Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CERTFR-2021-AVI-854
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
Vendor | Product | Description | ||
---|---|---|---|---|
Siemens | N/A | Capital VSTAR versions incluant les modules DNS | ||
Siemens | N/A | Nucleus Source Code toutes versions | ||
Siemens | N/A | Mendix Applications using Mendix 9 toutes versions antérieures à V9.6.2 | ||
Siemens | N/A | Nucleus NET toutes versions | ||
Siemens | N/A | SIMATIC WinCC V15 toutes versions | ||
Siemens | N/A | SIMATIC WinCC V17 toutes versions | ||
Siemens | N/A | SIMATIC WinCC OA V3.18 toutes versions | ||
Siemens | N/A | NX 1980 Series toutes versions antérieures à V1984 | ||
Siemens | N/A | APOGEE MEC (PPC) (BACnet) toutes versions | ||
Siemens | N/A | APOGEE PXC Compact (P2 Ethernet) toutes versions | ||
Siemens | N/A | SIMATIC WinCC V7.5 toutes versions antérieures à V7.5 SP2 Update 5 | ||
Siemens | N/A | SIMATIC WinCC OA V3.17 toutes versions | ||
Siemens | N/A | Climatix POL909 (AWM module) toutes versions antérieures à V11.34 | ||
Siemens | N/A | SCALANCE W1750D toutes versions antérieures à V8.7.1.3 | ||
Siemens | N/A | SIMATIC PCS 7 V9.0 toutes versions | ||
Siemens | N/A | Siveillance Video DLNA Server 2021 R1 | ||
Siemens | N/A | SIMATIC PCS 7 V9.1 toutes versions | ||
Siemens | N/A | Mendix Applications using Mendix 7 toutes versions antérieures à V7.23.26 | ||
Siemens | N/A | SIMATIC WinCC V7.4 toutes versions | ||
Siemens | N/A | APOGEE PXC Modular (BACnet) toutes versions | ||
Siemens | N/A | Nucleus Source Code versions incluant les modules DNS | ||
Siemens | N/A | SIMATIC WinCC V16 toutes versions | ||
Siemens | N/A | SIMATIC Information Server toutes versions >= V2019 SP1 | ||
Siemens | N/A | SICAM 230 toutes versions | ||
Siemens | N/A | Nucleus ReadyStart V4 toutes versions antérieures à V4.1.1 | ||
Siemens | N/A | Mendix Applications using Mendix 8 toutes versions antérieures à V8.18.13 | ||
Siemens | N/A | APOGEE PXC Modular (P2 Ethernet) toutes versions | ||
Siemens | N/A | Nucleus ReadyStart V3 toutes versions antérieures à V2017.02.4 | ||
Siemens | N/A | SIMATIC RTLS Locating Manager toutes versions antérieures à V2.12 | ||
Siemens | N/A | Siveillance Video DLNA Server 2020 R1, 2020 R2, 2020 R3 | ||
Siemens | N/A | Capital VSTAR toutes versions | ||
Siemens | N/A | Siveillance Video DLNA Server 2019 R1, 2019 R2, 2019 R3 | ||
Siemens | N/A | Nucleus ReadyStart V3 toutes versions antérieures à V2013.08 | ||
Siemens | N/A | APOGEE MEC (PPC) (P2 Ethernet) toutes versions | ||
Siemens | N/A | PSS(R)ODMS V12 toutes versions antérieures à V12.2.6.1 | ||
Siemens | N/A | Nucleus ReadyStart V3 toutes versions antérieures à V2012.12 | ||
Siemens | N/A | SENTRON powermanager V3 toutes versions | ||
Siemens | N/A | APOGEE PXC Compact (BACnet) toutes versions | ||
Siemens | N/A | TALON TC Compact (BACnet) toutes versions | ||
Siemens | N/A | NX 1980 Series toutes versions antérieures à V1988 | ||
Siemens | N/A | PSS(R)E V34 toutes versions antérieures à V34.9.1 | ||
Siemens | N/A | APOGEE MBC (PPC) (P2 Ethernet) toutes versions | ||
Siemens | N/A | NX 1953 Series toutes versions antérieures à V1973.3700 | ||
Siemens | N/A | APOGEE MBC (PPC) (BACnet) toutes versions | ||
Siemens | N/A | PSS(R)E V35 toutes versions antérieures à V35.3.2 | ||
Siemens | N/A | SIMATIC PCS 7 V8.2 toutes versions | ||
Siemens | N/A | TALON TC Modular (BACnet) toutes versions |
References
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Capital VSTAR versions incluant les modules DNS", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Nucleus Source Code toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Mendix Applications using Mendix 9 toutes versions ant\u00e9rieures \u00e0 V9.6.2", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Nucleus NET toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC WinCC V15 toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC WinCC V17 toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC WinCC OA V3.18 toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "NX 1980 Series toutes versions ant\u00e9rieures \u00e0 V1984", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "APOGEE MEC (PPC) (BACnet) toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "APOGEE PXC Compact (P2 Ethernet) toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC WinCC V7.5 toutes versions ant\u00e9rieures \u00e0 V7.5 SP2 Update 5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC WinCC OA V3.17 toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Climatix POL909 (AWM module) toutes versions ant\u00e9rieures \u00e0 V11.34", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SCALANCE W1750D toutes versions ant\u00e9rieures \u00e0 V8.7.1.3", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC PCS 7 V9.0 toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Siveillance Video DLNA Server 2021 R1", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC PCS 7 V9.1 toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Mendix Applications using Mendix 7 toutes versions ant\u00e9rieures \u00e0 V7.23.26", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC WinCC V7.4 toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "APOGEE PXC Modular (BACnet) toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Nucleus Source Code versions incluant les modules DNS", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC WinCC V16 toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC Information Server toutes versions \u003e= V2019 SP1", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SICAM 230 toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Nucleus ReadyStart V4 toutes versions ant\u00e9rieures \u00e0 V4.1.1", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Mendix Applications using Mendix 8 toutes versions ant\u00e9rieures \u00e0 V8.18.13", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "APOGEE PXC Modular (P2 Ethernet) toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Nucleus ReadyStart V3 toutes versions ant\u00e9rieures \u00e0 V2017.02.4", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC RTLS Locating Manager toutes versions ant\u00e9rieures \u00e0 V2.12", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Siveillance Video DLNA Server 2020 R1, 2020 R2, 2020 R3", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Capital VSTAR toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Siveillance Video DLNA Server 2019 R1, 2019 R2, 2019 R3", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Nucleus ReadyStart V3 toutes versions ant\u00e9rieures \u00e0 V2013.08", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "APOGEE MEC (PPC) (P2 Ethernet) toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "PSS(R)ODMS V12 toutes versions ant\u00e9rieures \u00e0 V12.2.6.1", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Nucleus ReadyStart V3 toutes versions ant\u00e9rieures \u00e0 V2012.12", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SENTRON powermanager V3 toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "APOGEE PXC Compact (BACnet) toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "TALON TC Compact (BACnet) toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "NX 1980 Series toutes versions ant\u00e9rieures \u00e0 V1988", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "PSS(R)E V34 toutes versions ant\u00e9rieures \u00e0 V34.9.1", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "APOGEE MBC (PPC) (P2 Ethernet) toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "NX 1953 Series toutes versions ant\u00e9rieures \u00e0 V1973.3700", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "APOGEE MBC (PPC) (BACnet) toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "PSS(R)E V35 toutes versions ant\u00e9rieures \u00e0 V35.3.2", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC PCS 7 V8.2 toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "TALON TC Modular (BACnet) toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2020-27009", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27009" }, { "name": "CVE-2021-31881", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31881" }, { "name": "CVE-2020-28388", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28388" }, { "name": "CVE-2021-42026", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42026" }, { "name": "CVE-2021-37734", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37734" }, { "name": "CVE-2021-42025", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42025" }, { "name": "CVE-2021-37732", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37732" }, { "name": "CVE-2021-31888", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31888" }, { "name": "CVE-2020-27736", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27736" }, { "name": "CVE-2021-31885", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31885" }, { "name": "CVE-2021-31887", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31887" }, { "name": "CVE-2020-10053", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10053" }, { "name": "CVE-2021-37735", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37735" }, { "name": "CVE-2021-41533", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41533" }, { "name": "CVE-2021-25663", "url": "https://www.cve.org/CVERecord?id=CVE-2021-25663" }, { "name": "CVE-2021-31884", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31884" }, { "name": "CVE-2021-42015", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42015" }, { "name": "CVE-2021-40366", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40366" }, { "name": "CVE-2020-15795", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15795" }, { "name": "CVE-2021-31882", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31882" }, { "name": "CVE-2021-25664", "url": "https://www.cve.org/CVERecord?id=CVE-2021-25664" }, { "name": "CVE-2021-41057", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41057" }, { "name": "CVE-2021-37207", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37207" }, { "name": "CVE-2021-40358", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40358" }, { "name": "CVE-2020-10052", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10052" }, { "name": "CVE-2021-37726", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37726" }, { "name": "CVE-2020-10054", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10054" }, { "name": "CVE-2021-41535", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41535" }, { "name": "CVE-2021-37727", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37727" }, { "name": "CVE-2021-27393", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27393" }, { "name": "CVE-2021-31346", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31346" }, { "name": "CVE-2021-40364", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40364" }, { "name": "CVE-2020-27738", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27738" }, { "name": "CVE-2021-31889", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31889" }, { "name": "CVE-2021-42021", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42021" }, { "name": "CVE-2021-31883", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31883" }, { "name": "CVE-2021-41538", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41538" }, { "name": "CVE-2021-40359", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40359" }, { "name": "CVE-2021-31886", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31886" }, { "name": "CVE-2021-41534", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41534" }, { "name": "CVE-2021-31890", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31890" }, { "name": "CVE-2021-37730", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37730" }, { "name": "CVE-2021-31345", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31345" }, { "name": "CVE-2020-27737", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27737" }, { "name": "CVE-2021-31344", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31344" }, { "name": "CVE-2021-25677", "url": "https://www.cve.org/CVERecord?id=CVE-2021-25677" } ], "initial_release_date": "2021-11-09T00:00:00", "last_revision_date": "2021-11-09T00:00:00", "links": [], "reference": "CERTFR-2021-AVI-854", "revisions": [ { "description": "Version initiale", "revision_date": "2021-11-09T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-248289 du 9 novembre 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-248289.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-703715 du 9 novembre 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-703715.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-840188 du 9 novembre 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-840188.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-362164 du 9 novembre 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-362164.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-044112 du 9 novembre 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-328042 du 9 novembre 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-917476 du 9 novembre 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-114589 du 9 novembre 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-201384 du 9 novembre 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-201384.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-537983 du 9 novembre 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-537983.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-779699 du 9 novembre 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-779699.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-580693 du 9 novembre 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-580693.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-185699 du 9 novembre 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-185699.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-740908 du 9 novembre 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-740908.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-145157 du 9 novembre 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-145157.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-338732 du 9 novembre 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-338732.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-755517 du 9 novembre 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-755517.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-705111 du 9 novembre 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-705111.pdf" } ] }
CVE-2021-31882 (GCVE-0-2021-31882)
Vulnerability from cvelistv5
Published
2021-11-09 11:31
Modified
2025-03-11 09:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary
A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303). The DHCP client application does not validate the length of the Domain Name Server IP option(s) (0x06) when processing DHCP ACK packets. This may lead to Denial-of-Service conditions. (FSMD-2021-0011)
References
URL | Tags | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Siemens | Capital Embedded AR Classic 431-422 |
Version: 0 < * |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:10:30.782Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Capital Embedded AR Classic 431-422", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Capital Embedded AR Classic R20-11", "vendor": "Siemens", "versions": [ { "lessThan": "V2303", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions \u003c V2303). The DHCP client application does not validate the length of the Domain Name Server IP option(s) (0x06) when processing DHCP ACK packets. This may lead to Denial-of-Service conditions. (FSMD-2021-0011)" } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-11T09:47:42.320Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-114589.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-044112.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-620288.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-31882", "datePublished": "2021-11-09T11:31:55", "dateReserved": "2021-04-29T00:00:00", "dateUpdated": "2025-03-11T09:47:42.320Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-42025 (GCVE-0-2021-42025)
Vulnerability from cvelistv5
Published
2021-11-09 11:32
Modified
2024-08-04 03:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-863 - Incorrect Authorization
Summary
A vulnerability has been identified in Mendix Applications using Mendix 8 (All versions < V8.18.13), Mendix Applications using Mendix 9 (All versions < V9.6.2). Applications built with affected versions of Mendix Studio Pro do not properly control write access for certain client actions. This could allow authenticated attackers to manipulate the content of System.FileDocument objects in some cases, regardless whether they have write access to it.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Siemens | Mendix Applications using Mendix 8 |
Version: All versions < V8.18.13 |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.924Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-779699.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Mendix Applications using Mendix 8", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V8.18.13" } ] }, { "product": "Mendix Applications using Mendix 9", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V9.6.2" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Mendix Applications using Mendix 8 (All versions \u003c V8.18.13), Mendix Applications using Mendix 9 (All versions \u003c V9.6.2). Applications built with affected versions of Mendix Studio Pro do not properly control write access for certain client actions. This could allow authenticated attackers to manipulate the content of System.FileDocument objects in some cases, regardless whether they have write access to it." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-09T11:32:16", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-779699.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2021-42025", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Mendix Applications using Mendix 8", "version": { "version_data": [ { "version_value": "All versions \u003c V8.18.13" } ] } }, { "product_name": "Mendix Applications using Mendix 9", "version": { "version_data": [ { "version_value": "All versions \u003c V9.6.2" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in Mendix Applications using Mendix 8 (All versions \u003c V8.18.13), Mendix Applications using Mendix 9 (All versions \u003c V9.6.2). Applications built with affected versions of Mendix Studio Pro do not properly control write access for certain client actions. This could allow authenticated attackers to manipulate the content of System.FileDocument objects in some cases, regardless whether they have write access to it." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-863: Incorrect Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-779699.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-779699.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-42025", "datePublished": "2021-11-09T11:32:16", "dateReserved": "2021-10-06T00:00:00", "dateUpdated": "2024-08-04T03:22:25.924Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-27737 (GCVE-0-2020-27737)
Vulnerability from cvelistv5
Published
2021-04-22 20:42
Modified
2024-08-04 16:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (Versions including affected DNS modules), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), TALON TC Compact (BACnet) (All versions < V3.5.5), TALON TC Modular (BACnet) (All versions < V3.5.5). The DNS response parsing functionality does not properly validate various length and counts of the records. The parsing of malformed responses could result in a read past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to cause a denial-of-service condition or leak the memory past the allocated structure.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | APOGEE PXC Compact (BACnet) |
Version: All versions < V3.5.5 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:18:45.586Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-705111.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-669158.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "APOGEE PXC Compact (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] }, { "defaultStatus": "unknown", "product": "APOGEE PXC Compact (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8.20" } ] }, { "defaultStatus": "unknown", "product": "APOGEE PXC Modular (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] }, { "defaultStatus": "unknown", "product": "APOGEE PXC Modular (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8.20" } ] }, { "defaultStatus": "unknown", "product": "Nucleus NET", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "Nucleus ReadyStart V3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2017.02.3" } ] }, { "defaultStatus": "unknown", "product": "Nucleus ReadyStart V4", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.0" } ] }, { "defaultStatus": "unknown", "product": "Nucleus Source Code", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "Versions including affected DNS modules" } ] }, { "defaultStatus": "unknown", "product": "SIMOTICS CONNECT 400", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V0.5.0.0" } ] }, { "defaultStatus": "unknown", "product": "TALON TC Compact (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] }, { "defaultStatus": "unknown", "product": "TALON TC Modular (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions \u003c V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions \u003c V2.8.20), APOGEE PXC Modular (BACnet) (All versions \u003c V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions \u003c V2.8.20), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions \u003c V2017.02.3), Nucleus ReadyStart V4 (All versions \u003c V4.1.0), Nucleus Source Code (Versions including affected DNS modules), SIMOTICS CONNECT 400 (All versions \u003c V0.5.0.0), TALON TC Compact (BACnet) (All versions \u003c V3.5.5), TALON TC Modular (BACnet) (All versions \u003c V3.5.5). The DNS response parsing functionality does not properly validate various length and counts of the records. The parsing of malformed responses could result in a read past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to cause a denial-of-service condition or leak the memory past the allocated structure." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-08T09:20:04.435Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-705111.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-669158.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2020-27737", "datePublished": "2021-04-22T20:42:19", "dateReserved": "2020-10-26T00:00:00", "dateUpdated": "2024-08-04T16:18:45.586Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-41535 (GCVE-0-2021-41535)
Vulnerability from cvelistv5
Published
2021-09-28 11:12
Modified
2024-08-04 03:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
A vulnerability has been identified in NX 1953 Series (All versions < V1973.3700), NX 1980 Series (All versions < V1988), Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13771).
