Refine your search
3 vulnerabilities found for by Hilscher
CVE-2021-20988 (GCVE-0-2021-20988)
Vulnerability from cvelistv5
Published
2021-05-13 13:45
Modified
2024-09-16 17:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary
In Hilscher rcX RTOS versions prios to V2.1.14.1 the actual UDP packet length is not verified against the length indicated by the packet. This may lead to a denial of service of the affected device.
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Hilscher | rcX RTOS |
Version: unspecified < V2.1.14.1 |
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T17:53:23.157Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kb.hilscher.com/display/ISMS/2019-04-10+Wrong+handling+of+the+UDP+checksum"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/de-de/advisories/vde-2021-018"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "rcX RTOS",
"vendor": "Hilscher",
"versions": [
{
"lessThan": "V2.1.14.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Ethernet IO Modules ICE1-16",
"vendor": "Pepperl+Fuchs",
"versions": [
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-16DI-G60L-V1D",
"versionType": "custom"
},
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-16DIO-G60L-C1-V1D",
"versionType": "custom"
},
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-16DIO-G60L-V1D",
"versionType": "custom"
}
]
},
{
"product": "Ethernet IO Modules ICE1-8",
"vendor": "Pepperl+Fuchs",
"versions": [
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-8DI8DO-G60L-C1-V1D",
"versionType": "custom"
},
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-8DI8DO-G60L-V1D",
"versionType": "custom"
},
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-8IOL-G30L-V1D",
"versionType": "custom"
},
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-8IOL-G60L-V1D",
"versionType": "custom"
},
{
"lessThanOrEqual": "F10017",
"status": "affected",
"version": "ICE1-8IOL-S2-G60L-V1D",
"versionType": "custom"
}
]
}
],
"datePublic": "2021-02-15T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "In Hilscher rcX RTOS versions prios to V2.1.14.1 the actual UDP packet length is not verified against the length indicated by the packet. This may lead to a denial of service of the affected device."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-05-13T13:45:24.000Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kb.hilscher.com/display/ISMS/2019-04-10+Wrong+handling+of+the+UDP+checksum"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/de-de/advisories/vde-2021-018"
}
],
"source": {
"advisory": "vde-2021-018",
"defect": [
"vde-2021-018"
],
"discovery": "UNKNOWN"
},
"title": "Hilscher rcX RTOS: Wrong handling of the UDP checksum",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-02-15T13:00:00.000Z",
"ID": "CVE-2021-20988",
"STATE": "PUBLIC",
"TITLE": "Hilscher rcX RTOS: Wrong handling of the UDP checksum"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "rcX RTOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "V2.1.14.1"
}
]
}
}
]
},
"vendor_name": "Hilscher"
},
{
"product": {
"product_data": [
{
"product_name": "Ethernet IO Modules ICE1-16",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "ICE1-16DI-G60L-V1D",
"version_value": "F10017"
},
{
"version_affected": "\u003c=",
"version_name": "ICE1-16DIO-G60L-C1-V1D",
"version_value": "F10017"
},
{
"version_affected": "\u003c=",
"version_name": "ICE1-16DIO-G60L-V1D",
"version_value": "F10017"
}
]
}
},
{
"product_name": "Ethernet IO Modules ICE1-8",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "ICE1-8DI8DO-G60L-C1-V1D",
"version_value": "F10017"
},
{
"version_affected": "\u003c=",
"version_name": "ICE1-8DI8DO-G60L-V1D",
"version_value": "F10017"
},
{
"version_affected": "\u003c=",
"version_name": "ICE1-8IOL-G30L-V1D",
"version_value": "F10017"
},
{
"version_affected": "\u003c=",
"version_name": "ICE1-8IOL-G60L-V1D",
"version_value": "F10017"
},
{
"version_affected": "\u003c=",
"version_name": "ICE1-8IOL-S2-G60L-V1D",
"version_value": "F10017"
}
]
}
}
]
},
"vendor_name": "Pepperl+Fuchs"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Hilscher rcX RTOS versions prios to V2.1.14.1 the actual UDP packet length is not verified against the length indicated by the packet. This may lead to a denial of service of the affected device."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://kb.hilscher.com/display/ISMS/2019-04-10+Wrong+handling+of+the+UDP+checksum",
"refsource": "CONFIRM",
"url": "https://kb.hilscher.com/display/ISMS/2019-04-10+Wrong+handling+of+the+UDP+checksum"
},
{
"name": "https://cert.vde.com/de-de/advisories/vde-2021-018",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/de-de/advisories/vde-2021-018"
}
]
},
"source": {
"advisory": "vde-2021-018",
"defect": [
"vde-2021-018"
],
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-20988",
"datePublished": "2021-05-13T13:45:24.410Z",
"dateReserved": "2020-12-17T00:00:00.000Z",
"dateUpdated": "2024-09-16T17:49:09.628Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-20987 (GCVE-0-2021-20987)
Vulnerability from cvelistv5
Published
2021-02-16 16:37
Modified
2024-09-16 16:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
A denial of service and memory corruption vulnerability was found in Hilscher EtherNet/IP Core V2 prior to V2.13.0.21that may lead to code injection through network or make devices crash without recovery.
