CVE-2021-27477 (GCVE-0-2021-27477)

Vulnerability from cvelistv5 – Published: 2021-07-01 12:01 – Updated: 2024-08-03 20:48
VLAI?
Summary
When JTEKT Corporation TOYOPUC PLC versions PC10G-CPU, 2PORT-EFR, Plus CPU, Plus EX, Plus EX2, Plus EFR, Plus EFR2, Plus 2P-EFR, PC10P-DP, PC10P-DP-IO, Plus BUS-EX, Nano 10GX, Nano 2ET,PC10PE, PC10PE-16/16P, PC10E, FL/ET-T-V2H, PC10B,PC10B-P, Nano CPU, PC10P, and PC10GE receive an invalid frame, the outside area of a receive buffer for FL-net are overwritten. As a result, the PLC CPU detects a system error, and the affected products stop.
Severity ?
No CVSS data available.
CWE
  • CWE-119 - IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119
Assigner
References
Impacted products
Vendor Product Version
n/a JTEKT Corporation TOYOPUC PLC Affected: The following versions of the PLC are affected: PC10G-CPU, 2PORT-EFR, Plus CPU, Plus EX, Plus EX2, Plus EFR, Plus EFR2, Plus 2P-EFR, PC10P-DP, PC10P-DP-IO, Plus BUS-EX, Nano 10GX, Nano 2ET,PC10PE, PC10PE-16/16P, PC10E, FL/ET-T-V2H, PC10B,PC10B-P, Nano CPU, PC10P, PC10GE.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:48:17.271Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-180-04"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "JTEKT Corporation TOYOPUC PLC",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "The following versions of the PLC are affected: PC10G-CPU, 2PORT-EFR, Plus CPU, Plus EX, Plus EX2, Plus EFR, Plus EFR2, Plus 2P-EFR, PC10P-DP, PC10P-DP-IO, Plus BUS-EX, Nano 10GX, Nano 2ET,PC10PE, PC10PE-16/16P, PC10E, FL/ET-T-V2H, PC10B,PC10B-P, Nano CPU, PC10P, PC10GE."
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "When JTEKT Corporation TOYOPUC PLC versions PC10G-CPU, 2PORT-EFR, Plus CPU, Plus EX, Plus EX2, Plus EFR, Plus EFR2, Plus 2P-EFR, PC10P-DP, PC10P-DP-IO, Plus BUS-EX, Nano 10GX, Nano 2ET,PC10PE, PC10PE-16/16P, PC10E, FL/ET-T-V2H, PC10B,PC10B-P, Nano CPU, PC10P, and PC10GE receive an invalid frame, the outside area of a receive buffer for FL-net are overwritten. As a result, the PLC CPU detects a system error, and the affected products stop."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-119",
              "description": "IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-07-01T12:01:36",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-180-04"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "ID": "CVE-2021-27477",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "JTEKT Corporation TOYOPUC PLC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "The following versions of the PLC are affected: PC10G-CPU, 2PORT-EFR, Plus CPU, Plus EX, Plus EX2, Plus EFR, Plus EFR2, Plus 2P-EFR, PC10P-DP, PC10P-DP-IO, Plus BUS-EX, Nano 10GX, Nano 2ET,PC10PE, PC10PE-16/16P, PC10E, FL/ET-T-V2H, PC10B,PC10B-P, Nano CPU, PC10P, PC10GE."