References
URL | Tags | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | NX 1953 Series |
Version: All versions < V1973.3700 |
||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:15:28.435Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1119/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "NX 1953 Series", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V1973.3700" } ] }, { "product": "NX 1980 Series", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V1988" } ] }, { "product": "Solid Edge SE2021", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c SE2021MP8" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in NX 1953 Series (All versions \u003c V1973.3700), NX 1980 Series (All versions \u003c V1988), Solid Edge SE2021 (All versions \u003c SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13771)." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416: Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-09T11:32:11", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1119/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2021-41535", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "NX 1953 Series", "version": { "version_data": [ { "version_value": "All versions \u003c V1973.3700" } ] } }, { "product_name": "NX 1980 Series", "version": { "version_data": [ { "version_value": "All versions \u003c V1988" } ] } }, { "product_name": "Solid Edge SE2021", "version": { "version_data": [ { "version_value": "All versions \u003c SE2021MP8" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in NX 1953 Series (All versions \u003c V1973.3700), NX 1980 Series (All versions \u003c V1988), Solid Edge SE2021 (All versions \u003c SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13771)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-416: Use After Free" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1119/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1119/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-41535", "datePublished": "2021-09-28T11:12:29", "dateReserved": "2021-09-21T00:00:00", "dateUpdated": "2024-08-04T03:15:28.435Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-27736 (GCVE-0-2020-27736)
Vulnerability from cvelistv5
Published
2021-04-22 20:42
Modified
2024-08-04 16:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-170 - Improper Null Termination
Summary
A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (Versions including affected DNS modules), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), TALON TC Compact (BACnet) (All versions < V3.5.5), TALON TC Modular (BACnet) (All versions < V3.5.5). The DNS domain name label parsing functionality does not properly validate the null-terminated name in DNS-responses. The parsing of malformed responses could result in a read past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to cause a denial-of-service condition or leak the read memory.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | APOGEE PXC Compact (BACnet) |
Version: All versions < V3.5.5 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:18:45.573Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-705111.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-669158.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "APOGEE PXC Compact (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] }, { "defaultStatus": "unknown", "product": "APOGEE PXC Compact (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8.20" } ] }, { "defaultStatus": "unknown", "product": "APOGEE PXC Modular (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] }, { "defaultStatus": "unknown", "product": "APOGEE PXC Modular (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8.20" } ] }, { "defaultStatus": "unknown", "product": "Nucleus NET", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "Nucleus ReadyStart V3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2017.02.3" } ] }, { "defaultStatus": "unknown", "product": "Nucleus ReadyStart V4", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.0" } ] }, { "defaultStatus": "unknown", "product": "Nucleus Source Code", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "Versions including affected DNS modules" } ] }, { "defaultStatus": "unknown", "product": "SIMOTICS CONNECT 400", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V0.5.0.0" } ] }, { "defaultStatus": "unknown", "product": "TALON TC Compact (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] }, { "defaultStatus": "unknown", "product": "TALON TC Modular (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions \u003c V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions \u003c V2.8.20), APOGEE PXC Modular (BACnet) (All versions \u003c V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions \u003c V2.8.20), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions \u003c V2017.02.3), Nucleus ReadyStart V4 (All versions \u003c V4.1.0), Nucleus Source Code (Versions including affected DNS modules), SIMOTICS CONNECT 400 (All versions \u003c V0.5.0.0), TALON TC Compact (BACnet) (All versions \u003c V3.5.5), TALON TC Modular (BACnet) (All versions \u003c V3.5.5). The DNS domain name label parsing functionality does not properly validate the null-terminated name in DNS-responses. The parsing of malformed responses could result in a read past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to cause a denial-of-service condition or leak the read memory." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-170", "description": "CWE-170: Improper Null Termination", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-08T09:20:03.377Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-705111.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-669158.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2020-27736", "datePublished": "2021-04-22T20:42:19", "dateReserved": "2020-10-26T00:00:00", "dateUpdated": "2024-08-04T16:18:45.573Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-31881 (GCVE-0-2021-31881)
Vulnerability from cvelistv5
Published
2021-11-09 11:31
Modified
2025-03-11 09:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303). When processing a DHCP OFFER message, the DHCP client application does not validate the length of the Vendor option(s), leading to Denial-of-Service conditions. (FSMD-2021-0008)
References
URL | Tags | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Siemens | Capital Embedded AR Classic 431-422 |
Version: 0 < * |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:10:30.649Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Capital Embedded AR Classic 431-422", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Capital Embedded AR Classic R20-11", "vendor": "Siemens", "versions": [ { "lessThan": "V2303", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions \u003c V2303). When processing a DHCP OFFER message, the DHCP client application does not validate the length of the Vendor option(s), leading to Denial-of-Service conditions. (FSMD-2021-0008)" } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-11T09:47:40.916Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-114589.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-044112.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-620288.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-31881", "datePublished": "2021-11-09T11:31:54", "dateReserved": "2021-04-29T00:00:00", "dateUpdated": "2025-03-11T09:47:40.916Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-41538 (GCVE-0-2021-41538)
Vulnerability from cvelistv5
Published
2021-09-28 11:12
Modified
2024-08-04 03:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-824 - Access of Uninitialized Pointer
Summary
A vulnerability has been identified in NX 1953 Series (All versions < V1973.3700), NX 1980 Series (All versions < V1988), Solid Edge SE2021 (All versions < SE2021MP8). The affected application is vulnerable to information disclosure by unexpected access to an uninitialized pointer while parsing user-supplied OBJ files. An attacker could leverage this vulnerability to leak information from unexpected memory locations (ZDI-CAN-13770).
References
URL | Tags | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | NX 1953 Series |
Version: All versions < V1973.3700 |
||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:15:29.147Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1122/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "NX 1953 Series", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V1973.3700" } ] }, { "product": "NX 1980 Series", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V1988" } ] }, { "product": "Solid Edge SE2021", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c SE2021MP8" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in NX 1953 Series (All versions \u003c V1973.3700), NX 1980 Series (All versions \u003c V1988), Solid Edge SE2021 (All versions \u003c SE2021MP8). The affected application is vulnerable to information disclosure by unexpected access to an uninitialized pointer while parsing user-supplied OBJ files. An attacker could leverage this vulnerability to leak information from unexpected memory locations (ZDI-CAN-13770)." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-824", "description": "CWE-824: Access of Uninitialized Pointer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-09T11:32:13", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1122/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2021-41538", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "NX 1953 Series", "version": { "version_data": [ { "version_value": "All versions \u003c V1973.3700" } ] } }, { "product_name": "NX 1980 Series", "version": { "version_data": [ { "version_value": "All versions \u003c V1988" } ] } }, { "product_name": "Solid Edge SE2021", "version": { "version_data": [ { "version_value": "All versions \u003c SE2021MP8" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in NX 1953 Series (All versions \u003c V1973.3700), NX 1980 Series (All versions \u003c V1988), Solid Edge SE2021 (All versions \u003c SE2021MP8). The affected application is vulnerable to information disclosure by unexpected access to an uninitialized pointer while parsing user-supplied OBJ files. An attacker could leverage this vulnerability to leak information from unexpected memory locations (ZDI-CAN-13770)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-824: Access of Uninitialized Pointer" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1122/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1122/" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-41538", "datePublished": "2021-09-28T11:12:32", "dateReserved": "2021-09-21T00:00:00", "dateUpdated": "2024-08-04T03:15:29.147Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-25663 (GCVE-0-2021-25663)
Vulnerability from cvelistv5
Published
2021-04-22 20:42
Modified
2025-03-11 09:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Summary
A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (All versions including affected IPv6 stack). The function that processes IPv6 headers does not check the lengths of extension header options, allowing attackers to put this function into an infinite loop with crafted length values.
References
URL | Tags | |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | Capital Embedded AR Classic 431-422 |
Version: 0 < * |
|||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:11:27.118Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-248289.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-05" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-248289.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Capital Embedded AR Classic 431-422", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Capital Embedded AR Classic R20-11", "vendor": "Siemens", "versions": [ { "lessThan": "V2303", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Nucleus NET", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "Nucleus ReadyStart V3", "vendor": "Siemens", "versions": [ { "lessThan": "V2017.02.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Nucleus ReadyStart V4", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Nucleus Source Code", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions \u003c V2303), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions \u003c V2017.02.4), Nucleus ReadyStart V4 (All versions \u003c V4.1.0), Nucleus Source Code (All versions including affected IPv6 stack). The function that processes IPv6 headers does not check the lengths of extension header options, allowing attackers to put this function into an infinite loop with crafted length values." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" } }, { "cvssV4_0": { "baseScore": 8.7, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "version": "4.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-835", "description": "CWE-835: Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-11T09:47:33.806Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-248289.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-05" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-248289.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-25663", "datePublished": "2021-04-22T20:42:20", "dateReserved": "2021-01-21T00:00:00", "dateUpdated": "2025-03-11T09:47:33.806Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-40366 (GCVE-0-2021-40366)
Vulnerability from cvelistv5
Published
2021-11-09 11:32
Modified
2024-08-04 02:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-311 - Missing Encryption of Sensitive Data
Summary
A vulnerability has been identified in Climatix POL909 (AWB module) (All versions < V11.42), Climatix POL909 (AWM module) (All versions < V11.34). The web server of affected devices transmits data without TLS encryption. This could allow an unauthenticated remote attacker in a man-in-the-middle position to read sensitive data, such as administrator credentials, or modify data in transit.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Siemens | Climatix POL909 (AWB module) |
Version: All versions < V11.42 |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:44:09.177Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-703715.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Climatix POL909 (AWB module)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V11.42" } ] }, { "product": "Climatix POL909 (AWM module)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V11.34" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Climatix POL909 (AWB module) (All versions \u003c V11.42), Climatix POL909 (AWM module) (All versions \u003c V11.34). The web server of affected devices transmits data without TLS encryption. This could allow an unauthenticated remote attacker in a man-in-the-middle position to read sensitive data, such as administrator credentials, or modify data in transit." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-311", "description": "CWE-311: Missing Encryption of Sensitive Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-08T11:31:09", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-703715.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2021-40366", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Climatix POL909 (AWB module)", "version": { "version_data": [ { "version_value": "All versions \u003c V11.42" } ] } }, { "product_name": "Climatix POL909 (AWM module)", "version": { "version_data": [ { "version_value": "All versions \u003c V11.34" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in Climatix POL909 (AWB module) (All versions \u003c V11.42), Climatix POL909 (AWM module) (All versions \u003c V11.34). The web server of affected devices transmits data without TLS encryption. This could allow an unauthenticated remote attacker in a man-in-the-middle position to read sensitive data, such as administrator credentials, or modify data in transit." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-311: Missing Encryption of Sensitive Data" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-703715.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-703715.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-40366", "datePublished": "2021-11-09T11:32:07", "dateReserved": "2021-09-01T00:00:00", "dateUpdated": "2024-08-04T02:44:09.177Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-31890 (GCVE-0-2021-31890)
Vulnerability from cvelistv5
Published
2021-11-09 11:32
Modified
2025-03-11 09:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-240 - Improper Handling of Inconsistent Structural Elements
Summary
A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), SIMOTICS CONNECT 400 (All versions < V1.0.0.0). The total length of an TCP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on the network buffer organization in memory. (FSMD-2021-0017)
References
URL | Tags | |||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | Capital Embedded AR Classic 431-422 |
Version: 0 < * |
||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:10:30.798Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-223353.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Capital Embedded AR Classic 431-422", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Capital Embedded AR Classic R20-11", "vendor": "Siemens", "versions": [ { "lessThan": "V2303", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "PLUSCONTROL 1st Gen", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMOTICS CONNECT 400", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V0.5.0.0" } ] }, { "defaultStatus": "unknown", "product": "SIMOTICS CONNECT 400", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V1.0.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions \u003c V2303), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions \u003c V0.5.0.0), SIMOTICS CONNECT 400 (All versions \u003c V1.0.0.0). The total length of an TCP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on the network buffer organization in memory. (FSMD-2021-0017)" } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-240", "description": "CWE-240: Improper Handling of Inconsistent Structural Elements", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-11T09:47:46.741Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-223353.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-114589.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-044112.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-620288.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-845392.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-223353.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-31890", "datePublished": "2021-11-09T11:32:02", "dateReserved": "2021-04-29T00:00:00", "dateUpdated": "2025-03-11T09:47:46.741Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-27738 (GCVE-0-2020-27738)
Vulnerability from cvelistv5
Published
2021-04-22 20:42
Modified
2024-08-04 16:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-788 - Access of Memory Location After End of Buffer
Summary
A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (Versions including affected DNS modules), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), TALON TC Compact (BACnet) (All versions < V3.5.5), TALON TC Modular (BACnet) (All versions < V3.5.5). The DNS domain name record decompression functionality does not properly validate the pointer offset values. The parsing of malformed responses could result in a read access past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to cause a denial-of-service condition.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | APOGEE PXC Compact (BACnet) |
Version: All versions < V3.5.5 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:18:45.774Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-705111.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-669158.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "APOGEE PXC Compact (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] }, { "defaultStatus": "unknown", "product": "APOGEE PXC Compact (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8.20" } ] }, { "defaultStatus": "unknown", "product": "APOGEE PXC Modular (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] }, { "defaultStatus": "unknown", "product": "APOGEE PXC Modular (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8.20" } ] }, { "defaultStatus": "unknown", "product": "Nucleus NET", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "Nucleus ReadyStart V3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2017.02.3" } ] }, { "defaultStatus": "unknown", "product": "Nucleus ReadyStart V4", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.0" } ] }, { "defaultStatus": "unknown", "product": "Nucleus Source Code", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "Versions including affected DNS modules" } ] }, { "defaultStatus": "unknown", "product": "SIMOTICS CONNECT 400", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V0.5.0.0" } ] }, { "defaultStatus": "unknown", "product": "TALON TC Compact (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] }, { "defaultStatus": "unknown", "product": "TALON TC Modular (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions \u003c V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions \u003c V2.8.20), APOGEE PXC Modular (BACnet) (All versions \u003c V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions \u003c V2.8.20), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions \u003c V2017.02.3), Nucleus ReadyStart V4 (All versions \u003c V4.1.0), Nucleus Source Code (Versions including affected DNS modules), SIMOTICS CONNECT 400 (All versions \u003c V0.5.0.0), TALON TC Compact (BACnet) (All versions \u003c V3.5.5), TALON TC Modular (BACnet) (All versions \u003c V3.5.5). The DNS domain name record decompression functionality does not properly validate the pointer offset values. The parsing of malformed responses could result in a read access past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to cause a denial-of-service condition." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-788", "description": "CWE-788: Access of Memory Location After End of Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-08T09:20:05.489Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-705111.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-669158.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2020-27738", "datePublished": "2021-04-22T20:42:20", "dateReserved": "2020-10-26T00:00:00", "dateUpdated": "2024-08-04T16:18:45.774Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-31345 (GCVE-0-2021-31345)
Vulnerability from cvelistv5
Published
2021-11-09 11:31
Modified
2025-03-11 09:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1284 - Improper Validation of Specified Quantity in Input
Summary
A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions). The total length of an UDP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on a user-defined applications that runs on top of the UDP protocol. (FSMD-2021-0006)
References
URL | Tags | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | Capital Embedded AR Classic 431-422 |
Version: 0 < * |
||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:55:53.688Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Capital Embedded AR Classic 431-422", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Capital Embedded AR Classic R20-11", "vendor": "Siemens", "versions": [ { "lessThan": "V2303", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "PLUSCONTROL 1st Gen", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions \u003c V2303), PLUSCONTROL 1st Gen (All versions). The total length of an UDP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on a user-defined applications that runs on top of the UDP protocol. (FSMD-2021-0006)" } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1284", "description": "CWE-1284: Improper Validation of Specified Quantity in Input", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-11T09:47:37.991Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-114589.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-044112.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-620288.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-845392.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-31345", "datePublished": "2021-11-09T11:31:52", "dateReserved": "2021-04-15T00:00:00", "dateUpdated": "2025-03-11T09:47:37.991Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-42021 (GCVE-0-2021-42021)
