Search criteria
3 vulnerabilities found for ice1-16dio-g60l-c1-v1d_firmware by pepperl-fuchs
FKIE_CVE-2021-20988
Vulnerability from fkie_nvd - Published: 2021-05-13 14:15 - Updated: 2024-11-21 05:47
Severity ?
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
In Hilscher rcX RTOS versions prios to V2.1.14.1 the actual UDP packet length is not verified against the length indicated by the packet. This may lead to a denial of service of the affected device.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hilscher:rcx_rtos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "16462C1A-206D-44F9-A947-375B030FD7EB",
"versionEndExcluding": "2.1.14.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:pepperl-fuchs:ice1-16di-g60l-v1d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "384C0613-C59E-41E5-AD43-73D52B28A984",
"versionEndIncluding": "f10017",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:pepperl-fuchs:ice1-16di-g60l-v1d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "32A6F558-D110-4F54-BA21-9F06630594D0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:pepperl-fuchs:ice1-16dio-g60l-c1-v1d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DF07E378-EFE4-4FD1-BC82-D6CB8365C878",
"versionEndIncluding": "f10017",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:pepperl-fuchs:ice1-16dio-g60l-c1-v1d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "406B0617-832E-44B0-9660-53F434116748",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:pepperl-fuchs:ice1-16dio-g60l-v1d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D76A7703-75E0-4940-A764-92A71DCC2FE1",
"versionEndIncluding": "f10017",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:pepperl-fuchs:ice1-16dio-g60l-v1d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B3320FC-3FA9-4037-A857-3A2F590B6AFF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:pepperl-fuchs:ice1-8di8do-g60l-c1-v1d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B81827B2-7B2C-4A36-8BD2-426D9E87FC13",
"versionEndIncluding": "f10017",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:pepperl-fuchs:ice1-8di8do-g60l-c1-v1d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8C563D4C-35B8-492D-9293-26B0AD7EA041",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:pepperl-fuchs:ice1-8di8do-g60l-v1d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "78AAC558-9077-4EB3-89DE-05C777D333BB",
"versionEndIncluding": "f10017",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:pepperl-fuchs:ice1-8di8do-g60l-v1d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B002936-6701-4457-A09F-00F5FD5E5239",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:pepperl-fuchs:ice1-8iol-g30l-v1d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "207E6F9E-138C-4016-952B-3DC9928B94E4",
"versionEndIncluding": "f10017",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:pepperl-fuchs:ice1-8iol-g30l-v1d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB28B241-7156-460F-B4B2-24B0B79552E9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:pepperl-fuchs:ice1-8iol-g60l-v1d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA6BE065-4F27-4C21-A414-12930CB242C6",
"versionEndIncluding": "f10017",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:pepperl-fuchs:ice1-8iol-g60l-v1d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C010E7C4-3478-47B9-B43A-31D3A1F48518",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:pepperl-fuchs:ice1-8iol-s2-g60l-v1d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5BD48DD9-9F46-4761-A46C-5BB324A5D571",
"versionEndIncluding": "f10017",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:pepperl-fuchs:ice1-8iol-s2-g60l-v1d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "137D3E5C-48C4-4103-BEBF-41670B4DE44D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Hilscher rcX RTOS versions prios to V2.1.14.1 the actual UDP packet length is not verified against the length indicated by the packet. This may lead to a denial of service of the affected device."
},
{
"lang": "es",
"value": "En Hilscher rcX RTOS versiones anteriores a V2.1.14.1, la longitud real del paquete UDP no es verificado con la longitud indicada por el paquete.\u0026#xa0;Esto puede resultar a una denegaci\u00f3n de servicio del dispositivo afectado"
}
],
"id": "CVE-2021-20988",
"lastModified": "2024-11-21T05:47:20.453",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0,
"source": "info@cert.vde.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-05-13T14:15:17.897",
"references": [
{
"source": "info@cert.vde.com",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.vde.com/de-de/advisories/vde-2021-018"
},
{
"source": "info@cert.vde.com",
"tags": [
"Vendor Advisory"
],
"url": "https://kb.hilscher.com/display/ISMS/2019-04-10+Wrong+handling+of+the+UDP+checksum"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.vde.com/de-de/advisories/vde-2021-018"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://kb.hilscher.com/display/ISMS/2019-04-10+Wrong+handling+of+the+UDP+checksum"
}
],
"sourceIdentifier": "info@cert.vde.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "info@cert.vde.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2021-20988 (GCVE-0-2021-20988)
Vulnerability from cvelistv5 – Published: 2021-05-13 13:45 – Updated: 2024-09-16 17:49
VLAI?