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "When JTEKT Corporation TOYOPUC PLC versions PC10G-CPU, 2PORT-EFR, Plus CPU, Plus EX, Plus EX2, Plus EFR, Plus EFR2, Plus 2P-EFR, PC10P-DP, PC10P-DP-IO, Plus BUS-EX, Nano 10GX, Nano 2ET,PC10PE, PC10PE-16/16P, PC10E, FL/ET-T-V2H, PC10B,PC10B-P, Nano CPU, PC10P, and PC10GE receive an invalid frame, the outside area of a receive buffer for FL-net are overwritten. As a result, the PLC CPU detects a system error, and the affected products stop."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-180-04",
              "refsource": "MISC",
              "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-180-04"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2021-27477",
    "datePublished": "2021-07-01T12:01:36",
    "dateReserved": "2021-02-19T00:00:00",
    "dateUpdated": "2024-08-03T20:48:17.271Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:jtekt:pc10g-cpu_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.91\", \"matchCriteriaId\": \"22D9DDA3-97E5-4126-A25C-B97CC4E0ECB1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:jtekt:pc10g-cpu:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC86B853-5B5B-4289-9A44-5CE055B043EE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:jtekt:2port-efr_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.50\", \"matchCriteriaId\": \"C664399E-1234-4B87-A95F-3D3EED021E7E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:jtekt:2port-efr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A13F82D-1759-4599-A976-185A13624362\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:jtekt:plus_cpu_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.11\", \"matchCriteriaId\": \"A5D1D75E-5D41-4B0E-AF16-6A23E012185F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:jtekt:plus_cpu:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D9F88F4-3DBA-4BCB-B335-792ACD46C41D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:jtekt:plus_ex_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.11\", \"matchCriteriaId\": \"F60432C2-5D24-4A00-BF0B-1E658DD7E10C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:jtekt:plus_ex:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBBBFB02-98BA-49AA-89EC-5A2A601425F8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:jtekt:plus_ex2_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.11\", \"matchCriteriaId\": \"90926718-2F18-40AB-8DB5-8D15D66D8396\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:jtekt:plus_ex2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA38A495-AF65-4819-BEBC-F23A4B8FFA0F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:jtekt:plus_efr_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.11\", \"matchCriteriaId\": \"FD733D20-E696-4713-9509-AEED02753EF0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:jtekt:plus_efr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"466211B5-2205-4C37-ABBC-0C0E089D8C27\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:jtekt:plus_efr2_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.11\", \"matchCriteriaId\": \"3EC7E293-6A02-405D-8D0F-9D28220463E1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:jtekt:plus_efr2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7AC3C38F-361E-4FF9-B7DE-06B559501DA7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:jtekt:plus_2p-efr_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.11\", \"matchCriteriaId\": \"E4791655-E74A-4095-8D8F-2C2B4503CC12\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:jtekt:plus_2p-efr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"46EBD44A-2598-4E62-8A55-A752A64EDE98\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:jtekt:pc10p-dp_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.50\", \"matchCriteriaId\": \"EE4A9827-4275-4272-9296-FFF0D9E384D4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:jtekt:pc10p-dp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0B3FDE8-3035-4C51-A182-E51644C7F5F1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:jtekt:pc10p-dp-io_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.50\", \"matchCriteriaId\": \"207AF20B-B162-4CD9-8232-889E678143FB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:jtekt:pc10p-dp-io:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7D9B4E8-78A6-437C-8F8C-8D79675BE5CB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:jtekt:plus_bus-ex_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.13\", \"matchCriteriaId\": \"3811E760-B0AD-40A0-BB1A-B62F9EE428CD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:jtekt:plus_bus-ex:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9A82BE9-F39A-47A7-9520-77AAFAA7B32A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:jtekt:nano_10gx_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