Vulnerability from cvelistv5
Published
2021-11-09 11:32
Modified
2024-08-04 03:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-26 - Path Traversal: '/dir/../filename'
Summary
A vulnerability has been identified in Siveillance Video DLNA Server (2019 R1), Siveillance Video DLNA Server (2019 R2), Siveillance Video DLNA Server (2019 R3), Siveillance Video DLNA Server (2020 R1), Siveillance Video DLNA Server (2020 R2), Siveillance Video DLNA Server (2020 R3), Siveillance Video DLNA Server (2021 R1). The affected application contains a path traversal vulnerability that could allow to read arbitrary files on the server that are outside the application’s web document directory. An unauthenticated remote attacker could exploit this issue to access sensitive information for subsequent attacks.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | Siveillance Video DLNA Server |
Version: 2019 R1 |
||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.972Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-755517.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Siveillance Video DLNA Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "2019 R1" } ] }, { "product": "Siveillance Video DLNA Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "2019 R2" } ] }, { "product": "Siveillance Video DLNA Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "2019 R3" } ] }, { "product": "Siveillance Video DLNA Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "2020 R1" } ] }, { "product": "Siveillance Video DLNA Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "2020 R2" } ] }, { "product": "Siveillance Video DLNA Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "2020 R3" } ] }, { "product": "Siveillance Video DLNA Server", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "2021 R1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Siveillance Video DLNA Server (2019 R1), Siveillance Video DLNA Server (2019 R2), Siveillance Video DLNA Server (2019 R3), Siveillance Video DLNA Server (2020 R1), Siveillance Video DLNA Server (2020 R2), Siveillance Video DLNA Server (2020 R3), Siveillance Video DLNA Server (2021 R1). The affected application contains a path traversal vulnerability that could allow to read arbitrary files on the server that are outside the application\u2019s web document directory. An unauthenticated remote attacker could exploit this issue to access sensitive information for subsequent attacks." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-26", "description": "CWE-26: Path Traversal: \u0027/dir/../filename\u0027", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-09T11:32:15", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-755517.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2021-42021", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Siveillance Video DLNA Server", "version": { "version_data": [ { "version_value": "2019 R1" } ] } }, { "product_name": "Siveillance Video DLNA Server", "version": { "version_data": [ { "version_value": "2019 R2" } ] } }, { "product_name": "Siveillance Video DLNA Server", "version": { "version_data": [ { "version_value": "2019 R3" } ] } }, { "product_name": "Siveillance Video DLNA Server", "version": { "version_data": [ { "version_value": "2020 R1" } ] } }, { "product_name": "Siveillance Video DLNA Server", "version": { "version_data": [ { "version_value": "2020 R2" } ] } }, { "product_name": "Siveillance Video DLNA Server", "version": { "version_data": [ { "version_value": "2020 R3" } ] } }, { "product_name": "Siveillance Video DLNA Server", "version": { "version_data": [ { "version_value": "2021 R1" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in Siveillance Video DLNA Server (2019 R1), Siveillance Video DLNA Server (2019 R2), Siveillance Video DLNA Server (2019 R3), Siveillance Video DLNA Server (2020 R1), Siveillance Video DLNA Server (2020 R2), Siveillance Video DLNA Server (2020 R3), Siveillance Video DLNA Server (2021 R1). The affected application contains a path traversal vulnerability that could allow to read arbitrary files on the server that are outside the application\u2019s web document directory. An unauthenticated remote attacker could exploit this issue to access sensitive information for subsequent attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-26: Path Traversal: \u0027/dir/../filename\u0027" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-755517.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-755517.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-42021", "datePublished": "2021-11-09T11:32:15", "dateReserved": "2021-10-06T00:00:00", "dateUpdated": "2024-08-04T03:22:25.972Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-10052 (GCVE-0-2020-10052)
Vulnerability from cvelistv5
Published
2021-11-09 11:31
Modified
2024-08-04 10:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-532 - Insertion of Sensitive Information into Log File
Summary
A vulnerability has been identified in SIMATIC RTLS Locating Manager (All versions < V2.12). The affected application writes sensitive data, such as usernames and passwords in log files. A local attacker with access to the log files could use this information to launch further attacks.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Siemens | SIMATIC RTLS Locating Manager |
Version: All versions < V2.12 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:50:57.284Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-145157.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SIMATIC RTLS Locating Manager", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.12" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SIMATIC RTLS Locating Manager (All versions \u003c V2.12). The affected application writes sensitive data, such as usernames and passwords in log files. A local attacker with access to the log files could use this information to launch further attacks." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532: Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-09T11:31:36", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-145157.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2020-10052", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SIMATIC RTLS Locating Manager", "version": { "version_data": [ { "version_value": "All versions \u003c V2.12" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SIMATIC RTLS Locating Manager (All versions \u003c V2.12). The affected application writes sensitive data, such as usernames and passwords in log files. A local attacker with access to the log files could use this information to launch further attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-532: Insertion of Sensitive Information into Log File" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-145157.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-145157.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2020-10052", "datePublished": "2021-11-09T11:31:36", "dateReserved": "2020-03-04T00:00:00", "dateUpdated": "2024-08-04T10:50:57.284Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-42026 (GCVE-0-2021-42026)
Vulnerability from cvelistv5
Published
2021-11-09 11:32
Modified
2024-08-04 03:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-863 - Incorrect Authorization
Summary
A vulnerability has been identified in Mendix Applications using Mendix 8 (All versions < V8.18.13), Mendix Applications using Mendix 9 (All versions < V9.6.2). Applications built with affected versions of Mendix Studio Pro do not properly control read access for certain client actions. This could allow authenticated attackers to retrieve the changedDate attribute of arbitrary objects, even when they don't have read access to them.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Siemens | Mendix Applications using Mendix 8 |
Version: All versions < V8.18.13 |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.755Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-779699.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Mendix Applications using Mendix 8", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V8.18.13" } ] }, { "product": "Mendix Applications using Mendix 9", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V9.6.2" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Mendix Applications using Mendix 8 (All versions \u003c V8.18.13), Mendix Applications using Mendix 9 (All versions \u003c V9.6.2). Applications built with affected versions of Mendix Studio Pro do not properly control read access for certain client actions. This could allow authenticated attackers to retrieve the changedDate attribute of arbitrary objects, even when they don\u0027t have read access to them." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-09T11:32:17", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-779699.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2021-42026", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Mendix Applications using Mendix 8", "version": { "version_data": [ { "version_value": "All versions \u003c V8.18.13" } ] } }, { "product_name": "Mendix Applications using Mendix 9", "version": { "version_data": [ { "version_value": "All versions \u003c V9.6.2" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in Mendix Applications using Mendix 8 (All versions \u003c V8.18.13), Mendix Applications using Mendix 9 (All versions \u003c V9.6.2). Applications built with affected versions of Mendix Studio Pro do not properly control read access for certain client actions. This could allow authenticated attackers to retrieve the changedDate attribute of arbitrary objects, even when they don\u0027t have read access to them." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-863: Incorrect Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-779699.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-779699.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-42026", "datePublished": "2021-11-09T11:32:17", "dateReserved": "2021-10-06T00:00:00", "dateUpdated": "2024-08-04T03:22:25.755Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-15795 (GCVE-0-2020-15795)
Vulnerability from cvelistv5
Published
2021-04-22 20:42
Modified
2024-08-04 13:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), Nucleus NET (All versions < V5.2), Nucleus Source Code (Versions including affected DNS modules), TALON TC Compact (BACnet) (All versions < V3.5.5), TALON TC Modular (BACnet) (All versions < V3.5.5). The DNS domain name label parsing functionality does not properly validate the names in DNS-responses. The parsing of malformed responses could result in a write past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to execute code in the context of the current process or cause a denial-of-service condition.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | APOGEE PXC Compact (BACnet) |
Version: All versions < V3.5.5 |
|||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:30:21.684Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-185699.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "APOGEE PXC Compact (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] }, { "defaultStatus": "unknown", "product": "APOGEE PXC Compact (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8.20" } ] }, { "defaultStatus": "unknown", "product": "APOGEE PXC Modular (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] }, { "defaultStatus": "unknown", "product": "APOGEE PXC Modular (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8.20" } ] }, { "defaultStatus": "unknown", "product": "Nucleus NET", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2" } ] }, { "defaultStatus": "unknown", "product": "Nucleus Source Code", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "Versions including affected DNS modules" } ] }, { "defaultStatus": "unknown", "product": "TALON TC Compact (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] }, { "defaultStatus": "unknown", "product": "TALON TC Modular (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions \u003c V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions \u003c V2.8.20), APOGEE PXC Modular (BACnet) (All versions \u003c V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions \u003c V2.8.20), Nucleus NET (All versions \u003c V5.2), Nucleus Source Code (Versions including affected DNS modules), TALON TC Compact (BACnet) (All versions \u003c V3.5.5), TALON TC Modular (BACnet) (All versions \u003c V3.5.5). The DNS domain name label parsing functionality does not properly validate the names in DNS-responses. The parsing of malformed responses could result in a write past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to execute code in the context of the current process or cause a denial-of-service condition." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787: Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-08T09:20:01.115Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-185699.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2020-15795", "datePublished": "2021-04-22T20:42:19", "dateReserved": "2020-07-15T00:00:00", "dateUpdated": "2024-08-04T13:30:21.684Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-10053 (GCVE-0-2020-10053)
Vulnerability from cvelistv5
Published
2021-11-09 11:31
Modified
2024-08-04 10:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-312 - Cleartext Storage of Sensitive Information
Summary
A vulnerability has been identified in SIMATIC RTLS Locating Manager (All versions < V2.12). The affected application writes sensitive data, such as database credentials in configuration files. A local attacker with access to the configuration files could use this information to launch further attacks.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Siemens | SIMATIC RTLS Locating Manager |
Version: All versions < V2.12 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:50:57.831Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-145157.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SIMATIC RTLS Locating Manager", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.12" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SIMATIC RTLS Locating Manager (All versions \u003c V2.12). The affected application writes sensitive data, such as database credentials in configuration files. A local attacker with access to the configuration files could use this information to launch further attacks." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-312", "description": "CWE-312: Cleartext Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-09T11:31:37", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-145157.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2020-10053", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SIMATIC RTLS Locating Manager", "version": { "version_data": [ { "version_value": "All versions \u003c V2.12" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SIMATIC RTLS Locating Manager (All versions \u003c V2.12). The affected application writes sensitive data, such as database credentials in configuration files. A local attacker with access to the configuration files could use this information to launch further attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-312: Cleartext Storage of Sensitive Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-145157.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-145157.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2020-10053", "datePublished": "2021-11-09T11:31:37", "dateReserved": "2020-03-04T00:00:00", "dateUpdated": "2024-08-04T10:50:57.831Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-31885 (GCVE-0-2021-31885)
Vulnerability from cvelistv5
Published
2021-11-09 11:31
Modified
2024-08-03 23:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-805 - Buffer Access with Incorrect Length Value
Summary
A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions < V3.5.4), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.19), APOGEE PXC Modular (BACnet) (All versions < V3.5.4), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.19), Desigo PXC00-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC00-U (All versions >= V2.3 and < V6.30.016), Desigo PXC001-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC100-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC12-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC128-U (All versions >= V2.3 and < V6.30.016), Desigo PXC200-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC22-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC22.1-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC36.1-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC50-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC64-U (All versions >= V2.3 and < V6.30.016), Desigo PXM20-E (All versions >= V2.3 and < V6.30.016), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.1), Nucleus Source Code (All versions), PLUSCONTROL 1st Gen (All versions), TALON TC Compact (BACnet) (All versions < V3.5.4), TALON TC Modular (BACnet) (All versions < V3.5.4). TFTP server application allows for reading the contents of the TFTP memory buffer via sending malformed TFTP commands. (FSMD-2021-0009)
References
URL | Tags | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | APOGEE MBC (PPC) (BACnet) |
Version: All versions |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:10:30.607Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "APOGEE MBC (PPC) (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "APOGEE MBC (PPC) (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "APOGEE MEC (PPC) (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "APOGEE MEC (PPC) (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "APOGEE PXC Compact (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.4" } ] }, { "product": "APOGEE PXC Compact (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8.19" } ] }, { "product": "APOGEE PXC Modular (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.4" } ] }, { "product": "APOGEE PXC Modular (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8.19" } ] }, { "product": "Desigo PXC00-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC00-U", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC001-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC100-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC12-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC128-U", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC200-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC22-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC22.1-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC36.1-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC50-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC64-U", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXM20-E", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Nucleus NET", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "Nucleus ReadyStart V3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2017.02.4" } ] }, { "product": "Nucleus ReadyStart V4", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.1" } ] }, { "product": "Nucleus Source Code", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "PLUSCONTROL 1st Gen", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "TALON TC Compact (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.4" } ] }, { "product": "TALON TC Modular (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.4" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions \u003c V3.5.4), APOGEE PXC Compact (P2 Ethernet) (All versions \u003c V2.8.19), APOGEE PXC Modular (BACnet) (All versions \u003c V3.5.4), APOGEE PXC Modular (P2 Ethernet) (All versions \u003c V2.8.19), Desigo PXC00-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC00-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC001-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC100-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC12-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC128-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC200-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC22-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC22.1-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC36.1-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC50-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC64-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXM20-E (All versions \u003e= V2.3 and \u003c V6.30.016), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions \u003c V2017.02.4), Nucleus ReadyStart V4 (All versions \u003c V4.1.1), Nucleus Source Code (All versions), PLUSCONTROL 1st Gen (All versions), TALON TC Compact (BACnet) (All versions \u003c V3.5.4), TALON TC Modular (BACnet) (All versions \u003c V3.5.4). TFTP server application allows for reading the contents of the TFTP memory buffer via sending malformed TFTP commands. (FSMD-2021-0009)" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-805", "description": "CWE-805: Buffer Access with Incorrect Length Value", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-10T09:46:34", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2021-31885", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "APOGEE MBC (PPC) (BACnet)", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "APOGEE MBC (PPC) (P2 Ethernet)", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "APOGEE MEC (PPC) (BACnet)", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "APOGEE MEC (PPC) (P2 Ethernet)", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "APOGEE PXC Compact (BACnet)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.5.4" } ] } }, { "product_name": "APOGEE PXC Compact (P2 Ethernet)", "version": { "version_data": [ { "version_value": "All versions \u003c V2.8.19" } ] } }, { "product_name": "APOGEE PXC Modular (BACnet)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.5.4" } ] } }, { "product_name": "APOGEE PXC Modular (P2 Ethernet)", "version": { "version_data": [ { "version_value": "All versions \u003c V2.8.19" } ] } }, { "product_name": "Desigo PXC00-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC00-U", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC001-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC100-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC12-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC128-U", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC200-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC22-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC22.1-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC36.1-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC50-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC64-U", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXM20-E", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Nucleus NET", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "Nucleus ReadyStart V3", "version": { "version_data": [ { "version_value": "All versions \u003c V2017.02.4" } ] } }, { "product_name": "Nucleus ReadyStart V4", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.1" } ] } }, { "product_name": "Nucleus Source Code", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "PLUSCONTROL 1st Gen", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "TALON TC Compact (BACnet)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.5.4" } ] } }, { "product_name": "TALON TC Modular (BACnet)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.5.4" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions \u003c V3.5.4), APOGEE PXC Compact (P2 Ethernet) (All versions \u003c V2.8.19), APOGEE PXC Modular (BACnet) (All versions \u003c V3.5.4), APOGEE PXC Modular (P2 Ethernet) (All versions \u003c V2.8.19), Desigo PXC00-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC00-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC001-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC100-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC12-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC128-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC200-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC22-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC22.1-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC36.1-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC50-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC64-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXM20-E (All versions \u003e= V2.3 and \u003c V6.30.016), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions \u003c V2017.02.4), Nucleus ReadyStart V4 (All versions \u003c V4.1.1), Nucleus Source Code (All versions), PLUSCONTROL 1st Gen (All versions), TALON TC Compact (BACnet) (All versions \u003c V3.5.4), TALON TC Modular (BACnet) (All versions \u003c V3.5.4). TFTP server application allows for reading the contents of the TFTP memory buffer via sending malformed TFTP commands. (FSMD-2021-0009)" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-805: Buffer Access with Incorrect Length Value" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-31885", "datePublished": "2021-11-09T11:31:58", "dateReserved": "2021-04-29T00:00:00", "dateUpdated": "2024-08-03T23:10:30.607Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-31887 (GCVE-0-2021-31887)
