Search criteria
3 vulnerabilities by Hilscher
CVE-2021-20988 (GCVE-0-2021-20988)
Vulnerability from cvelistv5 – Published: 2021-05-13 13:45 – Updated: 2024-09-16 17:49
VLAI?
Title
Hilscher rcX RTOS: Wrong handling of the UDP checksum
Summary
In Hilscher rcX RTOS versions prios to V2.1.14.1 the actual UDP packet length is not verified against the length indicated by the packet. This may lead to a denial of service of the affected device.
Severity ?
8.6 (High)
CWE
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Hilscher | rcX RTOS |
Affected:
unspecified , < V2.1.14.1
(custom)
|
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T17:53:23.157Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kb.hilscher.com/display/ISMS/2019-04-10+Wrong+handling+of+the+UDP+checksum"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/de-de/advisories/vde-2021-018"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "rcX RTOS",
"vendor": "Hilscher",
"versions": [
{
"lessThan": "V2.1.14.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Ethernet IO Modules ICE1-16",
"vendor": "Pepperl+Fuchs",
"versions": [
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-16DI-G60L-V1D",
"versionType": "custom"
},
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-16DIO-G60L-C1-V1D",
"versionType": "custom"
},
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-16DIO-G60L-V1D",
"versionType": "custom"
}
]
},
{
"product": "Ethernet IO Modules ICE1-8",
"vendor": "Pepperl+Fuchs",
"versions": [
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-8DI8DO-G60L-C1-V1D",
"versionType": "custom"
},
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-8DI8DO-G60L-V1D",
"versionType": "custom"
},
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-8IOL-G30L-V1D",
"versionType": "custom"
},
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-8IOL-G60L-V1D",
"versionType": "custom"
},
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-8IOL-S2-G60L-V1D",
"versionType": "custom"
}
]
}
],
"datePublic": "2021-02-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "In Hilscher rcX RTOS versions prios to V2.1.14.1 the actual UDP packet length is not verified against the length indicated by the packet. This may lead to a denial of service of the affected device."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-05-13T13:45:24",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kb.hilscher.com/display/ISMS/2019-04-10+Wrong+handling+of+the+UDP+checksum"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/de-de/advisories/vde-2021-018"
}
],
"source": {
"advisory": "vde-2021-018",
"defect": [
"vde-2021-018"
],
"discovery": "UNKNOWN"
},
"title": "Hilscher rcX RTOS: Wrong handling of the UDP checksum",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-02-15T13:00:00.000Z",
"ID": "CVE-2021-20988",
"STATE": "PUBLIC",
"TITLE": "Hilscher rcX RTOS: Wrong handling of the UDP checksum"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "rcX RTOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "V2.1.14.1"
}
]
}
}
]
},
"vendor_name": "Hilscher"
},
{
"product": {
"product_data": [
{
"product_name": "Ethernet IO Modules ICE1-16",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "ICE1-16DI-G60L-V1D",
"version_value": "F10017"
},
{
"version_affected": "\u003c=",
"version_name": "ICE1-16DIO-G60L-C1-V1D",
"version_value": "F10017"
},
{
"version_affected": "\u003c=",
"version_name": "ICE1-16DIO-G60L-V1D",
"version_value": "F10017"
}
]
}
},
{
"product_name": "Ethernet IO Modules ICE1-8",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "ICE1-8DI8DO-G60L-C1-V1D",
"version_value": "F10017"
},
{
"version_affected": "\u003c=",
"version_name": "ICE1-8DI8DO-G60L-V1D",
"version_value": "F10017"
},
{
"version_affected": "\u003c=",
"version_name": "ICE1-8IOL-G30L-V1D",
"version_value": "F10017"
},
{
"version_affected": "\u003c=",
"version_name": "ICE1-8IOL-G60L-V1D",
"version_value": "F10017"
},
{
"version_affected": "\u003c=",
"version_name": "ICE1-8IOL-S2-G60L-V1D",
"version_value": "F10017"
}
]
}
}
]
},
"vendor_name": "Pepperl+Fuchs"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Hilscher rcX RTOS versions prios to V2.1.14.1 the actual UDP packet length is not verified against the length indicated by the packet. This may lead to a denial of service of the affected device."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://kb.hilscher.com/display/ISMS/2019-04-10+Wrong+handling+of+the+UDP+checksum",
"refsource": "CONFIRM",
"url": "https://kb.hilscher.com/display/ISMS/2019-04-10+Wrong+handling+of+the+UDP+checksum"
},
{
"name": "https://cert.vde.com/de-de/advisories/vde-2021-018",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/de-de/advisories/vde-2021-018"
}
]
},
"source": {
"advisory": "vde-2021-018",
"defect": [
"vde-2021-018"
],
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-20988",
"datePublished": "2021-05-13T13:45:24.410430Z",
"dateReserved": "2020-12-17T00:00:00",
"dateUpdated": "2024-09-16T17:49:09.628Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-20987 (GCVE-0-2021-20987)
Vulnerability from cvelistv5 – Published: 2021-02-16 16:37 – Updated: 2024-09-16 16:23
VLAI?