.00\", \"matchCriteriaId\": \"E5A4C13D-C002-4333-8C77-F081036F76B3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:jtekt:nano_10gx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00855C73-B9ED-4FA3-BDCC-48AD3FC48FF9\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:jtekt:nano_2et_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.40\", \"matchCriteriaId\": \"60E21DE9-8377-4B68-AF43-B4B34F966D99\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:jtekt:nano_2et:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36DC1328-A8C0-4BEC-A645-542F509537F6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:jtekt:pc10pe_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.02\", \"matchCriteriaId\": \"B6233EC3-DCB8-4791-B8F1-1F5A4CE21A41\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:jtekt:pc10pe:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"100ACE3B-F022-4123-8961-EB347C42D028\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:jtekt:pc10pe-16\\\\/16p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.02\", \"matchCriteriaId\": \"991DF456-2F99-4C1C-857B-2F2EFF4683C1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:jtekt:pc10pe-16\\\\/16p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3CDA45F-6A2A-4BDF-9F0D-24EE765C6591\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:jtekt:pc10e_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.02\", \"matchCriteriaId\": \"1982B0CF-4BBB-494F-8A54-1970BC418022\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:jtekt:pc10e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3FC9555-212D-45FE-94E4-9856A6AC91D2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:jtekt:fl\\\\/et-t-v2h_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"f2.8_e1.5\", \"matchCriteriaId\": \"223BE690-BD32-48AE-8225-7EA45197136C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:jtekt:fl\\\\/et-t-v2h:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1C90F4A-1BB8-4E8F-B5E1-B3EA43D0FBE7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:jtekt:pc10b_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.11\", \"matchCriteriaId\": \"C254E232-8DD3-482F-8562-892A0571B084\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:jtekt:pc10b:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4D57AED-D31C-4105-99D8-06742DF7A75C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:jtekt:pc10b-p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.11\", \"matchCriteriaId\": \"2087D15B-0258-45E8-804A-0FD55290BBE3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:jtekt:pc10b-p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B8703AC-8F8E-42B9-AAB3-D4F47B46190E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:jtekt:nano_cpu_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.08\", \"matchCriteriaId\": \"B5EA675C-9EEF-4CA6-9D06-EF4E20FBD4D5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:jtekt:nano_cpu:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98E70744-495C-425D-A8A4-6C421B3253EE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:jtekt:pc10p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.05\", \"matchCriteriaId\": \"A5DD46C4-4756-4965-A293-174F766B409F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:jtekt:pc10p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"322AD962-FAF4-4AEE-BFC0-275AEF6F4C67\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:jtekt:pc10ge_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.04\", \"matchCriteriaId\": \"0F2ADB5C-A29F-42F9-81D8-64B4448C996A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:jtekt:pc10ge:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54CA6C5D-D9CB-4E27-AA6B-0276A7499315\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"When JTEKT Corporation TOYOPUC PLC versions PC10G-CPU, 2PORT-EFR, Plus CPU, Plus EX, Plus EX2, Plus EFR, Plus EFR2, Plus 2P-EFR, PC10P-DP, PC10P-DP-IO, Plus BUS-EX, Nano 10GX, Nano 2ET,PC10PE, PC10PE-16/16P, PC10E, FL/ET-T-V2H, PC10B,PC10B-P, Nano CPU, PC10P, and PC10GE receive an invalid frame, the outside area of a receive buffer for FL-net are overwritten. As a result, the PLC CPU detects a system error, and the affected products stop.\"}, {\"lang\": \"es\", \"value\": \"Cuando JTEKT Corporation TOYOPUC PLC versiones PC10G-CPU, 2PORT-EFR, Plus CPU, Plus EX, Plus EX2, Plus EFR, Plus EFR2, Plus 2P-EFR, PC10P-DP, PC10P-DP-IO, Plus BUS-EX, Nano 10GX, Nano 2ET,PC10PE, PC10PE-16/16P, PC10E, FL/ET-T-V2H, PC10B,PC10B-P, Nano CPU, PC10P y PC10GE reciben una trama no v\\u00e1lida, el \\u00e1rea exterior de un b\\u00fafer de recepci\\u00f3n para FL-net se sobrescribe. Como resultado, la CPU del PLC detecta un error del sistema y los productos afectados se detienen\"}]",
      "id": "CVE-2021-27477",