Vulnerability from cvelistv5
Published
2021-11-09 11:32
Modified
2024-08-03 23:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-170 - Improper Null Termination
Summary
A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions < V3.5.4), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.19), APOGEE PXC Modular (BACnet) (All versions < V3.5.4), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.19), Desigo PXC00-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC00-U (All versions >= V2.3 and < V6.30.016), Desigo PXC001-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC100-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC12-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC128-U (All versions >= V2.3 and < V6.30.016), Desigo PXC200-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC22-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC22.1-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC36.1-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC50-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC64-U (All versions >= V2.3 and < V6.30.016), Desigo PXM20-E (All versions >= V2.3 and < V6.30.016), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions < V3.5.4), TALON TC Modular (BACnet) (All versions < V3.5.4). FTP server does not properly validate the length of the “PWD/XPWD” command, leading to stack-based buffer overflows. This may result in Denial-of-Service conditions and Remote Code Execution. (FSMD-2021-0016)
References
URL | Tags | |||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | APOGEE MBC (PPC) (BACnet) |
Version: All versions |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:10:30.650Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "APOGEE MBC (PPC) (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "APOGEE MBC (PPC) (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "APOGEE MEC (PPC) (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "APOGEE MEC (PPC) (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "APOGEE PXC Compact (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.4" } ] }, { "product": "APOGEE PXC Compact (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8.19" } ] }, { "product": "APOGEE PXC Modular (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.4" } ] }, { "product": "APOGEE PXC Modular (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8.19" } ] }, { "product": "Desigo PXC00-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC00-U", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC001-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC100-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC12-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC128-U", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC200-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC22-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC22.1-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC36.1-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC50-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC64-U", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXM20-E", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Nucleus NET", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "Nucleus ReadyStart V3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2017.02.4" } ] }, { "product": "Nucleus Source Code", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "TALON TC Compact (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.4" } ] }, { "product": "TALON TC Modular (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.4" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions \u003c V3.5.4), APOGEE PXC Compact (P2 Ethernet) (All versions \u003c V2.8.19), APOGEE PXC Modular (BACnet) (All versions \u003c V3.5.4), APOGEE PXC Modular (P2 Ethernet) (All versions \u003c V2.8.19), Desigo PXC00-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC00-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC001-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC100-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC12-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC128-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC200-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC22-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC22.1-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC36.1-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC50-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC64-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXM20-E (All versions \u003e= V2.3 and \u003c V6.30.016), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions \u003c V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions \u003c V3.5.4), TALON TC Modular (BACnet) (All versions \u003c V3.5.4). FTP server does not properly validate the length of the \u201cPWD/XPWD\u201d command, leading to stack-based buffer overflows. This may result in Denial-of-Service conditions and Remote Code Execution. (FSMD-2021-0016)" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-170", "description": "CWE-170: Improper Null Termination", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-10T09:46:36", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2021-31887", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "APOGEE MBC (PPC) (BACnet)", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "APOGEE MBC (PPC) (P2 Ethernet)", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "APOGEE MEC (PPC) (BACnet)", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "APOGEE MEC (PPC) (P2 Ethernet)", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "APOGEE PXC Compact (BACnet)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.5.4" } ] } }, { "product_name": "APOGEE PXC Compact (P2 Ethernet)", "version": { "version_data": [ { "version_value": "All versions \u003c V2.8.19" } ] } }, { "product_name": "APOGEE PXC Modular (BACnet)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.5.4" } ] } }, { "product_name": "APOGEE PXC Modular (P2 Ethernet)", "version": { "version_data": [ { "version_value": "All versions \u003c V2.8.19" } ] } }, { "product_name": "Desigo PXC00-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC00-U", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC001-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC100-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC12-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC128-U", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC200-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC22-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC22.1-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC36.1-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC50-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC64-U", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXM20-E", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Nucleus NET", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "Nucleus ReadyStart V3", "version": { "version_data": [ { "version_value": "All versions \u003c V2017.02.4" } ] } }, { "product_name": "Nucleus Source Code", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "TALON TC Compact (BACnet)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.5.4" } ] } }, { "product_name": "TALON TC Modular (BACnet)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.5.4" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions \u003c V3.5.4), APOGEE PXC Compact (P2 Ethernet) (All versions \u003c V2.8.19), APOGEE PXC Modular (BACnet) (All versions \u003c V3.5.4), APOGEE PXC Modular (P2 Ethernet) (All versions \u003c V2.8.19), Desigo PXC00-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC00-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC001-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC100-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC12-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC128-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC200-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC22-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC22.1-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC36.1-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC50-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC64-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXM20-E (All versions \u003e= V2.3 and \u003c V6.30.016), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions \u003c V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions \u003c V3.5.4), TALON TC Modular (BACnet) (All versions \u003c V3.5.4). FTP server does not properly validate the length of the \u201cPWD/XPWD\u201d command, leading to stack-based buffer overflows. This may result in Denial-of-Service conditions and Remote Code Execution. (FSMD-2021-0016)" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-170: Improper Null Termination" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-31887", "datePublished": "2021-11-09T11:32:00", "dateReserved": "2021-04-29T00:00:00", "dateUpdated": "2024-08-03T23:10:30.650Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-31888 (GCVE-0-2021-31888)
Vulnerability from cvelistv5
Published
2021-11-09 11:32
Modified
2024-08-03 23:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-170 - Improper Null Termination
Summary
A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions < V3.5.4), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.19), APOGEE PXC Modular (BACnet) (All versions < V3.5.4), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.19), Desigo PXC00-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC00-U (All versions >= V2.3 and < V6.30.016), Desigo PXC001-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC100-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC12-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC128-U (All versions >= V2.3 and < V6.30.016), Desigo PXC200-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC22-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC22.1-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC36.1-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC50-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC64-U (All versions >= V2.3 and < V6.30.016), Desigo PXM20-E (All versions >= V2.3 and < V6.30.016), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions < V3.5.4), TALON TC Modular (BACnet) (All versions < V3.5.4). FTP server does not properly validate the length of the “MKD/XMKD” command, leading to stack-based buffer overflows. This may result in Denial-of-Service conditions and Remote Code Execution. (FSMD-2021-0018)
References
URL | Tags | |||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | APOGEE MBC (PPC) (BACnet) |
Version: All versions |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:10:30.804Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "APOGEE MBC (PPC) (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "APOGEE MBC (PPC) (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "APOGEE MEC (PPC) (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "APOGEE MEC (PPC) (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "APOGEE PXC Compact (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.4" } ] }, { "product": "APOGEE PXC Compact (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8.19" } ] }, { "product": "APOGEE PXC Modular (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.4" } ] }, { "product": "APOGEE PXC Modular (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8.19" } ] }, { "product": "Desigo PXC00-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC00-U", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC001-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC100-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC12-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC128-U", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC200-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC22-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC22.1-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC36.1-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC50-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC64-U", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXM20-E", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Nucleus NET", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "Nucleus ReadyStart V3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2017.02.4" } ] }, { "product": "Nucleus Source Code", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "TALON TC Compact (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.4" } ] }, { "product": "TALON TC Modular (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.4" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions \u003c V3.5.4), APOGEE PXC Compact (P2 Ethernet) (All versions \u003c V2.8.19), APOGEE PXC Modular (BACnet) (All versions \u003c V3.5.4), APOGEE PXC Modular (P2 Ethernet) (All versions \u003c V2.8.19), Desigo PXC00-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC00-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC001-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC100-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC12-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC128-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC200-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC22-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC22.1-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC36.1-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC50-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC64-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXM20-E (All versions \u003e= V2.3 and \u003c V6.30.016), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions \u003c V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions \u003c V3.5.4), TALON TC Modular (BACnet) (All versions \u003c V3.5.4). FTP server does not properly validate the length of the \u201cMKD/XMKD\u201d command, leading to stack-based buffer overflows. This may result in Denial-of-Service conditions and Remote Code Execution. (FSMD-2021-0018)" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-170", "description": "CWE-170: Improper Null Termination", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-10T09:46:37", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2021-31888", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "APOGEE MBC (PPC) (BACnet)", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "APOGEE MBC (PPC) (P2 Ethernet)", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "APOGEE MEC (PPC) (BACnet)", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "APOGEE MEC (PPC) (P2 Ethernet)", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "APOGEE PXC Compact (BACnet)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.5.4" } ] } }, { "product_name": "APOGEE PXC Compact (P2 Ethernet)", "version": { "version_data": [ { "version_value": "All versions \u003c V2.8.19" } ] } }, { "product_name": "APOGEE PXC Modular (BACnet)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.5.4" } ] } }, { "product_name": "APOGEE PXC Modular (P2 Ethernet)", "version": { "version_data": [ { "version_value": "All versions \u003c V2.8.19" } ] } }, { "product_name": "Desigo PXC00-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC00-U", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC001-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC100-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC12-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC128-U", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC200-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC22-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC22.1-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC36.1-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC50-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC64-U", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXM20-E", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Nucleus NET", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "Nucleus ReadyStart V3", "version": { "version_data": [ { "version_value": "All versions \u003c V2017.02.4" } ] } }, { "product_name": "Nucleus Source Code", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "TALON TC Compact (BACnet)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.5.4" } ] } }, { "product_name": "TALON TC Modular (BACnet)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.5.4" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions \u003c V3.5.4), APOGEE PXC Compact (P2 Ethernet) (All versions \u003c V2.8.19), APOGEE PXC Modular (BACnet) (All versions \u003c V3.5.4), APOGEE PXC Modular (P2 Ethernet) (All versions \u003c V2.8.19), Desigo PXC00-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC00-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC001-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC100-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC12-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC128-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC200-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC22-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC22.1-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC36.1-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC50-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC64-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXM20-E (All versions \u003e= V2.3 and \u003c V6.30.016), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions \u003c V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions \u003c V3.5.4), TALON TC Modular (BACnet) (All versions \u003c V3.5.4). FTP server does not properly validate the length of the \u201cMKD/XMKD\u201d command, leading to stack-based buffer overflows. This may result in Denial-of-Service conditions and Remote Code Execution. (FSMD-2021-0018)" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-170: Improper Null Termination" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-31888", "datePublished": "2021-11-09T11:32:00", "dateReserved": "2021-04-29T00:00:00", "dateUpdated": "2024-08-03T23:10:30.804Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-40358 (GCVE-0-2021-40358)
Vulnerability from cvelistv5
Published
2021-11-09 11:32
Modified
2024-08-04 02:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3 UC04), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 5). Legitimate file operations on the web server of the affected systems do not properly neutralize special elements within the pathname. An attacker could then cause the pathname to resolve to a location outside of the restricted directory on the server and read, write or delete unexpected critical files.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | SIMATIC PCS 7 V8.2 |
Version: All versions |
|||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:44:09.554Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-840188.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "SIMATIC PCS 7 V8.2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC PCS 7 V9.0", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V9.0 SP3 UC04" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC PCS 7 V9.1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V9.1 SP1" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC WinCC V15 and earlier", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V15 SP1 Update 7" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC WinCC V16", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V16 Update 5" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC WinCC V17", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V17 Update 2" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC WinCC V7.4", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.4 SP1 Update 19" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC WinCC V7.5", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.5 SP2 Update 5" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions \u003c V9.0 SP3 UC04), SIMATIC PCS 7 V9.1 (All versions \u003c V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions \u003c V15 SP1 Update 7), SIMATIC WinCC V16 (All versions \u003c V16 Update 5), SIMATIC WinCC V17 (All versions \u003c V17 Update 2), SIMATIC WinCC V7.4 (All versions \u003c V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions \u003c V7.5 SP2 Update 5). Legitimate file operations on the web server of the affected systems do not properly neutralize special elements within the pathname. An attacker could then cause the pathname to resolve to a location outside of the restricted directory on the server and read, write or delete unexpected critical files." } ], "metrics": [ { "cvssV3_1": { "baseScore": 9.9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-11T09:01:58.251Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-840188.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-40358", "datePublished": "2021-11-09T11:32:04", "dateReserved": "2021-09-01T00:00:00", "dateUpdated": "2024-08-04T02:44:09.554Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-37730 (GCVE-0-2021-37730)
Vulnerability from cvelistv5
Published
2021-10-12 14:07
Modified
2024-08-04 01:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- remote arbitrary command execution
Summary
A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) version(s): Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.18 and below; Aruba Instant 6.5.x.x: 6.5.4.20 and below; Aruba Instant 8.5.x.x: 8.5.0.12 and below; Aruba Instant 8.6.x.x: 8.6.0.11 and below; Aruba Instant 8.7.x.x: 8.7.1.3 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability.