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Hilscher | EtherNet/IP Core V2 |
Version: V2 < V2.13.0.21 |
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T17:53:23.212Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kb.hilscher.com/pages/viewpage.action?pageId=108969480"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-007"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "EtherNet/IP Core V2",
"vendor": "Hilscher",
"versions": [
{
"lessThan": "V2.13.0.21",
"status": "affected",
"version": "V2",
"versionType": "custom"
}
]
},
{
"product": "PCV/PXV/PGV",
"vendor": "Pepper+Fuchs",
"versions": [
{
"lessThanOrEqual": "V1.10.0",
"status": "affected",
"version": "PXV100-F200-B25-V1D, PXV100I-F200-B25-V1D, PCV100-F200-B25-V1D-6011-6720, PCV50-F200-B25-V1D, PCV80-F200-B25-V1D, PCV100-F200-B25-V1D-6011",
"versionType": "custom"
}
]
},
{
"product": "WCS",
"vendor": "Pepper+Fuchs",
"versions": [
{
"lessThanOrEqual": "V1.2.1",
"status": "affected",
"version": "WCS3B-LS510, WCS3B-LS510H, WCS3B-LS510D, WCS3B-LS510DH, WCS3B-LS510H-OM, WCS3B-LS510DH-OM, WCS3B-LS510D-OM, WCS3B-LS510-OM",
"versionType": "custom"
}
]
}
],
"datePublic": "2021-02-15T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A denial of service and memory corruption vulnerability was found in Hilscher EtherNet/IP Core V2 prior to V2.13.0.21that may lead to code injection through network or make devices crash without recovery."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-02-16T16:37:09.000Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kb.hilscher.com/pages/viewpage.action?pageId=108969480"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-007"
}
],
"source": {
"advisory": "vde-2021-007",
"defect": [
"vde-2021-007"
],
"discovery": "UNKNOWN"
},
"title": "Hilscher: EtherNet/IP stack crash for specific CIP service",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-02-15T13:00:00.000Z",
"ID": "CVE-2021-20987",
"STATE": "PUBLIC",
"TITLE": "Hilscher: EtherNet/IP stack crash for specific CIP service"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "EtherNet/IP Core V2",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "V2",
"version_value": "V2.13.0.21"
}
]
}
}
]
},
"vendor_name": "Hilscher"
},
{
"product": {
"product_data": [
{
"product_name": "PCV/PXV/PGV",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "PXV100-F200-B25-V1D, PXV100I-F200-B25-V1D, PCV100-F200-B25-V1D-6011-6720, PCV50-F200-B25-V1D, PCV80-F200-B25-V1D, PCV100-F200-B25-V1D-6011",
"version_value": "V1.10.0"
}
]
}
},
{
"product_name": "WCS",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "WCS3B-LS510, WCS3B-LS510H, WCS3B-LS510D, WCS3B-LS510DH, WCS3B-LS510H-OM, WCS3B-LS510DH-OM, WCS3B-LS510D-OM, WCS3B-LS510-OM",
"version_value": "V1.2.1"
}
]
}
}
]
},
"vendor_name": "Pepper+Fuchs"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A denial of service and memory corruption vulnerability was found in Hilscher EtherNet/IP Core V2 prior to V2.13.0.21that may lead to code injection through network or make devices crash without recovery."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-787 Out-of-bounds Write"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://kb.hilscher.com/pages/viewpage.action?pageId=108969480",
"refsource": "CONFIRM",
"url": "https://kb.hilscher.com/pages/viewpage.action?pageId=108969480"
},
{
"name": "https://cert.vde.com/en-us/advisories/vde-2021-007",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2021-007"
}
]
},
"source": {
"advisory": "vde-2021-007",
"defect": [
"vde-2021-007"
],
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-20987",
"datePublished": "2021-02-16T16:37:09.731Z",
"dateReserved": "2020-12-17T00:00:00.000Z",
"dateUpdated": "2024-09-16T16:23:03.443Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-20986 (GCVE-0-2021-20986)
Vulnerability from cvelistv5
Published
2021-02-16 16:35
Modified
2024-09-16 23:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
A Denial of Service vulnerability was found in Hilscher PROFINET IO Device V3 in versions prior to V3.14.0.7. This may lead to unexpected loss of cyclic communication or interruption of acyclic communication.
