Search criteria
2 vulnerabilities found for rwg1.m8 by siemens
CVE-2021-25671 (GCVE-0-2021-25671)
Vulnerability from cvelistv5 – Published: 2021-07-13 11:02 – Updated: 2024-08-03 20:11
VLAI?
Summary
A vulnerability has been identified in RWG1.M12 (All versions < V1.16.16), RWG1.M12D (All versions < V1.16.16), RWG1.M8 (All versions < V1.16.16). Sending specially crafted ARP packets to an affected device could cause a partial denial-of-service, preventing the device to operate normally. A restart is needed to restore normal operations.
Severity ?
No CVSS data available.
CWE
- CWE-770 - Allocation of Resources Without Limits or Throttling
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T20:11:28.082Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-448291.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "RWG1.M12",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All versions \u003c V1.16.16"
}
]
},
{
"product": "RWG1.M12D",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All versions \u003c V1.16.16"
}
]
},
{
"product": "RWG1.M8",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All versions \u003c V1.16.16"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in RWG1.M12 (All versions \u003c V1.16.16), RWG1.M12D (All versions \u003c V1.16.16), RWG1.M8 (All versions \u003c V1.16.16). Sending specially crafted ARP packets to an affected device could cause a partial denial-of-service, preventing the device to operate normally. A restart is needed to restore normal operations."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-770",
"description": "CWE-770: Allocation of Resources Without Limits or Throttling",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-07-13T11:02:54",
"orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"shortName": "siemens"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-448291.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2021-25671",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "RWG1.M12",
"version": {
"version_data": [
{
"version_value": "All versions \u003c V1.16.16"
}
]
}
},
{
"product_name": "RWG1.M12D",
"version": {
"version_data": [
{
"version_value": "All versions \u003c V1.16.16"
}
]
}
},
{
"product_name": "RWG1.M8",
"version": {
"version_data": [
{
"version_value": "All versions \u003c V1.16.16"
}
]
}
}
]
},
"vendor_name": "Siemens"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been identified in RWG1.M12 (All versions \u003c V1.16.16), RWG1.M12D (All versions \u003c V1.16.16), RWG1.M8 (All versions \u003c V1.16.16). Sending specially crafted ARP packets to an affected device could cause a partial denial-of-service, preventing the device to operate normally. A restart is needed to restore normal operations."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-770: Allocation of Resources Without Limits or Throttling"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-448291.pdf",
"refsource": "MISC",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-448291.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"assignerShortName": "siemens",
"cveId": "CVE-2021-25671",
"datePublished": "2021-07-13T11:02:54",
"dateReserved": "2021-01-21T00:00:00",
"dateUpdated": "2024-08-03T20:11:28.082Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-25671 (GCVE-0-2021-25671)
Vulnerability from nvd – Published: 2021-07-13 11:02 – Updated: 2024-08-03 20:11
VLAI?
Summary
A vulnerability has been identified in RWG1.M12 (All versions < V1.16.16), RWG1.M12D (All versions < V1.16.16), RWG1.M8 (All versions < V1.16.16). Sending specially crafted ARP packets to an affected device could cause a partial denial-of-service, preventing the device to operate normally. A restart is needed to restore normal operations.
Severity ?
No CVSS data available.
CWE
- CWE-770 - Allocation of Resources Without Limits or Throttling
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T20:11:28.082Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-448291.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "RWG1.M12",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All versions \u003c V1.16.16"
}
]
},
{
"product": "RWG1.M12D",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All versions \u003c V1.16.16"
}
]
},
{
"product": "RWG1.M8",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All versions \u003c V1.16.16"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in RWG1.M12 (All versions \u003c V1.16.16), RWG1.M12D (All versions \u003c V1.16.16), RWG1.M8 (All versions \u003c V1.16.16). Sending specially crafted ARP packets to an affected device could cause a partial denial-of-service, preventing the device to operate normally. A restart is needed to restore normal operations."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-770",
"description": "CWE-770: Allocation of Resources Without Limits or Throttling",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-07-13T11:02:54",
"orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"shortName": "siemens"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-448291.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2021-25671",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "RWG1.M12",
"version": {
"version_data": [
{
"version_value": "All versions \u003c V1.16.16"
}
]
}
},
{
"product_name": "RWG1.M12D",
"version": {
"version_data": [
{
"version_value": "All versions \u003c V1.16.16"
}
]
}
},
{
"product_name": "RWG1.M8",
"version": {
"version_data": [
{
"version_value": "All versions \u003c V1.16.16"
}
]
}
}
]
},
"vendor_name": "Siemens"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been identified in RWG1.M12 (All versions \u003c V1.16.16), RWG1.M12D (All versions \u003c V1.16.16), RWG1.M8 (All versions \u003c V1.16.16). Sending specially crafted ARP packets to an affected device could cause a partial denial-of-service, preventing the device to operate normally. A restart is needed to restore normal operations."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-770: Allocation of Resources Without Limits or Throttling"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-448291.pdf",
"refsource": "MISC",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-448291.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"assignerShortName": "siemens",
"cveId": "CVE-2021-25671",
"datePublished": "2021-07-13T11:02:54",
"dateReserved": "2021-01-21T00:00:00",
"dateUpdated": "2024-08-03T20:11:28.082Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}