Search criteria Use full-text search for keyword queries.
Combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by dates instead of relevance.

3 vulnerabilities by hilscher

CVE-2021-20988 (GCVE-0-2021-20988)

Vulnerability from cvelistv5 – Published: 2021-05-13 13:45 – Updated: 2024-09-16 17:49
VLAI?
Title
Hilscher rcX RTOS: Wrong handling of the UDP checksum
Summary
In Hilscher rcX RTOS versions prios to V2.1.14.1 the actual UDP packet length is not verified against the length indicated by the packet. This may lead to a denial of service of the affected device.
CWE
  • CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
Assigner
Impacted products
Vendor Product Version
Hilscher rcX RTOS Affected: unspecified , < V2.1.14.1 (custom)
Create a notification for this product.
    Pepperl+Fuchs Ethernet IO Modules ICE1-16 Affected: ICE1-16DI-G60L-V1D , ≤ F10017 (custom)
Affected: ICE1-16DIO-G60L-C1-V1D , ≤ F10017 (custom)
Affected: ICE1-16DIO-G60L-V1D , ≤ F10017 (custom)
Create a notification for this product.
    Pepperl+Fuchs Ethernet IO Modules ICE1-8 Affected: ICE1-8DI8DO-G60L-C1-V1D , ≤ F10017 (custom)
Affected: ICE1-8DI8DO-G60L-V1D , ≤ F10017 (custom)
Affected: ICE1-8IOL-G30L-V1D , ≤ F10017 (custom)
Affected: ICE1-8IOL-G60L-V1D , ≤ F10017 (custom)
Affected: ICE1-8IOL-S2-G60L-V1D , ≤ F10017 (custom)
Create a notification for this product.
Date Public ?
2021-02-15 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T17:53:23.157Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://kb.hilscher.com/display/ISMS/2019-04-10+Wrong+handling+of+the+UDP+checksum"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/de-de/advisories/vde-2021-018"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "rcX RTOS",
          "vendor": "Hilscher",
          "versions": [
            {
              "lessThan": "V2.1.14.1",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Ethernet IO Modules ICE1-16",
          "vendor": "Pepperl+Fuchs",
          "versions": [
            {
              "lessThanOrEqual": "F10017",
              "status": "affected",
              "version": "ICE1-16DI-G60L-V1D",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "F10017",
              "status": "affected",
              "version": "ICE1-16DIO-G60L-C1-V1D",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "F10017",
              "status": "affected",
              "version": "ICE1-16DIO-G60L-V1D",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Ethernet IO Modules ICE1-8",
          "vendor": "Pepperl+Fuchs",
          "versions": [
            {
              "lessThanOrEqual": "F10017",
              "status": "affected",
              "version": "ICE1-8DI8DO-G60L-C1-V1D",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "F10017",
              "status": "affected",
              "version": "ICE1-8DI8DO-G60L-V1D",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "F10017",
              "status": "affected",
              "version": "ICE1-8IOL-G30L-V1D",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "F10017",
              "status": "affected",
              "version": "ICE1-8IOL-G60L-V1D",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "F10017",
              "status": "affected",
              "version": "ICE1-8IOL-S2-G60L-V1D",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-02-15T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "In Hilscher rcX RTOS versions prios to V2.1.14.1 the actual UDP packet length is not verified against the length indicated by the packet. This may lead to a denial of service of the affected device."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-119",
              "description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-05-13T13:45:24.000Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://kb.hilscher.com/display/ISMS/2019-04-10+Wrong+handling+of+the+UDP+checksum"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert.vde.com/de-de/advisories/vde-2021-018"
        }
      ],
      "source": {
        "advisory": "vde-2021-018",
        "defect": [
          "vde-2021-018"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Hilscher rcX RTOS: Wrong handling of the UDP checksum",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "info@cert.vde.com",
          "DATE_PUBLIC": "2021-02-15T13:00:00.000Z",
          "ID": "CVE-2021-20988",
          "STATE": "PUBLIC",
          "TITLE": "Hilscher rcX RTOS: Wrong handling of the UDP checksum"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "rcX RTOS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "V2.1.14.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Hilscher"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Ethernet IO Modules ICE1-16",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "ICE1-16DI-G60L-V1D",
