": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;Bug Search Tool",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID"
},
{
"category": "external",
"summary": "CSCvz34866",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz34866"
},
{
"category": "external",
"summary": "CSCvz34865",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz34865"
},
{
"category": "external",
"summary": "CSCvz34871",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz34871"
},
{
"category": "external",
"summary": "CSCvz34869",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz34869"
},
{
"category": "external",
"summary": "fixed software releases",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"
},
{
"category": "external",
"summary": "considering software upgrades",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;Security Advisories page",
"url": "https://www.cisco.com/go/psirt"
},
{
"category": "external",
"summary": "Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
}
],
"title": "BlackBerry QNX-2021-001 Vulnerability Affecting Cisco Products: August 2021",
"tracking": {
"current_release_date": "2021-08-25T14:44:04+00:00",
"generator": {
"date": "2022-10-22T03:12:20+00:00",
"engine": {
"name": "TVCE"
}
},
"id": "cisco-sa-qnx-TOxjVPdL",
"initial_release_date": "2021-08-18T16:00:00+00:00",
"revision_history": [
{
"date": "2021-08-18T15:56:21+00:00",
"number": "1.0.0",
"summary": "Initial public release."
},
{
"date": "2021-08-20T13:08:43+00:00",
"number": "1.1.0",
"summary": "Corrected broken link."
},
{
"date": "2021-08-23T16:23:07+00:00",
"number": "1.2.0",
"summary": "Added products under investigation."
},
{
"date": "2021-08-24T15:38:22+00:00",
"number": "1.3.0",
"summary": "Updated products under investigation and products confirmed not vulnerable."
},
{
"date": "2021-08-25T14:44:04+00:00",
"number": "1.4.0",
"summary": "Updated summary and affected products."
}
],
"status": "final",
"version": "1.4.0"
}
},
"vulnerabilities": [
{
"cve": "CVE-2021-22156",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "QNX-2021-001 Vulnerability in the C Runtime Library Impacts BlackBerry QNX Software Development Platform (SDP), QNX OS for Medical, and QNX OS for Safety"
}
]
}
cisco-sa-qnx-TOxjVPdL
Vulnerability from csaf_cisco
Notes
{
"document": {
"acknowledgments": [
{
"summary": "This vulnerability was publicly disclosed by BlackBerry on August 17, 2021."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"notes": [
{
"category": "summary",
"text": "On August 17, 2021, BlackBerry released a security advisory, QNX-2021-001 [\"https://support.blackberry.com/kb/articleDetail?articleNumber=000082334\"], that disclosed an integer overflow vulnerability in the following BlackBerry software releases:\r\n\r\nQNX Software Development Platform (SDP) \u2013 6.5.0SP1 and earlier\r\nQNX OS for Medical \u2013 1.1 and earlier\r\nQNX OS for Safety \u2013 1.0.1 and earlier\r\n\r\nA successful exploit could allow an attacker to execute arbitrary code or cause a denial of service (DoS).\r\n\r\nFor a description of this vulnerability, see QNX-2021-001 [\"https://support.blackberry.com/kb/articleDetail?articleNumber=000082334\"].\r\n\r\nThis advisory is available at the following link:\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL\"]",
"title": "Summary"
},
{
"category": "general",
"text": "Cisco has completed its investigation into its product line to determine which products may be affected by this vulnerability. No products are known to be affected. The bugs are accessible through the Cisco Bug Search Tool [\"https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID\"] and contain additional platform-specific information, including workarounds (if available) and fixed software releases.",
"title": "Vulnerable Products"
},
{
"category": "general",
"text": "The following Cisco products leverage the affected QNX software; however, Cisco has confirmed that the vulnerability is not exploitable on these platforms.\r\n\r\nRouting and Switching - Enterprise and Service Provider\r\n\r\nChannelized shared port adapters (SPAs) (CSCvz34866 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz34866\"])\r\nCircuit Emulation over Packet (CEoP) SPAs (CSCvz34865 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz34865\"])\r\nIOS XR 32-bit Software (CSCvz34871 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz34871\"])\r\nNote: IOS XR 64-bit Software does not leverage QNX software.\r\nRF Gateway 10 (CSCvz34869 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz34869\"])\r\n\r\nNo other Cisco products are known to be affected by this vulnerability.",
"title": "Products Confirmed Not Vulnerable"
},
{
"category": "general",
"text": "Any workarounds are documented in the product-specific Cisco bugs, which are identified in the Vulnerable Products [\"#vp\"] section of this advisory.",