      "lastModified": "2024-11-21T05:58:04.313",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2021-07-01T13:15:08.003",
      "references": "[{\"url\": \"https://us-cert.cisa.gov/ics/advisories/icsa-21-180-04\", \"source\": \"ics-cert@hq.dhs.gov\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://us-cert.cisa.gov/ics/advisories/icsa-21-180-04\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}]",
      "sourceIdentifier": "ics-cert@hq.dhs.gov",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"ics-cert@hq.dhs.gov\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-787\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-27477\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2021-07-01T13:15:08.003\",\"lastModified\":\"2024-11-21T05:58:04.313\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"When JTEKT Corporation TOYOPUC PLC versions PC10G-CPU, 2PORT-EFR, Plus CPU, Plus EX, Plus EX2, Plus EFR, Plus EFR2, Plus 2P-EFR, PC10P-DP, PC10P-DP-IO, Plus BUS-EX, Nano 10GX, Nano 2ET,PC10PE, PC10PE-16/16P, PC10E, FL/ET-T-V2H, PC10B,PC10B-P, Nano CPU, PC10P, and PC10GE receive an invalid frame, the outside area of a receive buffer for FL-net are overwritten. As a result, the PLC CPU detects a system error, and the affected products stop.\"},{\"lang\":\"es\",\"value\":\"Cuando JTEKT Corporation TOYOPUC PLC versiones PC10G-CPU, 2PORT-EFR, Plus CPU, Plus EX, Plus EX2, Plus EFR, Plus EFR2, Plus 2P-EFR, PC10P-DP, PC10P-DP-IO, Plus BUS-EX, Nano 10GX, Nano 2ET,PC10PE, PC10PE-16/16P, PC10E, FL/ET-T-V2H, PC10B,PC10B-P, Nano CPU, PC10P y PC10GE reciben una trama no v\u00e1lida, el \u00e1rea exterior de un b\u00fafer de recepci\u00f3n para FL-net se sobrescribe. Como resultado, la CPU del PLC detecta un error del sistema y los productos afectados se detienen\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:jtekt:pc10g-cpu_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.91\",\"matchCriteriaId\":\"22D9DDA3-97E5-4126-A25C-B97CC4E0ECB1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:jtekt:pc10g-cpu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC86B853-5B5B-4289-9A44-5CE055B043EE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:jtekt:2port-efr_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.50\",\"matchCriteriaId\":\"C664399E-1234-4B87-A95F-3D3EED021E7E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:jtekt:2port-efr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A13F82D-1759-4599-A976-185A13624362\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:jtekt:plus_cpu_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.11\",\"matchCriteriaId\":\"A5D1D75E-5D41-4B0E-AF16-6A23E012185F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:jtekt:plus_cpu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D9F88F4-3DBA-4BCB-B335-792ACD46C41D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:jtekt:plus_ex_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.11\",\"matchCriteriaId\":\"F60432C2-5D24-4A00-BF0B-1E658DD7E10C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:jtekt:plus_ex:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBBBFB02-98BA-49AA-89EC-5A2A601425F8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:jtekt:plus_ex2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.11\",\"matchCriteriaId\":\"90926718-2F18-40AB-8DB5-8D15D66D8396\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:jtekt:plus_ex2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA38A495-AF65-4819-BEBC-F23A4B8FFA0F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:jtekt:plus_efr_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.11\",\"matchCriteriaId\":\"FD733D20-E696-4713-9509-AEED02753EF0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:jtekt:plus_efr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"466211B5-2205-4C37-ABBC-0C0E089D8C27\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:jtekt:plus_efr2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.11\",\"matchCriteriaId\":\"3EC7E293-6A02-405D-8D0F-9D28220463E1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:jtekt:plus_efr2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AC3C38F-361E-4FF9-B7DE-06B559501DA7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:jtekt:plus_2p-efr_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.11\",\"matchCriteriaId\":\"E4791655-E74A-4095-8D8F-2C2B4503CC12\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:jtekt:plus_2p-efr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46EBD44A-2598-4E62-8A55-A752A64EDE98\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:jtekt:pc10p-dp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.50\",\"matchCriteriaId\":\"EE4A9827-4275-4272-9296-FFF0D9E384D4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:jtekt:pc10p-dp