References
URL | Tags | |||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | HPE Aruba Instant (IAP) |
Version: Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.18 and below Version: Aruba Instant 6.5.x.x: 6.5.4.20 and below Version: Aruba Instant 8.5.x.x: 8.5.0.12 and below Version: Aruba Instant 8.6.x.x: 8.6.0.11 and below Version: Aruba Instant 8.7.x.x: 8.7.1.3 and below |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:30:07.421Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HPE Aruba Instant (IAP)", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.18 and below" }, { "status": "affected", "version": "Aruba Instant 6.5.x.x: 6.5.4.20 and below" }, { "status": "affected", "version": "Aruba Instant 8.5.x.x: 8.5.0.12 and below" }, { "status": "affected", "version": "Aruba Instant 8.6.x.x: 8.6.0.11 and below" }, { "status": "affected", "version": "Aruba Instant 8.7.x.x: 8.7.1.3 and below" } ] } ], "descriptions": [ { "lang": "en", "value": "A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) version(s): Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.18 and below; Aruba Instant 6.5.x.x: 6.5.4.20 and below; Aruba Instant 8.5.x.x: 8.5.0.12 and below; Aruba Instant 8.6.x.x: 8.6.0.11 and below; Aruba Instant 8.7.x.x: 8.7.1.3 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "remote arbitrary command execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-09T12:06:25", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-alert@hpe.com", "ID": "CVE-2021-37730", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HPE Aruba Instant (IAP)", "version": { "version_data": [ { "version_value": "Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.18 and below" }, { "version_value": "Aruba Instant 6.5.x.x: 6.5.4.20 and below" }, { "version_value": "Aruba Instant 8.5.x.x: 8.5.0.12 and below" }, { "version_value": "Aruba Instant 8.6.x.x: 8.6.0.11 and below" }, { "version_value": "Aruba Instant 8.7.x.x: 8.7.1.3 and below" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) version(s): Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.18 and below; Aruba Instant 6.5.x.x: 6.5.4.20 and below; Aruba Instant 8.5.x.x: 8.5.0.12 and below; Aruba Instant 8.6.x.x: 8.6.0.11 and below; Aruba Instant 8.7.x.x: 8.7.1.3 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "remote arbitrary command execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt", "refsource": "MISC", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2021-37730", "datePublished": "2021-10-12T14:07:45", "dateReserved": "2021-07-29T00:00:00", "dateUpdated": "2024-08-04T01:30:07.421Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-37726 (GCVE-0-2021-37726)
Vulnerability from cvelistv5
Published
2021-10-12 14:06
Modified
2024-08-04 01:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- remote buffer overflow
Summary
A remote buffer overflow vulnerability was discovered in HPE Aruba Instant (IAP) version(s): Aruba Instant 8.7.x.x: 8.7.0.0 through 8.7.1.2. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability.
References
URL | Tags | |||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | HPE Aruba Instant (IAP) |
Version: Aruba Instant 8.7.x.x: 8.7.0.0 through 8.7.1.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:23:01.639Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HPE Aruba Instant (IAP)", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Aruba Instant 8.7.x.x: 8.7.0.0 through 8.7.1.2" } ] } ], "descriptions": [ { "lang": "en", "value": "A remote buffer overflow vulnerability was discovered in HPE Aruba Instant (IAP) version(s): Aruba Instant 8.7.x.x: 8.7.0.0 through 8.7.1.2. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "remote buffer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-09T12:06:15", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-alert@hpe.com", "ID": "CVE-2021-37726", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HPE Aruba Instant (IAP)", "version": { "version_data": [ { "version_value": "Aruba Instant 8.7.x.x: 8.7.0.0 through 8.7.1.2" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A remote buffer overflow vulnerability was discovered in HPE Aruba Instant (IAP) version(s): Aruba Instant 8.7.x.x: 8.7.0.0 through 8.7.1.2. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "remote buffer overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt", "refsource": "MISC", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2021-37726", "datePublished": "2021-10-12T14:06:35", "dateReserved": "2021-07-29T00:00:00", "dateUpdated": "2024-08-04T01:23:01.639Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-27393 (GCVE-0-2021-27393)
Vulnerability from cvelistv5
Published
2021-04-22 20:42
Modified
2024-08-03 20:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-330 - Use of Insufficiently Random Values
Summary
A vulnerability has been identified in Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2013.08), Nucleus Source Code (Versions including affected DNS modules). The DNS client does not properly randomize UDP port numbers of DNS requests. That could allow an attacker to poison the DNS cache or spoof DNS resolving.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | Nucleus NET |
Version: All versions |
||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:48:16.739Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-201384.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Nucleus NET", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "Nucleus ReadyStart V3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2013.08" } ] }, { "product": "Nucleus Source Code", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "Versions including affected DNS modules" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions \u003c V2013.08), Nucleus Source Code (Versions including affected DNS modules). The DNS client does not properly randomize UDP port numbers of DNS requests. That could allow an attacker to poison the DNS cache or spoof DNS resolving." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-330", "description": "CWE-330: Use of Insufficiently Random Values", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-11T11:27:04", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-201384.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2021-27393", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Nucleus NET", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "Nucleus ReadyStart V3", "version": { "version_data": [ { "version_value": "All versions \u003c V2013.08" } ] } }, { "product_name": "Nucleus Source Code", "version": { "version_data": [ { "version_value": "Versions including affected DNS modules" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions \u003c V2013.08), Nucleus Source Code (Versions including affected DNS modules). The DNS client does not properly randomize UDP port numbers of DNS requests. That could allow an attacker to poison the DNS cache or spoof DNS resolving." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-330: Use of Insufficiently Random Values" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-201384.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-201384.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-27393", "datePublished": "2021-04-22T20:42:21", "dateReserved": "2021-02-18T00:00:00", "dateUpdated": "2024-08-03T20:48:16.739Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-31883 (GCVE-0-2021-31883)
Vulnerability from cvelistv5
Published
2021-11-09 11:31
Modified
2025-03-11 09:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary
A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303). When processing a DHCP ACK message, the DHCP client application does not validate the length of the Vendor option(s), leading to Denial-of-Service conditions. (FSMD-2021-0013)
References
URL | Tags | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Siemens | Capital Embedded AR Classic 431-422 |
Version: 0 < * |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:10:30.182Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Capital Embedded AR Classic 431-422", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Capital Embedded AR Classic R20-11", "vendor": "Siemens", "versions": [ { "lessThan": "V2303", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions \u003c V2303). When processing a DHCP ACK message, the DHCP client application does not validate the length of the Vendor option(s), leading to Denial-of-Service conditions. (FSMD-2021-0013)" } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-11T09:47:43.750Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-114589.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-044112.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-620288.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-31883", "datePublished": "2021-11-09T11:31:56", "dateReserved": "2021-04-29T00:00:00", "dateUpdated": "2025-03-11T09:47:43.750Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-41057 (GCVE-0-2021-41057)
Vulnerability from cvelistv5
Published
2021-11-14 20:21
Modified
2024-08-04 02:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In WIBU CodeMeter Runtime before 7.30a, creating a crafted CmDongles symbolic link will overwrite the linked file without checking permissions.
References
URL | Tags | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:59:31.383Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.wibu.com/us/support/security-advisories.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-580693.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-210910-01.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In WIBU CodeMeter Runtime before 7.30a, creating a crafted CmDongles symbolic link will overwrite the linked file without checking permissions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-14T20:21:30", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.wibu.com/us/support/security-advisories.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-580693.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-210910-01.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-41057", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In WIBU CodeMeter Runtime before 7.30a, creating a crafted CmDongles symbolic link will overwrite the linked file without checking permissions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.wibu.com/us/support/security-advisories.html", "refsource": "MISC", "url": "https://www.wibu.com/us/support/security-advisories.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-580693.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-580693.pdf" }, { "name": "https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-210910-01.pdf", "refsource": "CONFIRM", "url": "https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-210910-01.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-41057", "datePublished": "2021-11-14T20:21:30", "dateReserved": "2021-09-13T00:00:00", "dateUpdated": "2024-08-04T02:59:31.383Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-31886 (GCVE-0-2021-31886)
Vulnerability from cvelistv5
Published
2021-11-09 11:31
Modified
2024-08-03 23:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-170 - Improper Null Termination
Summary
A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions < V3.5.4), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.19), APOGEE PXC Modular (BACnet) (All versions < V3.5.4), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.19), Desigo PXC00-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC00-U (All versions >= V2.3 and < V6.30.016), Desigo PXC001-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC100-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC12-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC128-U (All versions >= V2.3 and < V6.30.016), Desigo PXC200-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC22-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC22.1-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC36.1-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC50-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC64-U (All versions >= V2.3 and < V6.30.016), Desigo PXM20-E (All versions >= V2.3 and < V6.30.016), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions < V3.5.4), TALON TC Modular (BACnet) (All versions < V3.5.4). FTP server does not properly validate the length of the “USER” command, leading to stack-based buffer overflows. This may result in Denial-of-Service conditions and Remote Code Execution. (FSMD-2021-0010)
References
URL | Tags | |||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | APOGEE MBC (PPC) (BACnet) |
Version: All versions |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:10:30.838Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "APOGEE MBC (PPC) (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "APOGEE MBC (PPC) (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "APOGEE MEC (PPC) (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "APOGEE MEC (PPC) (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "APOGEE PXC Compact (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.4" } ] }, { "product": "APOGEE PXC Compact (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8.19" } ] }, { "product": "APOGEE PXC Modular (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.4" } ] }, { "product": "APOGEE PXC Modular (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8.19" } ] }, { "product": "Desigo PXC00-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC00-U", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC001-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC100-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC12-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC128-U", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC200-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC22-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC22.1-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC36.1-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC50-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC64-U", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXM20-E", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Nucleus NET", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "Nucleus ReadyStart V3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2017.02.4" } ] }, { "product": "Nucleus Source Code", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "TALON TC Compact (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.4" } ] }, { "product": "TALON TC Modular (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.4" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions \u003c V3.5.4), APOGEE PXC Compact (P2 Ethernet) (All versions \u003c V2.8.19), APOGEE PXC Modular (BACnet) (All versions \u003c V3.5.4), APOGEE PXC Modular (P2 Ethernet) (All versions \u003c V2.8.19), Desigo PXC00-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC00-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC001-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC100-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC12-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC128-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC200-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC22-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC22.1-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC36.1-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC50-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC64-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXM20-E (All versions \u003e= V2.3 and \u003c V6.30.016), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions \u003c V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions \u003c V3.5.4), TALON TC Modular (BACnet) (All versions \u003c V3.5.4). FTP server does not properly validate the length of the \u201cUSER\u201d command, leading to stack-based buffer overflows. This may result in Denial-of-Service conditions and Remote Code Execution. (FSMD-2021-0010)" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-170", "description": "CWE-170: Improper Null Termination", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-10T09:46:35", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2021-31886", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "APOGEE MBC (PPC) (BACnet)", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "APOGEE MBC (PPC) (P2 Ethernet)", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "APOGEE MEC (PPC) (BACnet)", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "APOGEE MEC (PPC) (P2 Ethernet)", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "APOGEE PXC Compact (BACnet)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.5.4" } ] } }, { "product_name": "APOGEE PXC Compact (P2 Ethernet)", "version": { "version_data": [ { "version_value": "All versions \u003c V2.8.19" } ] } }, { "product_name": "APOGEE PXC Modular (BACnet)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.5.4" } ] } }, { "product_name": "APOGEE PXC Modular (P2 Ethernet)", "version": { "version_data": [ { "version_value": "All versions \u003c V2.8.19" } ] } }, { "product_name": "Desigo PXC00-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC00-U", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC001-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC100-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC12-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC128-U", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC200-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC22-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC22.1-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC36.1-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC50-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC64-U", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXM20-E", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Nucleus NET", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "Nucleus ReadyStart V3", "version": { "version_data": [ { "version_value": "All versions \u003c V2017.02.4" } ] } }, { "product_name": "Nucleus Source Code", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "TALON TC Compact (BACnet)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.5.4" } ] } }, { "product_name": "TALON TC Modular (BACnet)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.5.4" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions \u003c V3.5.4), APOGEE PXC Compact (P2 Ethernet) (All versions \u003c V2.8.19), APOGEE PXC Modular (BACnet) (All versions \u003c V3.5.4), APOGEE PXC Modular (P2 Ethernet) (All versions \u003c V2.8.19), Desigo PXC00-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC00-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC001-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC100-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC12-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC128-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC200-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC22-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC22.1-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC36.1-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC50-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC64-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXM20-E (All versions \u003e= V2.3 and \u003c V6.30.016), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions \u003c V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions \u003c V3.5.4), TALON TC Modular (BACnet) (All versions \u003c V3.5.4). FTP server does not properly validate the length of the \u201cUSER\u201d command, leading to stack-based buffer overflows. This may result in Denial-of-Service conditions and Remote Code Execution. (FSMD-2021-0010)" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-170: Improper Null Termination" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-31886", "datePublished": "2021-11-09T11:31:59", "dateReserved": "2021-04-29T00:00:00", "dateUpdated": "2024-08-03T23:10:30.838Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-41533 (GCVE-0-2021-41533)
Vulnerability from cvelistv5
Published
2021-09-28 11:12
Modified
2024-08-04 03:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
A vulnerability has been identified in NX 1980 Series (All versions < V1984), Solid Edge SE2021 (All versions < SE2021MP8). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files. An attacker could leverage this vulnerability to leak information in the context of the current process (ZDI-CAN-13565).
