CVE-2021-31401

An issue was discovered in tcp_rcv() in nptcp.c in HCC embedded InterNiche 4.0.1. The TCP header processing code doesn't sanitize the value of the IP total length field (header length + data length). With a crafted IP packet, an integer overflow occurs whenever the value of the IP data length is calculated by subtracting the length of the header from the total length of the IP packet.
Configurations

Configuration 1 (hide)

cpe:2.3:a:hcc-embedded:nichestack:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:siemens:sentron_3wl_com35_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:sentron_3wl_com35:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:siemens:sentron_3wa_com190_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:sentron_3wa_com190:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:05

Type Values Removed Values Added
References () https://cert-portal.siemens.com/productcert/pdf/ssa-789208.pdf - Mitigation, Third Party Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-789208.pdf - Mitigation, Third Party Advisory
References () https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ - Mitigation, Third Party Advisory () https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ - Mitigation, Third Party Advisory
References () https://www.kb.cert.org/vuls/id/608209 - Third Party Advisory, US Government Resource () https://www.kb.cert.org/vuls/id/608209 - Third Party Advisory, US Government Resource

Information

Published : 2021-08-19 12:15

Updated : 2024-11-21 06:05


NVD link : CVE-2021-31401

Mitre link : CVE-2021-31401

CVE.ORG link : CVE-2021-31401


JSON object : View

Products Affected

siemens

  • sentron_3wl_com35_firmware
  • sentron_3wa_com190_firmware
  • sentron_3wl_com35
  • sentron_3wa_com190

hcc-embedded

  • nichestack
CWE
CWE-20

Improper Input Validation