CVE-2021-31345Improper Validation of Specified Quantity in Input in Siemens Capital Embedded AR Classic 431-422

Severity
9.1CRITICALNVD
CNA7.5
EPSS
1.2%
top 20.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 9
Latest updateMay 24

Description

A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions). The total length of an UDP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on a user-defined applications that runs on top of the UDP protocol. (FSMD-2021-0006)

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:HExploitability: 3.9 | Impact: 5.2

Affected Packages4 packages

🔴Vulnerability Details

3
GHSA
GHSA-f3qp-9gxf-f3c8: A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACn2022-05-24
OSV
CVE-2021-31345: In Modem UDP protocol integrated from Nucleus NET TCP/IP software, there is a possible out of bounds write due to a missing bounds check2022-01-01
CVEList
CVE-2021-31345: A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303),2021-11-09

📋Vendor Advisories

1
Android
CVE-2021-31345: Modem (Nucleus NET TCP/IP)2022-01-01
CVE-2021-31345 — Siemens vulnerability | cvebase