References
URL | Tags | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Siemens | NX 1980 Series |
Version: All versions < V1984 |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:15:27.969Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1117/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-740908.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "NX 1980 Series", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V1984" } ] }, { "product": "Solid Edge SE2021", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c SE2021MP8" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in NX 1980 Series (All versions \u003c V1984), Solid Edge SE2021 (All versions \u003c SE2021MP8). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files. An attacker could leverage this vulnerability to leak information in the context of the current process (ZDI-CAN-13565)." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-09T11:32:08", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1117/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-740908.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2021-41533", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "NX 1980 Series", "version": { "version_data": [ { "version_value": "All versions \u003c V1984" } ] } }, { "product_name": "Solid Edge SE2021", "version": { "version_data": [ { "version_value": "All versions \u003c SE2021MP8" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in NX 1980 Series (All versions \u003c V1984), Solid Edge SE2021 (All versions \u003c SE2021MP8). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files. An attacker could leverage this vulnerability to leak information in the context of the current process (ZDI-CAN-13565)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-125: Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1117/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1117/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-740908.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-740908.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-41533", "datePublished": "2021-09-28T11:12:27", "dateReserved": "2021-09-21T00:00:00", "dateUpdated": "2024-08-04T03:15:27.969Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-10054 (GCVE-0-2020-10054)
Vulnerability from cvelistv5
Published
2021-11-09 11:31
Modified
2024-08-04 10:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
A vulnerability has been identified in SIMATIC RTLS Locating Manager (All versions < V2.12). The affected application does not properly handle the import of large configuration files. A local attacker could import a specially crafted file which could lead to a denial-of-service condition of the application service.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Siemens | SIMATIC RTLS Locating Manager |
Version: All versions < V2.12 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:50:57.460Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-145157.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SIMATIC RTLS Locating Manager", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.12" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SIMATIC RTLS Locating Manager (All versions \u003c V2.12). The affected application does not properly handle the import of large configuration files. A local attacker could import a specially crafted file which could lead to a denial-of-service condition of the application service." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-09T11:31:38", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-145157.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2020-10054", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SIMATIC RTLS Locating Manager", "version": { "version_data": [ { "version_value": "All versions \u003c V2.12" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SIMATIC RTLS Locating Manager (All versions \u003c V2.12). The affected application does not properly handle the import of large configuration files. A local attacker could import a specially crafted file which could lead to a denial-of-service condition of the application service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20: Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-145157.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-145157.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2020-10054", "datePublished": "2021-11-09T11:31:38", "dateReserved": "2020-03-04T00:00:00", "dateUpdated": "2024-08-04T10:50:57.460Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-37732 (GCVE-0-2021-37732)
Vulnerability from cvelistv5
Published
2021-10-12 15:12
Modified
2024-08-04 01:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- remote arbitrary command execution
Summary
A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) version(s): Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x.x: 6.5.4.18 and below; Aruba Instant 8.5.x.x: 8.5.0.11 and below; Aruba Instant 8.6.x.x: 8.6.0.6 and below; Aruba Instant 8.7.x.x: 8.7.1.0 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability.
References
URL | Tags | |||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | HPE Aruba Instant (IAP) |
Version: Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.17 and below Version: Aruba Instant 6.5.x.x: 6.5.4.18 and below Version: Aruba Instant 8.5.x.x: 8.5.0.11 and below Version: Aruba Instant 8.6.x.x: 8.6.0.6 and below Version: Aruba Instant 8.7.x.x: 8.7.1.0 and below |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:30:07.452Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HPE Aruba Instant (IAP)", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.17 and below" }, { "status": "affected", "version": "Aruba Instant 6.5.x.x: 6.5.4.18 and below" }, { "status": "affected", "version": "Aruba Instant 8.5.x.x: 8.5.0.11 and below" }, { "status": "affected", "version": "Aruba Instant 8.6.x.x: 8.6.0.6 and below" }, { "status": "affected", "version": "Aruba Instant 8.7.x.x: 8.7.1.0 and below" } ] } ], "descriptions": [ { "lang": "en", "value": "A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) version(s): Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x.x: 6.5.4.18 and below; Aruba Instant 8.5.x.x: 8.5.0.11 and below; Aruba Instant 8.6.x.x: 8.6.0.6 and below; Aruba Instant 8.7.x.x: 8.7.1.0 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "remote arbitrary command execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-09T12:06:23", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-alert@hpe.com", "ID": "CVE-2021-37732", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HPE Aruba Instant (IAP)", "version": { "version_data": [ { "version_value": "Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.17 and below" }, { "version_value": "Aruba Instant 6.5.x.x: 6.5.4.18 and below" }, { "version_value": "Aruba Instant 8.5.x.x: 8.5.0.11 and below" }, { "version_value": "Aruba Instant 8.6.x.x: 8.6.0.6 and below" }, { "version_value": "Aruba Instant 8.7.x.x: 8.7.1.0 and below" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) version(s): Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x.x: 6.5.4.18 and below; Aruba Instant 8.5.x.x: 8.5.0.11 and below; Aruba Instant 8.6.x.x: 8.6.0.6 and below; Aruba Instant 8.7.x.x: 8.7.1.0 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "remote arbitrary command execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt", "refsource": "MISC", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2021-37732", "datePublished": "2021-10-12T15:12:55", "dateReserved": "2021-07-29T00:00:00", "dateUpdated": "2024-08-04T01:30:07.452Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-41534 (GCVE-0-2021-41534)
Vulnerability from cvelistv5
Published
2021-09-28 11:12
Modified
2024-08-04 03:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
A vulnerability has been identified in NX 1980 Series (All versions < V1984), Solid Edge SE2021 (All versions < SE2021MP8). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files. An attacker could leverage this vulnerability to leak information in the context of the current process (ZDI-CAN-13703).
References
URL | Tags | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Siemens | NX 1980 Series |
Version: All versions < V1984 |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:15:28.536Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-740908.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1118/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "NX 1980 Series", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V1984" } ] }, { "product": "Solid Edge SE2021", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c SE2021MP8" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in NX 1980 Series (All versions \u003c V1984), Solid Edge SE2021 (All versions \u003c SE2021MP8). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files. An attacker could leverage this vulnerability to leak information in the context of the current process (ZDI-CAN-13703)." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-09T11:32:10", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-740908.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1118/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2021-41534", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "NX 1980 Series", "version": { "version_data": [ { "version_value": "All versions \u003c V1984" } ] } }, { "product_name": "Solid Edge SE2021", "version": { "version_data": [ { "version_value": "All versions \u003c SE2021MP8" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in NX 1980 Series (All versions \u003c V1984), Solid Edge SE2021 (All versions \u003c SE2021MP8). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files. An attacker could leverage this vulnerability to leak information in the context of the current process (ZDI-CAN-13703)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-125: Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-740908.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-740908.pdf" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1118/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1118/" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-41534", "datePublished": "2021-09-28T11:12:28", "dateReserved": "2021-09-21T00:00:00", "dateUpdated": "2024-08-04T03:15:28.536Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-27009 (GCVE-0-2020-27009)
Vulnerability from cvelistv5
Published
2021-04-22 20:42
Modified
2024-08-04 16:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-823 - Use of Out-of-range Pointer Offset
Summary
A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), Nucleus NET (All versions < V5.2), Nucleus Source Code (Versions including affected DNS modules), TALON TC Compact (BACnet) (All versions < V3.5.5), TALON TC Modular (BACnet) (All versions < V3.5.5). The DNS domain name record decompression functionality does not properly validate the pointer offset values. The parsing of malformed responses could result in a write past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to execute code in the context of the current process or cause a denial-of-service condition.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | APOGEE PXC Compact (BACnet) |
Version: All versions < V3.5.5 |
|||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:03:23.236Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-185699.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "APOGEE PXC Compact (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] }, { "defaultStatus": "unknown", "product": "APOGEE PXC Compact (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8.20" } ] }, { "defaultStatus": "unknown", "product": "APOGEE PXC Modular (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] }, { "defaultStatus": "unknown", "product": "APOGEE PXC Modular (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8.20" } ] }, { "defaultStatus": "unknown", "product": "Nucleus NET", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2" } ] }, { "defaultStatus": "unknown", "product": "Nucleus Source Code", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "Versions including affected DNS modules" } ] }, { "defaultStatus": "unknown", "product": "TALON TC Compact (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] }, { "defaultStatus": "unknown", "product": "TALON TC Modular (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions \u003c V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions \u003c V2.8.20), APOGEE PXC Modular (BACnet) (All versions \u003c V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions \u003c V2.8.20), Nucleus NET (All versions \u003c V5.2), Nucleus Source Code (Versions including affected DNS modules), TALON TC Compact (BACnet) (All versions \u003c V3.5.5), TALON TC Modular (BACnet) (All versions \u003c V3.5.5). The DNS domain name record decompression functionality does not properly validate the pointer offset values. The parsing of malformed responses could result in a write past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to execute code in the context of the current process or cause a denial-of-service condition." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-823", "description": "CWE-823: Use of Out-of-range Pointer Offset", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-08T09:20:02.298Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-185699.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2020-27009", "datePublished": "2021-04-22T20:42:19", "dateReserved": "2020-10-12T00:00:00", "dateUpdated": "2024-08-04T16:03:23.236Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-31346 (GCVE-0-2021-31346)
Vulnerability from cvelistv5
Published
2021-11-09 11:31
Modified
2025-03-11 09:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1284 - Improper Validation of Specified Quantity in Input
Summary
A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), SIMOTICS CONNECT 400 (All versions < V1.0.0.0). The total length of an ICMP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on the network buffer organization in memory. (FSMD-2021-0007)
References
URL | Tags | |||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | Capital Embedded AR Classic 431-422 |
Version: 0 < * |
||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:55:53.543Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-223353.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Capital Embedded AR Classic 431-422", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Capital Embedded AR Classic R20-11", "vendor": "Siemens", "versions": [ { "lessThan": "V2303", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "PLUSCONTROL 1st Gen", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMOTICS CONNECT 400", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V0.5.0.0" } ] }, { "defaultStatus": "unknown", "product": "SIMOTICS CONNECT 400", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V1.0.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions \u003c V2303), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions \u003c V0.5.0.0), SIMOTICS CONNECT 400 (All versions \u003c V1.0.0.0). The total length of an ICMP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on the network buffer organization in memory. (FSMD-2021-0007)" } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1284", "description": "CWE-1284: Improper Validation of Specified Quantity in Input", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-11T09:47:39.488Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-223353.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-114589.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-044112.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-620288.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-845392.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-223353.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-31346", "datePublished": "2021-11-09T11:31:53", "dateReserved": "2021-04-15T00:00:00", "dateUpdated": "2025-03-11T09:47:39.488Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-25677 (GCVE-0-2021-25677)
Vulnerability from cvelistv5
Published
2021-04-22 20:42
Modified
2024-08-03 20:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-330 - Use of Insufficiently Random Values
Summary
A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (Versions including affected DNS modules), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), SIMOTICS CONNECT 400 (All versions >= V0.5.0.0 < V1.0.0.0), TALON TC Compact (BACnet) (All versions < V3.5.5), TALON TC Modular (BACnet) (All versions < V3.5.5). The DNS client does not properly randomize DNS transaction IDs. That could allow an attacker to poison the DNS cache or spoof DNS resolving.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | APOGEE PXC Compact (BACnet) |
Version: All versions < V3.5.5 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:11:28.339Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-705111.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-669158.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "APOGEE PXC Compact (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] }, { "defaultStatus": "unknown", "product": "APOGEE PXC Compact (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8.20" } ] }, { "defaultStatus": "unknown", "product": "APOGEE PXC Modular (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] }, { "defaultStatus": "unknown", "product": "APOGEE PXC Modular (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8.20" } ] }, { "defaultStatus": "unknown", "product": "Nucleus NET", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "Nucleus ReadyStart V3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2017.02.3" } ] }, { "defaultStatus": "unknown", "product": "Nucleus ReadyStart V3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2017.02.4" } ] }, { "defaultStatus": "unknown", "product": "Nucleus ReadyStart V4", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.0" } ] }, { "defaultStatus": "unknown", "product": "Nucleus Source Code", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "Versions including affected DNS modules" } ] }, { "defaultStatus": "unknown", "product": "SIMOTICS CONNECT 400", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V0.5.0.0" } ] }, { "defaultStatus": "unknown", "product": "SIMOTICS CONNECT 400", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V0.5.0.0 \u003c V1.0.0.0" } ] }, { "defaultStatus": "unknown", "product": "TALON TC Compact (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] }, { "defaultStatus": "unknown", "product": "TALON TC Modular (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions \u003c V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions \u003c V2.8.20), APOGEE PXC Modular (BACnet) (All versions \u003c V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions \u003c V2.8.20), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions \u003c V2017.02.3), Nucleus ReadyStart V3 (All versions \u003c V2017.02.4), Nucleus ReadyStart V4 (All versions \u003c V4.1.0), Nucleus Source Code (Versions including affected DNS modules), SIMOTICS CONNECT 400 (All versions \u003c V0.5.0.0), SIMOTICS CONNECT 400 (All versions \u003e= V0.5.0.0 \u003c V1.0.0.0), TALON TC Compact (BACnet) (All versions \u003c V3.5.5), TALON TC Modular (BACnet) (All versions \u003c V3.5.5). The DNS client does not properly randomize DNS transaction IDs. That could allow an attacker to poison the DNS cache or spoof DNS resolving." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-330", "description": "CWE-330: Use of Insufficiently Random Values", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-08T09:20:07.625Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-705111.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-669158.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-25677", "datePublished": "2021-04-22T20:42:21", "dateReserved": "2021-01-21T00:00:00", "dateUpdated": "2024-08-03T20:11:28.339Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-37734 (GCVE-0-2021-37734)
Vulnerability from cvelistv5
Published
2021-10-12 15:16
Modified
2024-08-04 01:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- remote unauthorized read access to files
Summary
A remote unauthorized read access to files vulnerability was discovered in Aruba Instant version(s): 6.4.x.x: 6.4.4.8-4.2.4.18 and below; Aruba Instant 6.5.x.x: 6.5.4.19 and below; Aruba Instant 8.5.x.x: 8.5.0.12 and below; Aruba Instant 8.6.x.x: 8.6.0.11 and below; Aruba Instant 8.7.x.x: 8.7.1.3 and below; Aruba Instant 8.8.x.x: 8.8.0.0 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability.