"title": "Workarounds"
},
{
"category": "general",
"text": "For information about fixed software releases [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], consult the Cisco bugs identified in the Vulnerable Products [\"#vp\"] section of this advisory.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.",
"title": "Fixed Software"
},
{
"category": "general",
"text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
"title": "Vulnerability Policy"
},
{
"category": "general",
"text": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of this vulnerability against Cisco products or services.",
"title": "Exploitation and Public Announcements"
},
{
"category": "general",
"text": "This vulnerability was publicly disclosed by BlackBerry on August 17, 2021.",
"title": "Source"
},
{
"category": "legal_disclaimer",
"text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
"title": "Legal Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "Emergency Support:\r\n+1 877 228 7302 (toll-free within North America)\r\n+1 408 525 6532 (International direct-dial)\r\nNon-emergency Support:\r\nEmail: psirt@cisco.com\r\nSupport requests that are received via e-mail are typically acknowledged within 48 hours.",
"issuing_authority": "Cisco product security incident response is the responsibility of the Cisco Product Security Incident Response Team (PSIRT). The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability information that is related to Cisco products and networks. The on-call Cisco PSIRT works 24x7 with Cisco customers, independent security researchers, consultants, industry organizations, and other vendors to identify possible security issues with Cisco products and networks.\r\nMore information can be found in Cisco Security Vulnerability Policy available at https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html",
"name": "Cisco",
"namespace": "https://wwww.cisco.com"
},
"references": [
{
"category": "self",
"summary": "BlackBerry QNX-2021-001 Vulnerability Affecting Cisco Products: August 2021",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL"
},
{
"category": "external",
"summary": "Cisco Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
},
{
"category": "external",
"summary": "QNX-2021-001",
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334"
},
{
"category": "external",
"summary": "QNX-2021-001",
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000082334"
},
{
"category": "external",
"summary": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;Bug Search Tool",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID"
},
{
"category": "external",
"summary": "CSCvz34866",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz34866"
},
{
"category": "external",
"summary": "CSCvz34865",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz34865"
},
{
"category": "external",
"summary": "CSCvz34871",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz34871"
},
{
"category": "external",
"summary": "CSCvz34869",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz34869"
},
{
"category": "external",
"summary": "fixed software releases",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"
},
{
"category": "external",
"summary": "considering software upgrades",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;Security Advisories page",
"url": "https://www.cisco.com/go/psirt"
},
{
"category": "external",
"summary": "Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
}
],
"title": "BlackBerry QNX-2021-001 Vulnerability Affecting Cisco Products: August 2021",
"tracking": {
"current_release_date": "2021-08-25T14:44:04+00:00",
"generator": {
"date": "2022-10-22T03:12:20+00:00",
"engine": {
"name": "TVCE"
}
},
"id": "cisco-sa-qnx-TOxjVPdL",
"initial_release_date": "2021-08-18T16:00:00+00:00",
"revision_history": [
{
"date": "2021-08-18T15:56:21+00:00",
"number": "1.0.0",
"summary": "Initial public release."
},
{
"date": "2021-08-20T13:08:43+00:00",
"number": "1.1.0",
"summary": "Corrected broken link."
},
{
"date": "2021-08-23T16:23:07+00:00",
"number": "1.2.0",
"summary": "Added products under investigation."
},
{
"date": "2021-08-24T15:38:22+00:00",
"number": "1.3.0",
"summary": "Updated products under investigation and products confirmed not vulnerable."
},
{
"date": "2021-08-25T14:44:04+00:00",
"number": "1.4.0",
"summary": "Updated summary and affected products."
}
],
"status": "final",
"version": "1.4.0"
}
},
"vulnerabilities": [
{
"cve": "CVE-2021-22156",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "QNX-2021-001 Vulnerability in the C Runtime Library Impacts BlackBerry QNX Software Development Platform (SDP), QNX OS for Medical, and QNX OS for Safety"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.