                            "version_value": "F10017"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_name": "ICE1-16DIO-G60L-C1-V1D",
                            "version_value": "F10017"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_name": "ICE1-16DIO-G60L-V1D",
                            "version_value": "F10017"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Ethernet IO Modules ICE1-8",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "ICE1-8DI8DO-G60L-C1-V1D",
                            "version_value": "F10017"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_name": "ICE1-8DI8DO-G60L-V1D",
                            "version_value": "F10017"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_name": "ICE1-8IOL-G30L-V1D",
                            "version_value": "F10017"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_name": "ICE1-8IOL-G60L-V1D",
                            "version_value": "F10017"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_name": "ICE1-8IOL-S2-G60L-V1D",
                            "version_value": "F10017"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Pepperl+Fuchs"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Hilscher rcX RTOS versions prios to V2.1.14.1 the actual UDP packet length is not verified against the length indicated by the packet. This may lead to a denial of service of the affected device."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://kb.hilscher.com/display/ISMS/2019-04-10+Wrong+handling+of+the+UDP+checksum",
              "refsource": "CONFIRM",
              "url": "https://kb.hilscher.com/display/ISMS/2019-04-10+Wrong+handling+of+the+UDP+checksum"
            },
            {
              "name": "https://cert.vde.com/de-de/advisories/vde-2021-018",
              "refsource": "CONFIRM",
              "url": "https://cert.vde.com/de-de/advisories/vde-2021-018"
            }
          ]
        },
        "source": {
          "advisory": "vde-2021-018",
          "defect": [
            "vde-2021-018"
          ],
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2021-20988",
    "datePublished": "2021-05-13T13:45:24.410Z",
    "dateReserved": "2020-12-17T00:00:00.000Z",
    "dateUpdated": "2024-09-16T17:49:09.628Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-20987 (GCVE-0-2021-20987)

Vulnerability from cvelistv5 – Published: 2021-02-16 16:37 – Updated: 2024-09-16 16:23
VLAI?
Title
Hilscher: EtherNet/IP stack crash for specific CIP service
Summary
A denial of service and memory corruption vulnerability was found in Hilscher EtherNet/IP Core V2 prior to V2.13.0.21that may lead to code injection through network or make devices crash without recovery.
CWE
Assigner
Impacted products
Vendor Product Version
Hilscher EtherNet/IP Core V2 Affected: V2 , < V2.13.0.21 (custom)
Create a notification for this product.
    Pepper+Fuchs PCV/PXV/PGV Affected: PXV100-F200-B25-V1D, PXV100I-F200-B25-V1D, PCV100-F200-B25-V1D-6011-6720, PCV50-F200-B25-V1D, PCV80-F200-B25-V1D, PCV100-F200-B25-V1D-6011 , ≤ V1.10.0 (custom)
Create a notification for this product.
    Pepper+Fuchs WCS Affected: WCS3B-LS510, WCS3B-LS510H, WCS3B-LS510D, WCS3B-LS510DH, WCS3B-LS510H-OM, WCS3B-LS510DH-OM, WCS3B-LS510D-OM, WCS3B-LS510-OM , ≤ V1.2.1 (custom)
Create a notification for this product.
Date Public ?
2021-02-15 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T17:53:23.212Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://kb.hilscher.com/pages/viewpage.action?pageId=108969480"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en-us/advisories/vde-2021-007"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "EtherNet/IP Core V2",
          "vendor": "Hilscher",
          "versions": [
            {
              "lessThan": "V2.13.0.21",
              "status": "affected",
              "version": "V2",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "PCV/PXV/PGV",
          "vendor": "Pepper+Fuchs",
          "versions": [
            {
              "lessThanOrEqual": "V1.10.0",
              "status": "affected",
              "version": "PXV100-F200-B25-V1D, PXV100I-F200-B25-V1D, PCV100-F200-B25-V1D-6011-6720, PCV50-F200-B25-V1D, PCV80-F200-B25-V1D, PCV100-F200-B25-V1D-6011",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "WCS",
          "vendor": "Pepper+Fuchs",
          "versions": [
            {
              "lessThanOrEqual": "V1.2.1",
              "status": "affected",