Title
Hilscher: EtherNet/IP stack crash for specific CIP service
Summary
A denial of service and memory corruption vulnerability was found in Hilscher EtherNet/IP Core V2 prior to V2.13.0.21that may lead to code injection through network or make devices crash without recovery.
Severity ?
8.6 (High)
CWE
- CWE-787 - Out-of-bounds Write
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Hilscher | EtherNet/IP Core V2 |
Affected:
V2 , < V2.13.0.21
(custom)
|
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T17:53:23.212Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kb.hilscher.com/pages/viewpage.action?pageId=108969480"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-007"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "EtherNet/IP Core V2",
"vendor": "Hilscher",
"versions": [
{
"lessThan": "V2.13.0.21",
"status": "affected",
"version": "V2",
"versionType": "custom"
}
]
},
{
"product": "PCV/PXV/PGV",
"vendor": "Pepper+Fuchs",
"versions": [
{
"lessThanOrEqual": "V1.10.0",
"status": "affected",
"version": "PXV100-F200-B25-V1D, PXV100I-F200-B25-V1D, PCV100-F200-B25-V1D-6011-6720, PCV50-F200-B25-V1D, PCV80-F200-B25-V1D, PCV100-F200-B25-V1D-6011",
"versionType": "custom"
}
]
},
{
"product": "WCS",
"vendor": "Pepper+Fuchs",
"versions": [
{
"lessThanOrEqual": "V1.2.1",
"status": "affected",
"version": "WCS3B-LS510, WCS3B-LS510H, WCS3B-LS510D, WCS3B-LS510DH, WCS3B-LS510H-OM, WCS3B-LS510DH-OM, WCS3B-LS510D-OM, WCS3B-LS510-OM",
"versionType": "custom"
}
]
}
],
"datePublic": "2021-02-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A denial of service and memory corruption vulnerability was found in Hilscher EtherNet/IP Core V2 prior to V2.13.0.21that may lead to code injection through network or make devices crash without recovery."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-02-16T16:37:09",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kb.hilscher.com/pages/viewpage.action?pageId=108969480"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-007"
}
],
"source": {
"advisory": "vde-2021-007",
"defect": [
"vde-2021-007"
],
"discovery": "UNKNOWN"
},
"title": "Hilscher: EtherNet/IP stack crash for specific CIP service",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-02-15T13:00:00.000Z",
"ID": "CVE-2021-20987",
"STATE": "PUBLIC",
"TITLE": "Hilscher: EtherNet/IP stack crash for specific CIP service"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "EtherNet/IP Core V2",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "V2",
"version_value": "V2.13.0.21"
}
]
}
}
]
},
"vendor_name": "Hilscher"
},
{
"product": {
"product_data": [
{
"product_name": "PCV/PXV/PGV",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "PXV100-F200-B25-V1D, PXV100I-F200-B25-V1D, PCV100-F200-B25-V1D-6011-6720, PCV50-F200-B25-V1D, PCV80-F200-B25-V1D, PCV100-F200-B25-V1D-6011",
"version_value": "V1.10.0"
}
]
}
},
{
"product_name": "WCS",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "WCS3B-LS510, WCS3B-LS510H, WCS3B-LS510D, WCS3B-LS510DH, WCS3B-LS510H-OM, WCS3B-LS510DH-OM, WCS3B-LS510D-OM, WCS3B-LS510-OM",
"version_value": "V1.2.1"
}
]
}
}
]
},
"vendor_name": "Pepper+Fuchs"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A denial of service and memory corruption vulnerability was found in Hilscher EtherNet/IP Core V2 prior to V2.13.0.21that may lead to code injection through network or make devices crash without recovery."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-787 Out-of-bounds Write"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://kb.hilscher.com/pages/viewpage.action?pageId=108969480",
"refsource": "CONFIRM",
"url": "https://kb.hilscher.com/pages/viewpage.action?pageId=108969480"
},
{
"name": "https://cert.vde.com/en-us/advisories/vde-2021-007",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2021-007"
}
]
},
"source": {
"advisory": "vde-2021-007",
"defect": [
"vde-2021-007"
],
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-20987",
"datePublished": "2021-02-16T16:37:09.731457Z",
"dateReserved": "2020-12-17T00:00:00",
"dateUpdated": "2024-09-16T16:23:03.443Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-20986 (GCVE-0-2021-20986)
Vulnerability from cvelistv5 – Published: 2021-02-16 16:35 – Updated: 2024-09-16 23:46
VLAI?
