A vulnerability has been identified in RWG1.M12 (All versions < V1.16.16), RWG1.M12D (All versions < V1.16.16), RWG1.M8 (All versions < V1.16.16). Sending specially crafted ARP packets to an affected device could cause a partial denial-of-service, preventing the device to operate normally. A restart is needed to restore normal operations.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-448291.pdf | Patch Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-448291.pdf | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 05:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-448291.pdf - Patch, Vendor Advisory |
Information
Published : 2021-07-13 11:15
Updated : 2024-11-21 05:55
NVD link : CVE-2021-25671
Mitre link : CVE-2021-25671
CVE.ORG link : CVE-2021-25671
JSON object : View
Products Affected
siemens
- rwg1.m12
- rwg1.m12d
- rwg1.m12_firmware
- rwg1.m8_firmware
- rwg1.m12d_firmware
- rwg1.m8
CWE
CWE-770
Allocation of Resources Without Limits or Throttling