References
URL | Tags | |||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | HPE Aruba Instant (IAP) |
Version: Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.18 and below Version: Aruba Instant 6.5.x.x: 6.5.4.19 and below Version: Aruba Instant 8.5.x.x: 8.5.0.12 and below Version: Aruba Instant 8.6.x.x: 8.6.0.11 and below Version: Aruba Instant 8.7.x.x: 8.7.1.3 and below Version: Aruba Instant 8.8.x.x: 8.8.0.0 and below |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:30:08.213Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HPE Aruba Instant (IAP)", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.18 and below" }, { "status": "affected", "version": "Aruba Instant 6.5.x.x: 6.5.4.19 and below" }, { "status": "affected", "version": "Aruba Instant 8.5.x.x: 8.5.0.12 and below" }, { "status": "affected", "version": "Aruba Instant 8.6.x.x: 8.6.0.11 and below" }, { "status": "affected", "version": "Aruba Instant 8.7.x.x: 8.7.1.3 and below" }, { "status": "affected", "version": "Aruba Instant 8.8.x.x: 8.8.0.0 and below" } ] } ], "descriptions": [ { "lang": "en", "value": "A remote unauthorized read access to files vulnerability was discovered in Aruba Instant version(s): 6.4.x.x: 6.4.4.8-4.2.4.18 and below; Aruba Instant 6.5.x.x: 6.5.4.19 and below; Aruba Instant 8.5.x.x: 8.5.0.12 and below; Aruba Instant 8.6.x.x: 8.6.0.11 and below; Aruba Instant 8.7.x.x: 8.7.1.3 and below; Aruba Instant 8.8.x.x: 8.8.0.0 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "remote unauthorized read access to files", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-09T12:06:21", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-alert@hpe.com", "ID": "CVE-2021-37734", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HPE Aruba Instant (IAP)", "version": { "version_data": [ { "version_value": "Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.18 and below" }, { "version_value": "Aruba Instant 6.5.x.x: 6.5.4.19 and below" }, { "version_value": "Aruba Instant 8.5.x.x: 8.5.0.12 and below" }, { "version_value": "Aruba Instant 8.6.x.x: 8.6.0.11 and below" }, { "version_value": "Aruba Instant 8.7.x.x: 8.7.1.3 and below" }, { "version_value": "Aruba Instant 8.8.x.x: 8.8.0.0 and below" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A remote unauthorized read access to files vulnerability was discovered in Aruba Instant version(s): 6.4.x.x: 6.4.4.8-4.2.4.18 and below; Aruba Instant 6.5.x.x: 6.5.4.19 and below; Aruba Instant 8.5.x.x: 8.5.0.12 and below; Aruba Instant 8.6.x.x: 8.6.0.11 and below; Aruba Instant 8.7.x.x: 8.7.1.3 and below; Aruba Instant 8.8.x.x: 8.8.0.0 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "remote unauthorized read access to files" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt", "refsource": "MISC", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2021-37734", "datePublished": "2021-10-12T15:16:28", "dateReserved": "2021-07-29T00:00:00", "dateUpdated": "2024-08-04T01:30:08.213Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-31889 (GCVE-0-2021-31889)
Vulnerability from cvelistv5
Published
2021-11-09 11:32
Modified
2025-03-11 09:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-191 - Integer Underflow (Wrap or Wraparound)
Summary
A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions < V0.5.0.0). Malformed TCP packets with a corrupted SACK option leads to Information Leaks and Denial-of-Service conditions. (FSMD-2021-0015)
References
URL | Tags | |||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | Capital Embedded AR Classic 431-422 |
Version: 0 < * |
|||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:10:30.703Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-223353.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Capital Embedded AR Classic 431-422", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Capital Embedded AR Classic R20-11", "vendor": "Siemens", "versions": [ { "lessThan": "V2303", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "PLUSCONTROL 1st Gen", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMOTICS CONNECT 400", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V0.5.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions \u003c V2303), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions \u003c V0.5.0.0). Malformed TCP packets with a corrupted SACK option leads to Information Leaks and Denial-of-Service conditions. (FSMD-2021-0015)" } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-191", "description": "CWE-191: Integer Underflow (Wrap or Wraparound)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-11T09:47:45.226Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-223353.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-114589.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-044112.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-620288.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-845392.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-223353.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-31889", "datePublished": "2021-11-09T11:32:01", "dateReserved": "2021-04-29T00:00:00", "dateUpdated": "2025-03-11T09:47:45.226Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-40359 (GCVE-0-2021-40359)
Vulnerability from cvelistv5
Published
2021-11-09 11:32
Modified
2024-08-04 02:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
A vulnerability has been identified in OpenPCS 7 V8.2 (All versions), OpenPCS 7 V9.0 (All versions < V9.0 Upd4), OpenPCS 7 V9.1 (All versions), SIMATIC BATCH V8.2 (All versions), SIMATIC BATCH V9.0 (All versions), SIMATIC BATCH V9.1 (All versions), SIMATIC NET PC Software V14 (All versions), SIMATIC NET PC Software V15 (All versions), SIMATIC NET PC Software V16 (All versions < V16 Update 6), SIMATIC NET PC Software V17 (All versions < V17 SP1), SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3 UC04), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC Route Control V8.2 (All versions), SIMATIC Route Control V9.0 (All versions), SIMATIC Route Control V9.1 (All versions), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 5). When downloading files, the affected systems do not properly neutralize special elements within the pathname. An attacker could then cause the pathname to resolve to a location outside of the restricted directory on the server and read unexpected critical files.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | OpenPCS 7 V8.2 |
Version: All versions |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:44:09.625Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-840188.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "OpenPCS 7 V8.2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "OpenPCS 7 V9.0", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V9.0 Upd4" } ] }, { "defaultStatus": "unknown", "product": "OpenPCS 7 V9.1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC BATCH V8.2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC BATCH V9.0", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC BATCH V9.1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC NET PC Software V14", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC NET PC Software V15", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC NET PC Software V16", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V16 Update 6" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC NET PC Software V17", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V17 SP1" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC PCS 7 V8.2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC PCS 7 V9.0", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V9.0 SP3 UC04" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC PCS 7 V9.1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V9.1 SP1" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC Route Control V8.2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC Route Control V9.0", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC Route Control V9.1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC WinCC V15 and earlier", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V15 SP1 Update 7" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC WinCC V16", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V16 Update 5" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC WinCC V17", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V17 Update 2" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC WinCC V7.4", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.4 SP1 Update 19" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC WinCC V7.5", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.5 SP2 Update 5" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in OpenPCS 7 V8.2 (All versions), OpenPCS 7 V9.0 (All versions \u003c V9.0 Upd4), OpenPCS 7 V9.1 (All versions), SIMATIC BATCH V8.2 (All versions), SIMATIC BATCH V9.0 (All versions), SIMATIC BATCH V9.1 (All versions), SIMATIC NET PC Software V14 (All versions), SIMATIC NET PC Software V15 (All versions), SIMATIC NET PC Software V16 (All versions \u003c V16 Update 6), SIMATIC NET PC Software V17 (All versions \u003c V17 SP1), SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions \u003c V9.0 SP3 UC04), SIMATIC PCS 7 V9.1 (All versions \u003c V9.1 SP1), SIMATIC Route Control V8.2 (All versions), SIMATIC Route Control V9.0 (All versions), SIMATIC Route Control V9.1 (All versions), SIMATIC WinCC V15 and earlier (All versions \u003c V15 SP1 Update 7), SIMATIC WinCC V16 (All versions \u003c V16 Update 5), SIMATIC WinCC V17 (All versions \u003c V17 Update 2), SIMATIC WinCC V7.4 (All versions \u003c V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions \u003c V7.5 SP2 Update 5). When downloading files, the affected systems do not properly neutralize special elements within the pathname. An attacker could then cause the pathname to resolve to a location outside of the restricted directory on the server and read unexpected critical files." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-11T09:01:59.282Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-840188.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-40359", "datePublished": "2021-11-09T11:32:05", "dateReserved": "2021-09-01T00:00:00", "dateUpdated": "2024-08-04T02:44:09.625Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-37207 (GCVE-0-2021-37207)
Vulnerability from cvelistv5
Published
2021-11-09 11:32
Modified
2024-08-04 01:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-732 - Incorrect Permission Assignment for Critical Resource
Summary
A vulnerability has been identified in SENTRON powermanager V3 (All versions). The affected application assigns improper access rights to a specific folder containing configuration files. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Siemens | SENTRON powermanager V3 |
Version: All versions |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:16:03.156Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-537983.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SENTRON powermanager V3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SENTRON powermanager V3 (All versions). The affected application assigns improper access rights to a specific folder containing configuration files. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732: Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-09T11:32:03", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-537983.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2021-37207", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SENTRON powermanager V3", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SENTRON powermanager V3 (All versions). The affected application assigns improper access rights to a specific folder containing configuration files. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-732: Incorrect Permission Assignment for Critical Resource" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-537983.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-537983.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-37207", "datePublished": "2021-11-09T11:32:03", "dateReserved": "2021-07-21T00:00:00", "dateUpdated": "2024-08-04T01:16:03.156Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-28388 (GCVE-0-2020-28388)
Vulnerability from cvelistv5
Published
2021-02-09 00:00
Modified
2024-08-04 16:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-342 - Predictable Exact Value from Previous Values
Summary
A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), Nucleus NET (All versions < V5.2), Nucleus ReadyStart V3 (All versions < V2012.12), Nucleus Source Code (All versions), PLUSCONTROL 1st Gen (All versions), TALON TC Compact (BACnet) (All versions < V3.5.5), TALON TC Modular (BACnet) (All versions < V3.5.5). Initial Sequence Numbers (ISNs) for TCP connections are derived from an insufficiently random source. As a result, the ISN of current and future TCP connections could be predictable. An attacker could hijack existing sessions or spoof future ones.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | APOGEE PXC Compact (BACnet) |
Version: All versions < V3.5.5 |
|||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:33:58.999Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-362164.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-344238.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-436469.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "APOGEE PXC Compact (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] }, { "defaultStatus": "unknown", "product": "APOGEE PXC Compact (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8.20" } ] }, { "defaultStatus": "unknown", "product": "APOGEE PXC Modular (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] }, { "defaultStatus": "unknown", "product": "APOGEE PXC Modular (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8.20" } ] }, { "defaultStatus": "unknown", "product": "Nucleus NET", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2" } ] }, { "defaultStatus": "unknown", "product": "Nucleus ReadyStart V3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2012.12" } ] }, { "defaultStatus": "unknown", "product": "Nucleus Source Code", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "PLUSCONTROL 1st Gen", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "TALON TC Compact (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] }, { "defaultStatus": "unknown", "product": "TALON TC Modular (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions \u003c V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions \u003c V2.8.20), APOGEE PXC Modular (BACnet) (All versions \u003c V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions \u003c V2.8.20), Nucleus NET (All versions \u003c V5.2), Nucleus ReadyStart V3 (All versions \u003c V2012.12), Nucleus Source Code (All versions), PLUSCONTROL 1st Gen (All versions), TALON TC Compact (BACnet) (All versions \u003c V3.5.5), TALON TC Modular (BACnet) (All versions \u003c V3.5.5). Initial Sequence Numbers (ISNs) for TCP connections are derived from an insufficiently random source. As a result, the ISN of current and future TCP connections could be predictable. An attacker could hijack existing sessions or spoof future ones." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-342", "description": "CWE-342: Predictable Exact Value from Previous Values", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-08T09:20:06.562Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-362164.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-344238.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-436469.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2020-28388", "datePublished": "2021-02-09T00:00:00", "dateReserved": "2020-11-10T00:00:00", "dateUpdated": "2024-08-04T16:33:58.999Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-37735 (GCVE-0-2021-37735)
Vulnerability from cvelistv5
Published
2021-10-12 15:14
Modified
2024-08-04 01:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- remote denial of service
Summary
A remote denial of service vulnerability was discovered in Aruba Instant version(s): Aruba Instant 6.5.x.x: 6.5.4.18 and below; Aruba Instant 8.5.x.x: 8.5.0.10 and below; Aruba Instant 8.6.x.x: 8.6.0.4 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability.