Title
Hilscher rcX RTOS: Wrong handling of the UDP checksum
Summary
In Hilscher rcX RTOS versions prios to V2.1.14.1 the actual UDP packet length is not verified against the length indicated by the packet. This may lead to a denial of service of the affected device.
Severity ?
8.6 (High)
CWE
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Hilscher | rcX RTOS |
Affected:
unspecified , < V2.1.14.1
(custom)
|
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T17:53:23.157Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kb.hilscher.com/display/ISMS/2019-04-10+Wrong+handling+of+the+UDP+checksum"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/de-de/advisories/vde-2021-018"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "rcX RTOS",
"vendor": "Hilscher",
"versions": [
{
"lessThan": "V2.1.14.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Ethernet IO Modules ICE1-16",
"vendor": "Pepperl+Fuchs",
"versions": [
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-16DI-G60L-V1D",
"versionType": "custom"
},
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-16DIO-G60L-C1-V1D",
"versionType": "custom"
},
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-16DIO-G60L-V1D",
"versionType": "custom"
}
]
},
{
"product": "Ethernet IO Modules ICE1-8",
"vendor": "Pepperl+Fuchs",
"versions": [
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-8DI8DO-G60L-C1-V1D",
"versionType": "custom"
},
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-8DI8DO-G60L-V1D",
"versionType": "custom"
},
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-8IOL-G30L-V1D",
"versionType": "custom"
},
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-8IOL-G60L-V1D",
"versionType": "custom"
},
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-8IOL-S2-G60L-V1D",
"versionType": "custom"
}
]
}
],
"datePublic": "2021-02-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "In Hilscher rcX RTOS versions prios to V2.1.14.1 the actual UDP packet length is not verified against the length indicated by the packet. This may lead to a denial of service of the affected device."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-05-13T13:45:24",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kb.hilscher.com/display/ISMS/2019-04-10+Wrong+handling+of+the+UDP+checksum"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/de-de/advisories/vde-2021-018"
}
],
"source": {
"advisory": "vde-2021-018",
"defect": [
"vde-2021-018"
],
"discovery": "UNKNOWN"
},
"title": "Hilscher rcX RTOS: Wrong handling of the UDP checksum",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-02-15T13:00:00.000Z",
"ID": "CVE-2021-20988",
"STATE": "PUBLIC",
"TITLE": "Hilscher rcX RTOS: Wrong handling of the UDP checksum"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "rcX RTOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "V2.1.14.1"
}
]
}
}
]
},
"vendor_name": "Hilscher"
},
{
"product": {
"product_data": [
{
"product_name": "Ethernet IO Modules ICE1-16",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "ICE1-16DI-G60L-V1D",
"version_value": "F10017"
},
{
"version_affected": "\u003c=",
"version_name": "ICE1-16DIO-G60L-C1-V1D",
"version_value": "F10017"
},
{
"version_affected": "\u003c=",
"version_name": "ICE1-16DIO-G60L-V1D",
"version_value": "F10017"
}
]
}
},
{
"product_name": "Ethernet IO Modules ICE1-8",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "ICE1-8DI8DO-G60L-C1-V1D",
"version_value": "F10017"
},
{
"version_affected": "\u003c=",
"version_name": "ICE1-8DI8DO-G60L-V1D",
"version_value": "F10017"
},
{
"version_affected": "\u003c=",
"version_name": "ICE1-8IOL-G30L-V1D",
"version_value": "F10017"
},
{
"version_affected": "\u003c=",
"version_name": "ICE1-8IOL-G60L-V1D",
"version_value": "F10017"
},
{
"version_affected": "\u003c=",
"version_name": "ICE1-8IOL-S2-G60L-V1D",
"version_value": "F10017"
}
]
}
}
]
},
"vendor_name": "Pepperl+Fuchs"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Hilscher rcX RTOS versions prios to V2.1.14.1 the actual UDP packet length is not verified against the length indicated by the packet. This may lead to a denial of service of the affected device."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://kb.hilscher.com/display/ISMS/2019-04-10+Wrong+handling+of+the+UDP+checksum",
"refsource": "CONFIRM",
"url": "https://kb.hilscher.com/display/ISMS/2019-04-10+Wrong+handling+of+the+UDP+checksum"
},
{
"name": "https://cert.vde.com/de-de/advisories/vde-2021-018",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/de-de/advisories/vde-2021-018"
}
]
},
"source": {
"advisory": "vde-2021-018",
"defect": [
"vde-2021-018"
],
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-20988",
"datePublished": "2021-05-13T13:45:24.410430Z",
"dateReserved": "2020-12-17T00:00:00",
"dateUpdated": "2024-09-16T17:49:09.628Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-20988 (GCVE-0-2021-20988)
Vulnerability from nvd – Published: 2021-05-13 13:45 – Updated: 2024-09-16 17:49
VLAI?