              "version": "WCS3B-LS510, WCS3B-LS510H, WCS3B-LS510D, WCS3B-LS510DH, WCS3B-LS510H-OM, WCS3B-LS510DH-OM, WCS3B-LS510D-OM, WCS3B-LS510-OM",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-02-15T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A denial of service and memory corruption vulnerability was found in Hilscher EtherNet/IP Core V2 prior to V2.13.0.21that may lead to code injection through network or make devices crash without recovery."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-02-16T16:37:09.000Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://kb.hilscher.com/pages/viewpage.action?pageId=108969480"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert.vde.com/en-us/advisories/vde-2021-007"
        }
      ],
      "source": {
        "advisory": "vde-2021-007",
        "defect": [
          "vde-2021-007"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Hilscher: EtherNet/IP stack crash for specific CIP service",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "info@cert.vde.com",
          "DATE_PUBLIC": "2021-02-15T13:00:00.000Z",
          "ID": "CVE-2021-20987",
          "STATE": "PUBLIC",
          "TITLE": "Hilscher: EtherNet/IP stack crash for specific CIP service"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "EtherNet/IP Core V2",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "V2",
                            "version_value": "V2.13.0.21"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Hilscher"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "PCV/PXV/PGV",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "PXV100-F200-B25-V1D, PXV100I-F200-B25-V1D, PCV100-F200-B25-V1D-6011-6720, PCV50-F200-B25-V1D, PCV80-F200-B25-V1D, PCV100-F200-B25-V1D-6011",
                            "version_value": "V1.10.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WCS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "WCS3B-LS510, WCS3B-LS510H, WCS3B-LS510D, WCS3B-LS510DH, WCS3B-LS510H-OM, WCS3B-LS510DH-OM, WCS3B-LS510D-OM, WCS3B-LS510-OM",
                            "version_value": "V1.2.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Pepper+Fuchs"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A denial of service and memory corruption vulnerability was found in Hilscher EtherNet/IP Core V2 prior to V2.13.0.21that may lead to code injection through network or make devices crash without recovery."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-787 Out-of-bounds Write"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://kb.hilscher.com/pages/viewpage.action?pageId=108969480",
              "refsource": "CONFIRM",
              "url": "https://kb.hilscher.com/pages/viewpage.action?pageId=108969480"
            },
            {
              "name": "https://cert.vde.com/en-us/advisories/vde-2021-007",
              "refsource": "CONFIRM",
              "url": "https://cert.vde.com/en-us/advisories/vde-2021-007"
            }
          ]
        },
        "source": {
          "advisory": "vde-2021-007",
          "defect": [
            "vde-2021-007"
          ],
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2021-20987",
    "datePublished": "2021-02-16T16:37:09.731Z",
    "dateReserved": "2020-12-17T00:00:00.000Z",
    "dateUpdated": "2024-09-16T16:23:03.443Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-20986 (GCVE-0-2021-20986)

Vulnerability from cvelistv5 – Published: 2021-02-16 16:35 – Updated: 2024-09-16 23:46
VLAI?
Title
Hilscher: Denial of Service vulnerability in PROFINET IO Device
Summary
A Denial of Service vulnerability was found in Hilscher PROFINET IO Device V3 in versions prior to V3.14.0.7. This may lead to unexpected loss of cyclic communication or interruption of acyclic communication.
CWE
Assigner
Impacted products
Vendor Product Version
Hilscher PROFINET IO Device Affected: V3 , < V3.14.0.7 (custom)
Create a notification for this product.
    Pepper+Fuchs PCV/PXV/PGV Affected: PGV100-F200A-B17-V1D, PGV150I-F200A-B17-V1D, PGV100-F200-B17-V1D-7477 , ≤ V2.0.0 (custom)
Affected: PXV100-F200-B17-V1D, PXV100-F200-B17-V1D-3636 , ≤ V4.2.0 (custom)
Affected: PCV80-F200-B17-V1D, PCV100-F200-B17-V1D, PCV50-F200-B17-V1D, PCV100-F200-B17-V1D-6011-6997 , ≤ V3.2.3 (custom)
Affected: PCV100-F200-B17-V1D-6011, PCV100-F200-B17-V1D-6011-8203 , ≤ V3.2.5 (custom)
Create a notification for this product.
    Pepper+Fuchs PXV/PGV B28 Profisafe Affected: PXV100A-F200-B28-V1D, PXV100A-F200-B28-V1D-6011, PGV100A-F200-B28-V1D, PGV100A-F200A-B28-V1D , ≤ V1.0.3 (custom)
Affected: PGV100AQ-F200A-B28-V1D, PGV100AQ-F200-B28-V1D, PXV100AQ-F200-B28-V1D, PXV100AQ-F200-B28-V1D-6011 , ≤ V2.1.1 (custom)
Create a notification for this product.
    Pepper+Fuchs OHV Affected: OHV-F230-B17 , ≤ V1.1.0 (custom)
Create a notification for this product.
    Pepper+Fuchs OIT Affected: OIT500-F113-B17-CB , ≤ V1.3.4 (custom)
Create a notification for this product.