Title
Hilscher: Denial of Service vulnerability in PROFINET IO Device
Summary
A Denial of Service vulnerability was found in Hilscher PROFINET IO Device V3 in versions prior to V3.14.0.7. This may lead to unexpected loss of cyclic communication or interruption of acyclic communication.
Severity ?
7.5 (High)
CWE
- CWE-787 - Out-of-bounds Write
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Hilscher | PROFINET IO Device |
Affected:
V3 , < V3.14.0.7
(custom)
|
||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T17:53:23.078Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kb.hilscher.com/display/ISMS/2020-12-03+Denial+of+Service+vulnerability+in+PROFINET+IO+Device"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-006"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "PROFINET IO Device",
"vendor": "Hilscher",
"versions": [
{
"lessThan": "V3.14.0.7",
"status": "affected",
"version": "V3",
"versionType": "custom"
}
]
},
{
"product": "PCV/PXV/PGV",
"vendor": "Pepper+Fuchs",
"versions": [
{
"lessThanOrEqual": "V2.0.0",
"status": "affected",
"version": "PGV100-F200A-B17-V1D, PGV150I-F200A-B17-V1D, PGV100-F200-B17-V1D-7477",
"versionType": "custom"
},
{
"lessThanOrEqual": "V4.2.0",
"status": "affected",
"version": "PXV100-F200-B17-V1D, PXV100-F200-B17-V1D-3636",
"versionType": "custom"
},
{
"lessThanOrEqual": "V3.2.3",
"status": "affected",
"version": "PCV80-F200-B17-V1D, PCV100-F200-B17-V1D, PCV50-F200-B17-V1D, PCV100-F200-B17-V1D-6011-6997",
"versionType": "custom"
},
{
"lessThanOrEqual": "V3.2.5",
"status": "affected",
"version": "PCV100-F200-B17-V1D-6011, PCV100-F200-B17-V1D-6011-8203",
"versionType": "custom"
}
]
},
{
"product": "PXV/PGV B28 Profisafe",
"vendor": "Pepper+Fuchs",
"versions": [
{
"lessThanOrEqual": "V1.0.3",
"status": "affected",
"version": "PXV100A-F200-B28-V1D, PXV100A-F200-B28-V1D-6011, PGV100A-F200-B28-V1D, PGV100A-F200A-B28-V1D",
"versionType": "custom"
},
{
"lessThanOrEqual": "V2.1.1",
"status": "affected",
"version": "PGV100AQ-F200A-B28-V1D, PGV100AQ-F200-B28-V1D, PXV100AQ-F200-B28-V1D, PXV100AQ-F200-B28-V1D-6011",
"versionType": "custom"
}
]
},
{
"product": "OHV",
"vendor": "Pepper+Fuchs",
"versions": [
{
"lessThanOrEqual": "V1.1.0",
"status": "affected",
"version": "OHV-F230-B17",
"versionType": "custom"
}
]
},
{
"product": "OIT",
"vendor": "Pepper+Fuchs",
"versions": [
{
"lessThanOrEqual": "V1.3.4",
"status": "affected",
"version": "OIT500-F113-B17-CB",
"versionType": "custom"
}
]
},
{
"product": "PHA",
"vendor": "Pepper+Fuchs",
"versions": [
{
"lessThanOrEqual": "V3.1.5",
"status": "affected",
"version": "PHA300-F200-B17-V1D, PHA400-F200-B17-V1D, PHA300-F200A-B17-V1D, PHA300-F200-B17-T-V1D, PHA200-F200A-B17-V1D, PHA200-F200-B17-V1D, PHA400-F200A-B17-V1D, PHA300-F200A-B17-T-V1D, PHA600-F200A-B17-V1D, PHA500-F200-B17-V1D, PHA500-F200A-B17-V1D, PHA600-F200-B17-V1D, PHA150-F200A-B17-V1D, PHA200-F200A-B17-T-V1D, PHA150-F200-B17-V1D, PHA800-F200-B17-V1D, PHA400-F200A-B17-T-V1D, PHA500-F200A-B17-T-V1D, PHA700-F200-B17-V1D",
"versionType": "custom"
}
]
},
{
"product": "WCS",
"vendor": "Pepper+Fuchs",
"versions": [
{
"lessThanOrEqual": "V3.0.0",
"status": "affected",
"version": "WCS3B-LS610, WCS3B-LS610H, WCS3B-LS610D, WCS3B-LS610DH, WCS3B-LS610H-OM, WCS3B-LS610DH-OM, WCS3B-LS610D-OM, CS3B-LS610-OM",
"versionType": "custom"
}
]
}
],
"datePublic": "2021-02-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A Denial of Service vulnerability was found in Hilscher PROFINET IO Device V3 in versions prior to V3.14.0.7. This may lead to unexpected loss of cyclic communication or interruption of acyclic communication."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-02-16T16:35:48",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kb.hilscher.com/display/ISMS/2020-12-03+Denial+of+Service+vulnerability+in+PROFINET+IO+Device"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-006"