References
URL | Tags | |||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | HPE Aruba Instant (IAP) |
Version: Aruba Instant 6.5.x.x: 6.5.4.18 and below Version: Aruba Instant 8.5.x.x: 8.5.0.10 and below Version: Aruba Instant 8.6.x.x: 8.6.0.4 and below |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:30:07.467Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HPE Aruba Instant (IAP)", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Aruba Instant 6.5.x.x: 6.5.4.18 and below" }, { "status": "affected", "version": "Aruba Instant 8.5.x.x: 8.5.0.10 and below" }, { "status": "affected", "version": "Aruba Instant 8.6.x.x: 8.6.0.4 and below" } ] } ], "descriptions": [ { "lang": "en", "value": "A remote denial of service vulnerability was discovered in Aruba Instant version(s): Aruba Instant 6.5.x.x: 6.5.4.18 and below; Aruba Instant 8.5.x.x: 8.5.0.10 and below; Aruba Instant 8.6.x.x: 8.6.0.4 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "remote denial of service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-09T12:06:19", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-alert@hpe.com", "ID": "CVE-2021-37735", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HPE Aruba Instant (IAP)", "version": { "version_data": [ { "version_value": "Aruba Instant 6.5.x.x: 6.5.4.18 and below" }, { "version_value": "Aruba Instant 8.5.x.x: 8.5.0.10 and below" }, { "version_value": "Aruba Instant 8.6.x.x: 8.6.0.4 and below" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A remote denial of service vulnerability was discovered in Aruba Instant version(s): Aruba Instant 6.5.x.x: 6.5.4.18 and below; Aruba Instant 8.5.x.x: 8.5.0.10 and below; Aruba Instant 8.6.x.x: 8.6.0.4 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "remote denial of service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt", "refsource": "MISC", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2021-37735", "datePublished": "2021-10-12T15:14:14", "dateReserved": "2021-07-29T00:00:00", "dateUpdated": "2024-08-04T01:30:07.467Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-31884 (GCVE-0-2021-31884)
Vulnerability from cvelistv5
Published
2021-11-09 11:31
Modified
2024-08-03 23:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-170 - Improper Null Termination
Summary
A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions < V3.5.4), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.19), APOGEE PXC Modular (BACnet) (All versions < V3.5.4), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.19), Capital VSTAR (All versions with enabled Ethernet options), Desigo PXC00-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC00-U (All versions >= V2.3 and < V6.30.016), Desigo PXC001-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC100-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC12-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC128-U (All versions >= V2.3 and < V6.30.016), Desigo PXC200-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC22-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC22.1-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC36.1-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC50-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC64-U (All versions >= V2.3 and < V6.30.016), Desigo PXM20-E (All versions >= V2.3 and < V6.30.016), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions < V3.5.4), TALON TC Modular (BACnet) (All versions < V3.5.4). The DHCP client application assumes that the data supplied with the “Hostname” DHCP option is NULL terminated. In cases when global hostname variable is not defined, this may lead to Out-of-bound reads, writes, and Denial-of-service conditions. (FSMD-2021-0014)
References
URL | Tags | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | APOGEE MBC (PPC) (BACnet) |
Version: All versions |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:10:30.775Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "APOGEE MBC (PPC) (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "APOGEE MBC (PPC) (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "APOGEE MEC (PPC) (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "APOGEE MEC (PPC) (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "APOGEE PXC Compact (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.4" } ] }, { "product": "APOGEE PXC Compact (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8.19" } ] }, { "product": "APOGEE PXC Modular (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.4" } ] }, { "product": "APOGEE PXC Modular (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8.19" } ] }, { "product": "Capital VSTAR", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions with enabled Ethernet options" } ] }, { "product": "Desigo PXC00-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC00-U", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC001-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC100-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC12-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC128-U", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC200-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC22-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC22.1-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC36.1-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC50-E.D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXC64-U", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Desigo PXM20-E", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] }, { "product": "Nucleus NET", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "Nucleus ReadyStart V3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2017.02.4" } ] }, { "product": "Nucleus Source Code", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "TALON TC Compact (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.4" } ] }, { "product": "TALON TC Modular (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.4" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions \u003c V3.5.4), APOGEE PXC Compact (P2 Ethernet) (All versions \u003c V2.8.19), APOGEE PXC Modular (BACnet) (All versions \u003c V3.5.4), APOGEE PXC Modular (P2 Ethernet) (All versions \u003c V2.8.19), Capital VSTAR (All versions with enabled Ethernet options), Desigo PXC00-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC00-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC001-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC100-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC12-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC128-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC200-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC22-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC22.1-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC36.1-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC50-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC64-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXM20-E (All versions \u003e= V2.3 and \u003c V6.30.016), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions \u003c V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions \u003c V3.5.4), TALON TC Modular (BACnet) (All versions \u003c V3.5.4). The DHCP client application assumes that the data supplied with the \u201cHostname\u201d DHCP option is NULL terminated. In cases when global hostname variable is not defined, this may lead to Out-of-bound reads, writes, and Denial-of-service conditions. (FSMD-2021-0014)" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-170", "description": "CWE-170: Improper Null Termination", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-10T09:46:33", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2021-31884", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "APOGEE MBC (PPC) (BACnet)", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "APOGEE MBC (PPC) (P2 Ethernet)", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "APOGEE MEC (PPC) (BACnet)", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "APOGEE MEC (PPC) (P2 Ethernet)", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "APOGEE PXC Compact (BACnet)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.5.4" } ] } }, { "product_name": "APOGEE PXC Compact (P2 Ethernet)", "version": { "version_data": [ { "version_value": "All versions \u003c V2.8.19" } ] } }, { "product_name": "APOGEE PXC Modular (BACnet)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.5.4" } ] } }, { "product_name": "APOGEE PXC Modular (P2 Ethernet)", "version": { "version_data": [ { "version_value": "All versions \u003c V2.8.19" } ] } }, { "product_name": "Capital VSTAR", "version": { "version_data": [ { "version_value": "All versions with enabled Ethernet options" } ] } }, { "product_name": "Desigo PXC00-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC00-U", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC001-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC100-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC12-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC128-U", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC200-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC22-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC22.1-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC36.1-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC50-E.D", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXC64-U", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Desigo PXM20-E", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.3 and \u003c V6.30.016" } ] } }, { "product_name": "Nucleus NET", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "Nucleus ReadyStart V3", "version": { "version_data": [ { "version_value": "All versions \u003c V2017.02.4" } ] } }, { "product_name": "Nucleus Source Code", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "TALON TC Compact (BACnet)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.5.4" } ] } }, { "product_name": "TALON TC Modular (BACnet)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.5.4" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions \u003c V3.5.4), APOGEE PXC Compact (P2 Ethernet) (All versions \u003c V2.8.19), APOGEE PXC Modular (BACnet) (All versions \u003c V3.5.4), APOGEE PXC Modular (P2 Ethernet) (All versions \u003c V2.8.19), Capital VSTAR (All versions with enabled Ethernet options), Desigo PXC00-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC00-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC001-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC100-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC12-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC128-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC200-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC22-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC22.1-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC36.1-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC50-E.D (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXC64-U (All versions \u003e= V2.3 and \u003c V6.30.016), Desigo PXM20-E (All versions \u003e= V2.3 and \u003c V6.30.016), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions \u003c V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions \u003c V3.5.4), TALON TC Modular (BACnet) (All versions \u003c V3.5.4). The DHCP client application assumes that the data supplied with the \u201cHostname\u201d DHCP option is NULL terminated. In cases when global hostname variable is not defined, this may lead to Out-of-bound reads, writes, and Denial-of-service conditions. (FSMD-2021-0014)" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-170: Improper Null Termination" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-31884", "datePublished": "2021-11-09T11:31:57", "dateReserved": "2021-04-29T00:00:00", "dateUpdated": "2024-08-03T23:10:30.775Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-25664 (GCVE-0-2021-25664)
Vulnerability from cvelistv5
Published
2021-04-22 20:42
Modified
2025-03-11 09:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Summary
A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (All versions including affected IPv6 stack). The function that processes the Hop-by-Hop extension header in IPv6 packets and its options lacks any checks against the length field of the header, allowing attackers to put the function into an infinite loop by supplying arbitrary length values.
References
URL | Tags | |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | Capital Embedded AR Classic 431-422 |
Version: 0 < * |
|||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:11:27.513Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-248289.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-05" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-248289.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Capital Embedded AR Classic 431-422", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Capital Embedded AR Classic R20-11", "vendor": "Siemens", "versions": [ { "lessThan": "V2303", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Nucleus NET", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "Nucleus ReadyStart V3", "vendor": "Siemens", "versions": [ { "lessThan": "V2017.02.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Nucleus ReadyStart V4", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Nucleus Source Code", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions \u003c V2303), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions \u003c V2017.02.4), Nucleus ReadyStart V4 (All versions \u003c V4.1.0), Nucleus Source Code (All versions including affected IPv6 stack). The function that processes the Hop-by-Hop extension header in IPv6 packets and its options lacks any checks against the length field of the header, allowing attackers to put the function into an infinite loop by supplying arbitrary length values." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" } }, { "cvssV4_0": { "baseScore": 8.7, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "version": "4.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-835", "description": "CWE-835: Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-11T09:47:35.103Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-248289.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-05" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-248289.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-25664", "datePublished": "2021-04-22T20:42:20", "dateReserved": "2021-01-21T00:00:00", "dateUpdated": "2025-03-11T09:47:35.103Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-31344 (GCVE-0-2021-31344)
Vulnerability from cvelistv5
Published
2021-11-09 11:31
Modified
2025-03-11 09:47
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
6.9 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
6.9 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
VLAI Severity ?
EPSS score ?
CWE
- CWE-843 - Access of Resource Using Incompatible Type ('Type Confusion')
Summary
A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), SIMOTICS CONNECT 400 (All versions < V1.0.0.0). ICMP echo packets with fake IP options allow sending ICMP echo reply messages to arbitrary hosts on the network. (FSMD-2021-0004)
References
URL | Tags | |||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | Capital Embedded AR Classic 431-422 |
Version: 0 < * |
||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:55:53.529Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-223353.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Capital Embedded AR Classic 431-422", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Capital Embedded AR Classic R20-11", "vendor": "Siemens", "versions": [ { "lessThan": "V2303", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "PLUSCONTROL 1st Gen", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMOTICS CONNECT 400", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V0.5.0.0" } ] }, { "defaultStatus": "unknown", "product": "SIMOTICS CONNECT 400", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V1.0.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions \u003c V2303), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions \u003c V0.5.0.0), SIMOTICS CONNECT 400 (All versions \u003c V1.0.0.0). ICMP echo packets with fake IP options allow sending ICMP echo reply messages to arbitrary hosts on the network. (FSMD-2021-0004)" } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", "version": "4.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843: Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-11T09:47:36.591Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-223353.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-114589.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-044112.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-620288.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-845392.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-223353.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-31344", "datePublished": "2021-11-09T11:31:51", "dateReserved": "2021-04-15T00:00:00", "dateUpdated": "2025-03-11T09:47:36.591Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-40364 (GCVE-0-2021-40364)
Vulnerability from cvelistv5
Published
2021-11-09 11:32
Modified
2024-08-04 02:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-532 - Insertion of Sensitive Information into Log File
Summary
A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3 UC04), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 5). The affected systems store sensitive information in log files. An attacker with access to the log files could publicly expose the information or reuse it to develop further attacks on the system.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | SIMATIC PCS 7 V8.2 |
Version: All versions |
|||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:44:09.470Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-840188.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "SIMATIC PCS 7 V8.2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC PCS 7 V9.0", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V9.0 SP3 UC04" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC PCS 7 V9.1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V9.1 SP1" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC WinCC V15 and earlier", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V15 SP1 Update 7" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC WinCC V16", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V16 Update 5" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC WinCC V17", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V17 Update 2" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC WinCC V7.4", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.4 SP1 Update 19" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC WinCC V7.5", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.5 SP2 Update 5" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions \u003c V9.0 SP3 UC04), SIMATIC PCS 7 V9.1 (All versions \u003c V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions \u003c V15 SP1 Update 7), SIMATIC WinCC V16 (All versions \u003c V16 Update 5), SIMATIC WinCC V17 (All versions \u003c V17 Update 2), SIMATIC WinCC V7.4 (All versions \u003c V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions \u003c V7.5 SP2 Update 5). The affected systems store sensitive information in log files. An attacker with access to the log files could publicly expose the information or reuse it to develop further attacks on the system." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532: Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-11T09:02:00.354Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-840188.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-40364", "datePublished": "2021-11-09T11:32:06", "dateReserved": "2021-09-01T00:00:00", "dateUpdated": "2024-08-04T02:44:09.470Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-37727 (GCVE-0-2021-37727)
Vulnerability from cvelistv5
Published
2021-10-12 14:08
Modified
2024-08-04 01:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- remote arbitrary command execution
Summary
A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) version(s): 6.4.x.x: 6.4.4.8-4.2.4.18 and below; Aruba Instant 6.5.x.x: 6.5.4.20 and below; Aruba Instant 8.5.x.x: 8.5.0.12 and below; Aruba Instant 8.6.x.x: 8.6.0.11 and below; Aruba Instant 8.7.x.x: 8.7.1.3 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability.
References
URL | Tags | |||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | HPE Aruba Instant (IAP) |
Version: Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.18 and below Version: Aruba Instant 6.5.x.x: 6.5.4.20 and below Version: Aruba Instant 8.5.x.x: 8.5.0.12 and below Version: Aruba Instant 8.6.x.x: 8.6.0.11 and below Version: Aruba Instant 8.7.x.x: 8.7.1.3 and below |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:23:01.527Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HPE Aruba Instant (IAP)", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.18 and below" }, { "status": "affected", "version": "Aruba Instant 6.5.x.x: 6.5.4.20 and below" }, { "status": "affected", "version": "Aruba Instant 8.5.x.x: 8.5.0.12 and below" }, { "status": "affected", "version": "Aruba Instant 8.6.x.x: 8.6.0.11 and below" }, { "status": "affected", "version": "Aruba Instant 8.7.x.x: 8.7.1.3 and below" } ] } ], "descriptions": [ { "lang": "en", "value": "A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) version(s): 6.4.x.x: 6.4.4.8-4.2.4.18 and below; Aruba Instant 6.5.x.x: 6.5.4.20 and below; Aruba Instant 8.5.x.x: 8.5.0.12 and below; Aruba Instant 8.6.x.x: 8.6.0.11 and below; Aruba Instant 8.7.x.x: 8.7.1.3 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "remote arbitrary command execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-09T12:06:17", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-alert@hpe.com", "ID": "CVE-2021-37727", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HPE Aruba Instant (IAP)", "version": { "version_data": [ { "version_value": "Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.18 and below" }, { "version_value": "Aruba Instant 6.5.x.x: 6.5.4.20 and below" }, { "version_value": "Aruba Instant 8.5.x.x: 8.5.0.12 and below" }, { "version_value": "Aruba Instant 8.6.x.x: 8.6.0.11 and below" }, { "version_value": "Aruba Instant 8.7.x.x: 8.7.1.3 and below" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) version(s): 6.4.x.x: 6.4.4.8-4.2.4.18 and below; Aruba Instant 6.5.x.x: 6.5.4.20 and below; Aruba Instant 8.5.x.x: 8.5.0.12 and below; Aruba Instant 8.6.x.x: 8.6.0.11 and below; Aruba Instant 8.7.x.x: 8.7.1.3 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "remote arbitrary command execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt", "refsource": "MISC", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2021-37727", "datePublished": "2021-10-12T14:08:58", "dateReserved": "2021-07-29T00:00:00", "dateUpdated": "2024-08-04T01:23:01.527Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-42015 (GCVE-0-2021-42015)
Vulnerability from cvelistv5
Published
2021-11-09 11:32
Modified
2024-08-04 03:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-525 - Use of Web Browser Cache Containing Sensitive Information
Summary
A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.26), Mendix Applications using Mendix 8 (All versions < V8.18.12), Mendix Applications using Mendix 9 (All versions < V9.6.1). Applications built with affected versions of Mendix Studio Pro do not prevent file documents from being cached when files are opened or downloaded using a browser. This could allow a local attacker to read those documents by exploring the browser cache.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Siemens | Mendix Applications using Mendix 7 |
Version: All versions < V7.23.26 |
||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.646Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-338732.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Mendix Applications using Mendix 7", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.23.26" } ] }, { "product": "Mendix Applications using Mendix 8", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V8.18.12" } ] }, { "product": "Mendix Applications using Mendix 9", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V9.6.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions \u003c V7.23.26), Mendix Applications using Mendix 8 (All versions \u003c V8.18.12), Mendix Applications using Mendix 9 (All versions \u003c V9.6.1). Applications built with affected versions of Mendix Studio Pro do not prevent file documents from being cached when files are opened or downloaded using a browser. This could allow a local attacker to read those documents by exploring the browser cache." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-525", "description": "CWE-525: Use of Web Browser Cache Containing Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-09T11:32:14", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-338732.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2021-42015", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Mendix Applications using Mendix 7", "version": { "version_data": [ { "version_value": "All versions \u003c V7.23.26" } ] } }, { "product_name": "Mendix Applications using Mendix 8", "version": { "version_data": [ { "version_value": "All versions \u003c V8.18.12" } ] } }, { "product_name": "Mendix Applications using Mendix 9", "version": { "version_data": [ { "version_value": "All versions \u003c V9.6.1" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions \u003c V7.23.26), Mendix Applications using Mendix 8 (All versions \u003c V8.18.12), Mendix Applications using Mendix 9 (All versions \u003c V9.6.1). Applications built with affected versions of Mendix Studio Pro do not prevent file documents from being cached when files are opened or downloaded using a browser. This could allow a local attacker to read those documents by exploring the browser cache." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-525: Use of Web Browser Cache Containing Sensitive Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-338732.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-338732.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-42015", "datePublished": "2021-11-09T11:32:14", "dateReserved": "2021-10-06T00:00:00", "dateUpdated": "2024-08-04T03:22:25.646Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…