    Pepper+Fuchs PHA Affected: PHA300-F200-B17-V1D, PHA400-F200-B17-V1D, PHA300-F200A-B17-V1D, PHA300-F200-B17-T-V1D, PHA200-F200A-B17-V1D, PHA200-F200-B17-V1D, PHA400-F200A-B17-V1D, PHA300-F200A-B17-T-V1D, PHA600-F200A-B17-V1D, PHA500-F200-B17-V1D, PHA500-F200A-B17-V1D, PHA600-F200-B17-V1D, PHA150-F200A-B17-V1D, PHA200-F200A-B17-T-V1D, PHA150-F200-B17-V1D, PHA800-F200-B17-V1D, PHA400-F200A-B17-T-V1D, PHA500-F200A-B17-T-V1D, PHA700-F200-B17-V1D , ≤ V3.1.5 (custom)
Create a notification for this product.
    Pepper+Fuchs WCS Affected: WCS3B-LS610, WCS3B-LS610H, WCS3B-LS610D, WCS3B-LS610DH, WCS3B-LS610H-OM, WCS3B-LS610DH-OM, WCS3B-LS610D-OM, CS3B-LS610-OM , ≤ V3.0.0 (custom)
Create a notification for this product.
Date Public ?
2021-02-15 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T17:53:23.078Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://kb.hilscher.com/display/ISMS/2020-12-03+Denial+of+Service+vulnerability+in+PROFINET+IO+Device"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en-us/advisories/vde-2021-006"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "PROFINET IO Device",
          "vendor": "Hilscher",
          "versions": [
            {
              "lessThan": "V3.14.0.7",
              "status": "affected",
              "version": "V3",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "PCV/PXV/PGV",
          "vendor": "Pepper+Fuchs",
          "versions": [
            {
              "lessThanOrEqual": "V2.0.0",
              "status": "affected",
              "version": "PGV100-F200A-B17-V1D, PGV150I-F200A-B17-V1D, PGV100-F200-B17-V1D-7477",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "V4.2.0",
              "status": "affected",
              "version": "PXV100-F200-B17-V1D, PXV100-F200-B17-V1D-3636",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "V3.2.3",
              "status": "affected",
              "version": "PCV80-F200-B17-V1D, PCV100-F200-B17-V1D, PCV50-F200-B17-V1D, PCV100-F200-B17-V1D-6011-6997",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "V3.2.5",
              "status": "affected",
              "version": "PCV100-F200-B17-V1D-6011, PCV100-F200-B17-V1D-6011-8203",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "PXV/PGV B28 Profisafe",
          "vendor": "Pepper+Fuchs",
          "versions": [
            {
              "lessThanOrEqual": "V1.0.3",
              "status": "affected",
              "version": "PXV100A-F200-B28-V1D, PXV100A-F200-B28-V1D-6011, PGV100A-F200-B28-V1D, PGV100A-F200A-B28-V1D",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "V2.1.1",
              "status": "affected",
              "version": "PGV100AQ-F200A-B28-V1D, PGV100AQ-F200-B28-V1D, PXV100AQ-F200-B28-V1D, PXV100AQ-F200-B28-V1D-6011",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "OHV",
          "vendor": "Pepper+Fuchs",
          "versions": [
            {
              "lessThanOrEqual": "V1.1.0",
              "status": "affected",
              "version": "OHV-F230-B17",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "OIT",
          "vendor": "Pepper+Fuchs",
          "versions": [
            {
              "lessThanOrEqual": "V1.3.4",
              "status": "affected",
              "version": "OIT500-F113-B17-CB",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "PHA",
          "vendor": "Pepper+Fuchs",
          "versions": [
            {
              "lessThanOrEqual": "V3.1.5",
              "status": "affected",
              "version": "PHA300-F200-B17-V1D, PHA400-F200-B17-V1D, PHA300-F200A-B17-V1D, PHA300-F200-B17-T-V1D, PHA200-F200A-B17-V1D, PHA200-F200-B17-V1D, PHA400-F200A-B17-V1D, PHA300-F200A-B17-T-V1D, PHA600-F200A-B17-V1D, PHA500-F200-B17-V1D, PHA500-F200A-B17-V1D, PHA600-F200-B17-V1D, PHA150-F200A-B17-V1D, PHA200-F200A-B17-T-V1D, PHA150-F200-B17-V1D, PHA800-F200-B17-V1D, PHA400-F200A-B17-T-V1D, PHA500-F200A-B17-T-V1D, PHA700-F200-B17-V1D",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "WCS",
          "vendor": "Pepper+Fuchs",
          "versions": [
            {
              "lessThanOrEqual": "V3.0.0",
              "status": "affected",
              "version": "WCS3B-LS610, WCS3B-LS610H, WCS3B-LS610D, WCS3B-LS610DH, WCS3B-LS610H-OM, WCS3B-LS610DH-OM, WCS3B-LS610D-OM, CS3B-LS610-OM",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-02-15T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A Denial of Service vulnerability was found in Hilscher PROFINET IO Device V3 in versions prior to V3.14.0.7. This may lead to unexpected loss of cyclic communication or interruption of acyclic communication."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-02-16T16:35:48.000Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://kb.hilscher.com/display/ISMS/2020-12-03+Denial+of+Service+vulnerability+in+PROFINET+IO+Device"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert.vde.com/en-us/advisories/vde-2021-006"
