CVE-2021-31345

critical

Description

A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions). The total length of an UDP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on a user-defined applications that runs on top of the UDP protocol. (FSMD-2021-0006)

References

https://www.tenable.com/cyber-exposure/2021-threat-landscape-retrospective

https://www.tenable.com/blog/nucleus13-13-vulnerabilities-found-in-siemens-nucleus-tcpip-stack

https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf

https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf

https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf

https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf

https://cert-portal.siemens.com/productcert/html/ssa-845392.html

https://cert-portal.siemens.com/productcert/html/ssa-620288.html

https://cert-portal.siemens.com/productcert/html/ssa-114589.html

https://cert-portal.siemens.com/productcert/html/ssa-044112.html

Details

Source: Mitre, NVD

Published: 2021-11-09

Updated: 2024-10-08

Risk Information

CVSS v2

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:P

Severity: Medium

CVSS v3

Base Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

Severity: Critical