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Hilscher | PROFINET IO Device |
Version: V3 < V3.14.0.7 |
||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T17:53:23.078Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kb.hilscher.com/display/ISMS/2020-12-03+Denial+of+Service+vulnerability+in+PROFINET+IO+Device"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-006"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "PROFINET IO Device",
"vendor": "Hilscher",
"versions": [
{
"lessThan": "V3.14.0.7",
"status": "affected",
"version": "V3",
"versionType": "custom"
}
]
},
{
"product": "PCV/PXV/PGV",
"vendor": "Pepper+Fuchs",
"versions": [
{
"lessThanOrEqual": "V2.0.0",
"status": "affected",
"version": "PGV100-F200A-B17-V1D, PGV150I-F200A-B17-V1D, PGV100-F200-B17-V1D-7477",
"versionType": "custom"
},
{
"lessThanOrEqual": "V4.2.0",
"status": "affected",
"version": "PXV100-F200-B17-V1D, PXV100-F200-B17-V1D-3636",
"versionType": "custom"
},
{
"lessThanOrEqual": "V3.2.3",
"status": "affected",
"version": "PCV80-F200-B17-V1D, PCV100-F200-B17-V1D, PCV50-F200-B17-V1D, PCV100-F200-B17-V1D-6011-6997",
"versionType": "custom"
},
{
"lessThanOrEqual": "V3.2.5",
"status": "affected",
"version": "PCV100-F200-B17-V1D-6011, PCV100-F200-B17-V1D-6011-8203",
"versionType": "custom"
}
]
},
{
"product": "PXV/PGV B28 Profisafe",
"vendor": "Pepper+Fuchs",
"versions": [
{
"lessThanOrEqual": "V1.0.3",
"status": "affected",
"version": "PXV100A-F200-B28-V1D, PXV100A-F200-B28-V1D-6011, PGV100A-F200-B28-V1D, PGV100A-F200A-B28-V1D",
"versionType": "custom"
},
{
"lessThanOrEqual": "V2.1.1",
"status": "affected",
"version": "PGV100AQ-F200A-B28-V1D, PGV100AQ-F200-B28-V1D, PXV100AQ-F200-B28-V1D, PXV100AQ-F200-B28-V1D-6011",
"versionType": "custom"
}
]
},
{
"product": "OHV",
"vendor": "Pepper+Fuchs",
"versions": [
{
"lessThanOrEqual": "V1.1.0",
"status": "affected",
"version": "OHV-F230-B17",
"versionType": "custom"
}
]
},
{
"product": "OIT",
"vendor": "Pepper+Fuchs",
"versions": [
{
"lessThanOrEqual": "V1.3.4",
"status": "affected",
"version": "OIT500-F113-B17-CB",
"versionType": "custom"
}
]
},
{
"product": "PHA",
"vendor": "Pepper+Fuchs",
"versions": [
{
"lessThanOrEqual": "V3.1.5",
"status": "affected",
"version": "PHA300-F200-B17-V1D, PHA400-F200-B17-V1D, PHA300-F200A-B17-V1D, PHA300-F200-B17-T-V1D, PHA200-F200A-B17-V1D, PHA200-F200-B17-V1D, PHA400-F200A-B17-V1D, PHA300-F200A-B17-T-V1D, PHA600-F200A-B17-V1D, PHA500-F200-B17-V1D, PHA500-F200A-B17-V1D, PHA600-F200-B17-V1D, PHA150-F200A-B17-V1D, PHA200-F200A-B17-T-V1D, PHA150-F200-B17-V1D, PHA800-F200-B17-V1D, PHA400-F200A-B17-T-V1D, PHA500-F200A-B17-T-V1D, PHA700-F200-B17-V1D",
"versionType": "custom"
}
]
},
{
"product": "WCS",
"vendor": "Pepper+Fuchs",
"versions": [
{
"lessThanOrEqual": "V3.0.0",
"status": "affected",
"version": "WCS3B-LS610, WCS3B-LS610H, WCS3B-LS610D, WCS3B-LS610DH, WCS3B-LS610H-OM, WCS3B-LS610DH-OM, WCS3B-LS610D-OM, CS3B-LS610-OM",
"versionType": "custom"
}
]
}
],
"datePublic": "2021-02-15T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A Denial of Service vulnerability was found in Hilscher PROFINET IO Device V3 in versions prior to V3.14.0.7. This may lead to unexpected loss of cyclic communication or interruption of acyclic communication."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-02-16T16:35:48.000Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kb.hilscher.com/display/ISMS/2020-12-03+Denial+of+Service+vulnerability+in+PROFINET+IO+Device"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-006"
}
],
"source": {
"advisory": "vde-2021-006",
"defect": [
"vde-2021-006"
],
"discovery": "UNKNOWN"
},