        }
      ],
      "source": {
        "advisory": "vde-2021-006",
        "defect": [
          "vde-2021-006"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Hilscher: Denial of Service vulnerability in PROFINET IO Device",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "info@cert.vde.com",
          "DATE_PUBLIC": "2021-02-15T13:00:00.000Z",
          "ID": "CVE-2021-20986",
          "STATE": "PUBLIC",
          "TITLE": "Hilscher: Denial of Service vulnerability in PROFINET IO Device"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "PROFINET IO Device",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "V3",
                            "version_value": "V3.14.0.7"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Hilscher"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "PCV/PXV/PGV",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "PGV100-F200A-B17-V1D, PGV150I-F200A-B17-V1D, PGV100-F200-B17-V1D-7477",
                            "version_value": "V2.0.0"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_name": "PXV100-F200-B17-V1D, PXV100-F200-B17-V1D-3636",
                            "version_value": "V4.2.0"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_name": "PCV80-F200-B17-V1D, PCV100-F200-B17-V1D, PCV50-F200-B17-V1D, PCV100-F200-B17-V1D-6011-6997",
                            "version_value": "V3.2.3"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_name": "PCV100-F200-B17-V1D-6011, PCV100-F200-B17-V1D-6011-8203",
                            "version_value": "V3.2.5"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "PXV/PGV B28 Profisafe",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "PXV100A-F200-B28-V1D, PXV100A-F200-B28-V1D-6011, PGV100A-F200-B28-V1D, PGV100A-F200A-B28-V1D",
                            "version_value": "V1.0.3"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_name": "PGV100AQ-F200A-B28-V1D, PGV100AQ-F200-B28-V1D, PXV100AQ-F200-B28-V1D, PXV100AQ-F200-B28-V1D-6011",
                            "version_value": "V2.1.1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "OHV",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "OHV-F230-B17",
                            "version_value": "V1.1.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "OIT",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "OIT500-F113-B17-CB",
                            "version_value": "V1.3.4"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "PHA",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "PHA300-F200-B17-V1D, PHA400-F200-B17-V1D, PHA300-F200A-B17-V1D, PHA300-F200-B17-T-V1D, PHA200-F200A-B17-V1D, PHA200-F200-B17-V1D, PHA400-F200A-B17-V1D, PHA300-F200A-B17-T-V1D, PHA600-F200A-B17-V1D, PHA500-F200-B17-V1D, PHA500-F200A-B17-V1D, PHA600-F200-B17-V1D, PHA150-F200A-B17-V1D, PHA200-F200A-B17-T-V1D, PHA150-F200-B17-V1D, PHA800-F200-B17-V1D, PHA400-F200A-B17-T-V1D, PHA500-F200A-B17-T-V1D, PHA700-F200-B17-V1D",
                            "version_value": "V3.1.5"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WCS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "WCS3B-LS610, WCS3B-LS610H, WCS3B-LS610D, WCS3B-LS610DH, WCS3B-LS610H-OM, WCS3B-LS610DH-OM, WCS3B-LS610D-OM, CS3B-LS610-OM",
                            "version_value": "V3.0.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Pepper+Fuchs"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A Denial of Service vulnerability was found in Hilscher PROFINET IO Device V3 in versions prior to V3.14.0.7. This may lead to unexpected loss of cyclic communication or interruption of acyclic communication."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-787 Out-of-bounds Write"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://kb.hilscher.com/display/ISMS/2020-12-03+Denial+of+Service+vulnerability+in+PROFINET+IO+Device",
              "refsource": "CONFIRM",
              "url": "https://kb.hilscher.com/display/ISMS/2020-12-03+Denial+of+Service+vulnerability+in+PROFINET+IO+Device"
            },
            {
              "name": "https://cert.vde.com/en-us/advisories/vde-2021-006",
              "refsource": "CONFIRM",
              "url": "https://cert.vde.com/en-us/advisories/vde-2021-006"
            }
          ]
        },
        "source": {
          "advisory": "vde-2021-006",
          "defect": [
            "vde-2021-006"
          ],
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2021-20986",
    "datePublished": "2021-02-16T16:35:48.460Z",
    "dateReserved": "2020-12-17T00:00:00.000Z",
    "dateUpdated": "2024-09-16T23:46:42.601Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}