A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions). The total length of an UDP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on a user-defined applications that runs on top of the UDP protocol. (FSMD-2021-0006)
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
History
08 Oct 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | (en) A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions). The total length of an UDP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on a user-defined applications that runs on top of the UDP protocol. (FSMD-2021-0006) |
Information
Published : 2021-11-09 12:15
Updated : 2024-10-08 09:15
NVD link : CVE-2021-31345
Mitre link : CVE-2021-31345
CVE.ORG link : CVE-2021-31345
JSON object : View
Products Affected
siemens
- apogee_pxc_modular_firmware
- talon_tc_modular_firmware
- apogee_modular_building_controller_firmware
- apogee_pxc_compact
- nucleus_readystart_v3
- capital_vstar
- apogee_pxc_compact_firmware
- talon_tc_modular
- apogee_modular_equiment_controller_firmware
- apogee_modular_equiment_controller
- nucleus_source_code
- apogee_modular_building_controller
- talon_tc_compact
- nucleus_net
- apogee_pxc_modular
- talon_tc_compact_firmware
CWE
CWE-1284
Improper Validation of Specified Quantity in Input