A vulnerability has been identified in Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2013.08), Nucleus Source Code (Versions including affected DNS modules). The DNS client does not properly randomize UDP port numbers of DNS requests. That could allow an attacker to poison the DNS cache or spoof DNS resolving.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-201384.pdf | Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-201384.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-201384.pdf - Vendor Advisory |
Information
Published : 2021-04-22 21:15
Updated : 2024-11-21 05:57
NVD link : CVE-2021-27393
Mitre link : CVE-2021-27393
CVE.ORG link : CVE-2021-27393
JSON object : View
Products Affected
siemens
- nucleus_source_code
- nucleus_readystart_v3
- nucleus_net
CWE
CWE-330
Use of Insufficiently Random Values