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0B3FDE8-3035-4C51-A182-E51644C7F5F1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:jtekt:pc10p-dp-io_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.50\",\"matchCriteriaId\":\"207AF20B-B162-4CD9-8232-889E678143FB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:jtekt:pc10p-dp-io:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7D9B4E8-78A6-437C-8F8C-8D79675BE5CB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:jtekt:plus_bus-ex_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.13\",\"matchCriteriaId\":\"3811E760-B0AD-40A0-BB1A-B62F9EE428CD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:jtekt:plus_bus-ex:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9A82BE9-F39A-47A7-9520-77AAFAA7B32A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:jtekt:nano_10gx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.00\",\"matchCriteriaId\":\"E5A4C13D-C002-4333-8C77-F081036F76B3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:jtekt:nano_10gx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00855C73-B9ED-4FA3-BDCC-48AD3FC48FF9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:jtekt:nano_2et_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.40\",\"matchCriteriaId\":\"60E21DE9-8377-4B68-AF43-B4B34F966D99\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:jtekt:nano_2et:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36DC1328-A8C0-4BEC-A645-542F509537F6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:jtekt:pc10pe_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.02\",\"matchCriteriaId\":\"B6233EC3-DCB8-4791-B8F1-1F5A4CE21A41\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:jtekt:pc10pe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"100ACE3B-F022-4123-8961-EB347C42D028\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:jtekt:pc10pe-16\\\\/16p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.02\",\"matchCriteriaId\":\"991DF456-2F99-4C1C-857B-2F2EFF4683C1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:jtekt:pc10pe-16\\\\/16p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3CDA45F-6A2A-4BDF-9F0D-24EE765C6591\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:jtekt:pc10e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.02\",\"matchCriteriaId\":\"1982B0CF-4BBB-494F-8A54-1970BC418022\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:jtekt:pc10e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3FC9555-212D-45FE-94E4-9856A6AC91D2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:jtekt:fl\\\\/et-t-v2h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"f2.8_e1.5\",\"matchCriteriaId\":\"223BE690-BD32-48AE-8225-7EA45197136C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:jtekt:fl\\\\/et-t-v2h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1C90F4A-1BB8-4E8F-B5E1-B3EA43D0FBE7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:jtekt:pc10b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.11\",\"matchCriteriaId\":\"C254E232-8DD3-482F-8562-892A0571B084\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:jtekt:pc10b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4D57AED-D31C-4105-99D8-06742DF7A75C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:jtekt:pc10b-p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.11\",\"matchCriteriaId\":\"2087D15B-0258-45E8-804A-0FD55290BBE3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:jtekt:pc10b-p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B8703AC-8F8E-42B9-AAB3-D4F47B46190E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:jtekt:nano_cpu_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.08\",\"matchCriteriaId\":\"B5EA675C-9EEF-4CA6-9D06-EF4E20FBD4D5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:jtekt:nano_cpu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98E70744-495C-425D-A8A4-6C421B3253EE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:jtekt:pc10p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.05\",\"matchCriteriaId\":\"A5DD46C4-4756-4965-A293-174F766B409F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:jtekt:pc10p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"322AD962-FAF4-4AEE-BFC0-275AEF6F4C67\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:jtekt:pc10ge_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.04\",\"matchCriteriaId\":\"0F2ADB5C-A29F-42F9-81D8-64B4448C996A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:jtekt:pc10ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54CA6C5D-D9CB-4E27-AA6B-0276A7499315\"}]}]}],\"references\":[{\"url\":\"https://us-cert.cisa.gov/ics/advisories/icsa-21-180-04\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://us-cert.cisa.gov/ics/advisories/icsa-21-180-04\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…