}
],
"source": {
"advisory": "vde-2021-006",
"defect": [
"vde-2021-006"
],
"discovery": "UNKNOWN"
},
"title": "Hilscher: Denial of Service vulnerability in PROFINET IO Device",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-02-15T13:00:00.000Z",
"ID": "CVE-2021-20986",
"STATE": "PUBLIC",
"TITLE": "Hilscher: Denial of Service vulnerability in PROFINET IO Device"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "PROFINET IO Device",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "V3",
"version_value": "V3.14.0.7"
}
]
}
}
]
},
"vendor_name": "Hilscher"
},
{
"product": {
"product_data": [
{
"product_name": "PCV/PXV/PGV",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "PGV100-F200A-B17-V1D, PGV150I-F200A-B17-V1D, PGV100-F200-B17-V1D-7477",
"version_value": "V2.0.0"
},
{
"version_affected": "\u003c=",
"version_name": "PXV100-F200-B17-V1D, PXV100-F200-B17-V1D-3636",
"version_value": "V4.2.0"
},
{
"version_affected": "\u003c=",
"version_name": "PCV80-F200-B17-V1D, PCV100-F200-B17-V1D, PCV50-F200-B17-V1D, PCV100-F200-B17-V1D-6011-6997",
"version_value": "V3.2.3"
},
{
"version_affected": "\u003c=",
"version_name": "PCV100-F200-B17-V1D-6011, PCV100-F200-B17-V1D-6011-8203",
"version_value": "V3.2.5"
}
]
}
},
{
"product_name": "PXV/PGV B28 Profisafe",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "PXV100A-F200-B28-V1D, PXV100A-F200-B28-V1D-6011, PGV100A-F200-B28-V1D, PGV100A-F200A-B28-V1D",
"version_value": "V1.0.3"
},
{
"version_affected": "\u003c=",
"version_name": "PGV100AQ-F200A-B28-V1D, PGV100AQ-F200-B28-V1D, PXV100AQ-F200-B28-V1D, PXV100AQ-F200-B28-V1D-6011",
"version_value": "V2.1.1"
}
]
}
},
{
"product_name": "OHV",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "OHV-F230-B17",
"version_value": "V1.1.0"
}
]
}
},
{
"product_name": "OIT",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "OIT500-F113-B17-CB",
"version_value": "V1.3.4"
}
]
}
},
{
"product_name": "PHA",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "PHA300-F200-B17-V1D, PHA400-F200-B17-V1D, PHA300-F200A-B17-V1D, PHA300-F200-B17-T-V1D, PHA200-F200A-B17-V1D, PHA200-F200-B17-V1D, PHA400-F200A-B17-V1D, PHA300-F200A-B17-T-V1D, PHA600-F200A-B17-V1D, PHA500-F200-B17-V1D, PHA500-F200A-B17-V1D, PHA600-F200-B17-V1D, PHA150-F200A-B17-V1D, PHA200-F200A-B17-T-V1D, PHA150-F200-B17-V1D, PHA800-F200-B17-V1D, PHA400-F200A-B17-T-V1D, PHA500-F200A-B17-T-V1D, PHA700-F200-B17-V1D",
"version_value": "V3.1.5"
}
]
}
},
{
"product_name": "WCS",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "WCS3B-LS610, WCS3B-LS610H, WCS3B-LS610D, WCS3B-LS610DH, WCS3B-LS610H-OM, WCS3B-LS610DH-OM, WCS3B-LS610D-OM, CS3B-LS610-OM",
"version_value": "V3.0.0"
}
]
}
}
]
},
"vendor_name": "Pepper+Fuchs"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A Denial of Service vulnerability was found in Hilscher PROFINET IO Device V3 in versions prior to V3.14.0.7. This may lead to unexpected loss of cyclic communication or interruption of acyclic communication."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-787 Out-of-bounds Write"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://kb.hilscher.com/display/ISMS/2020-12-03+Denial+of+Service+vulnerability+in+PROFINET+IO+Device",
"refsource": "CONFIRM",
"url": "https://kb.hilscher.com/display/ISMS/2020-12-03+Denial+of+Service+vulnerability+in+PROFINET+IO+Device"
},
{
"name": "https://cert.vde.com/en-us/advisories/vde-2021-006",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2021-006"
}
]
},
"source": {
"advisory": "vde-2021-006",
"defect": [
"vde-2021-006"
],
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-20986",
"datePublished": "2021-02-16T16:35:48.460903Z",
"dateReserved": "2020-12-17T00:00:00",
"dateUpdated": "2024-09-16T23:46:42.601Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}