"title": "Hilscher: Denial of Service vulnerability in PROFINET IO Device",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-02-15T13:00:00.000Z",
"ID": "CVE-2021-20986",
"STATE": "PUBLIC",
"TITLE": "Hilscher: Denial of Service vulnerability in PROFINET IO Device"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "PROFINET IO Device",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "V3",
"version_value": "V3.14.0.7"
}
]
}
}
]
},
"vendor_name": "Hilscher"
},
{
"product": {
"product_data": [
{
"product_name": "PCV/PXV/PGV",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "PGV100-F200A-B17-V1D, PGV150I-F200A-B17-V1D, PGV100-F200-B17-V1D-7477",
"version_value": "V2.0.0"
},
{
"version_affected": "\u003c=",
"version_name": "PXV100-F200-B17-V1D, PXV100-F200-B17-V1D-3636",
"version_value": "V4.2.0"
},
{
"version_affected": "\u003c=",
"version_name": "PCV80-F200-B17-V1D, PCV100-F200-B17-V1D, PCV50-F200-B17-V1D, PCV100-F200-B17-V1D-6011-6997",
"version_value": "V3.2.3"
},
{
"version_affected": "\u003c=",
"version_name": "PCV100-F200-B17-V1D-6011, PCV100-F200-B17-V1D-6011-8203",
"version_value": "V3.2.5"
}
]
}
},
{
"product_name": "PXV/PGV B28 Profisafe",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "PXV100A-F200-B28-V1D, PXV100A-F200-B28-V1D-6011, PGV100A-F200-B28-V1D, PGV100A-F200A-B28-V1D",
"version_value": "V1.0.3"
},
{
"version_affected": "\u003c=",
"version_name": "PGV100AQ-F200A-B28-V1D, PGV100AQ-F200-B28-V1D, PXV100AQ-F200-B28-V1D, PXV100AQ-F200-B28-V1D-6011",
"version_value": "V2.1.1"
}
]
}
},
{
"product_name": "OHV",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "OHV-F230-B17",
"version_value": "V1.1.0"
}
]
}
},
{
"product_name": "OIT",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "OIT500-F113-B17-CB",
"version_value": "V1.3.4"
}
]
}
},
{
"product_name": "PHA",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "PHA300-F200-B17-V1D, PHA400-F200-B17-V1D, PHA300-F200A-B17-V1D, PHA300-F200-B17-T-V1D, PHA200-F200A-B17-V1D, PHA200-F200-B17-V1D, PHA400-F200A-B17-V1D, PHA300-F200A-B17-T-V1D, PHA600-F200A-B17-V1D, PHA500-F200-B17-V1D, PHA500-F200A-B17-V1D, PHA600-F200-B17-V1D, PHA150-F200A-B17-V1D, PHA200-F200A-B17-T-V1D, PHA150-F200-B17-V1D, PHA800-F200-B17-V1D, PHA400-F200A-B17-T-V1D, PHA500-F200A-B17-T-V1D, PHA700-F200-B17-V1D",
"version_value": "V3.1.5"
}
]
}
},
{
"product_name": "WCS",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "WCS3B-LS610, WCS3B-LS610H, WCS3B-LS610D, WCS3B-LS610DH, WCS3B-LS610H-OM, WCS3B-LS610DH-OM, WCS3B-LS610D-OM, CS3B-LS610-OM",
"version_value": "V3.0.0"
}
]
}
}
]
},
"vendor_name": "Pepper+Fuchs"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A Denial of Service vulnerability was found in Hilscher PROFINET IO Device V3 in versions prior to V3.14.0.7. This may lead to unexpected loss of cyclic communication or interruption of acyclic communication."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-787 Out-of-bounds Write"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://kb.hilscher.com/display/ISMS/2020-12-03+Denial+of+Service+vulnerability+in+PROFINET+IO+Device",
"refsource": "CONFIRM",
"url": "https://kb.hilscher.com/display/ISMS/2020-12-03+Denial+of+Service+vulnerability+in+PROFINET+IO+Device"
},
{
"name": "https://cert.vde.com/en-us/advisories/vde-2021-006",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2021-006"
}
]
},
"source": {
"advisory": "vde-2021-006",
"defect": [
"vde-2021-006"
],
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-20986",
"datePublished": "2021-02-16T16:35:48.460Z",
"dateReserved": "2020-12-17T00:00:00.000Z",
"dateUpdated": "2024-09-16T23:46:42.601Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}