Title
Hilscher rcX RTOS: Wrong handling of the UDP checksum
Summary
In Hilscher rcX RTOS versions prios to V2.1.14.1 the actual UDP packet length is not verified against the length indicated by the packet. This may lead to a denial of service of the affected device.
Severity ?
8.6 (High)
CWE
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Hilscher | rcX RTOS |
Affected:
unspecified , < V2.1.14.1
(custom)
|
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T17:53:23.157Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kb.hilscher.com/display/ISMS/2019-04-10+Wrong+handling+of+the+UDP+checksum"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/de-de/advisories/vde-2021-018"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "rcX RTOS",
"vendor": "Hilscher",
"versions": [
{
"lessThan": "V2.1.14.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Ethernet IO Modules ICE1-16",
"vendor": "Pepperl+Fuchs",
"versions": [
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-16DI-G60L-V1D",
"versionType": "custom"
},
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-16DIO-G60L-C1-V1D",
"versionType": "custom"
},
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-16DIO-G60L-V1D",
"versionType": "custom"
}
]
},
{
"product": "Ethernet IO Modules ICE1-8",
"vendor": "Pepperl+Fuchs",
"versions": [
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-8DI8DO-G60L-C1-V1D",
"versionType": "custom"
},
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-8DI8DO-G60L-V1D",
"versionType": "custom"
},
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-8IOL-G30L-V1D",
"versionType": "custom"
},
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-8IOL-G60L-V1D",
"versionType": "custom"
},
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-8IOL-S2-G60L-V1D",
"versionType": "custom"
}
]
}
],
"datePublic": "2021-02-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "In Hilscher rcX RTOS versions prios to V2.1.14.1 the actual UDP packet length is not verified against the length indicated by the packet. This may lead to a denial of service of the affected device."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-05-13T13:45:24",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kb.hilscher.com/display/ISMS/2019-04-10+Wrong+handling+of+the+UDP+checksum"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/de-de/advisories/vde-2021-018"
}
],
"source": {
"advisory": "vde-2021-018",
"defect": [
"vde-2021-018"
],
"discovery": "UNKNOWN"
},
"title": "Hilscher rcX RTOS: Wrong handling of the UDP checksum",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-02-15T13:00:00.000Z",
"ID": "CVE-2021-20988",
"STATE": "PUBLIC",
"TITLE": "Hilscher rcX RTOS: Wrong handling of the UDP checksum"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "rcX RTOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "V2.1.14.1"
}
]
}
}
]
},
"vendor_name": "Hilscher"
},
{
"product": {
"product_data": [
{
"product_name": "Ethernet IO Modules ICE1-16",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "ICE1-16DI-G60L-V1D",
"version_value": "F10017"
},
{
"version_affected": "\u003c=",
"version_name": "ICE1-16DIO-G60L-C1-V1D",
"version_value": "F10017"
},
{
"version_affected": "\u003c=",
"version_name": "ICE1-16DIO-G60L-V1D",
"version_value": "F10017"
}
]
}
},
{
"product_name": "Ethernet IO Modules ICE1-8",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "ICE1-8DI8DO-G60L-C1-V1D",
"version_value": "F10017"
},
{
"version_affected": "\u003c=",
"version_name": "ICE1-8DI8DO-G60L-V1D",
"version_value": "F10017"
},
{
"version_affected": "\u003c=",
"version_name": "ICE1-8IOL-G30L-V1D",
"version_value": "F10017"
},
{
"version_affected": "\u003c=",
"version_name": "ICE1-8IOL-G60L-V1D",
"version_value": "F10017"
},
{
"version_affected": "\u003c=",
"version_name": "ICE1-8IOL-S2-G60L-V1D",
"version_value": "F10017"
}
]
}
}
]
},
"vendor_name": "Pepperl+Fuchs"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Hilscher rcX RTOS versions prios to V2.1.14.1 the actual UDP packet length is not verified against the length indicated by the packet. This may lead to a denial of service of the affected device."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://kb.hilscher.com/display/ISMS/2019-04-10+Wrong+handling+of+the+UDP+checksum",
"refsource": "CONFIRM",
"url": "https://kb.hilscher.com/display/ISMS/2019-04-10+Wrong+handling+of+the+UDP+checksum"
},
{
"name": "https://cert.vde.com/de-de/advisories/vde-2021-018",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/de-de/advisories/vde-2021-018"
}
]
},
"source": {
"advisory": "vde-2021-018",
"defect": [
"vde-2021-018"
],
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-20988",
"datePublished": "2021-05-13T13:45:24.410430Z",
"dateReserved": "2020-12-17T00:00:00",
"dateUpdated": "2024-09-16T17:49:09.628Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}