CVE-2021-38451

The affected product’s proprietary protocol CSC allows for calling numerous function codes. In order to call those function codes, the user must supply parameters. There is no sanitation on the value of the offset, which allows the client to specify any offset and read out-of-bounds data.
References
Link Resource
https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 Patch Third Party Advisory US Government Resource
https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 Patch Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:auvesy:versiondog:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:17

Type Values Removed Values Added
CVSS v2 : 3.5
v3 : 5.7
v2 : 3.5
v3 : 4.8
References () https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 - Patch, Third Party Advisory, US Government Resource () https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 - Patch, Third Party Advisory, US Government Resource

Information

Published : 2021-10-22 12:15

Updated : 2024-11-21 06:17


NVD link : CVE-2021-38451

Mitre link : CVE-2021-38451

CVE.ORG link : CVE-2021-38451


JSON object : View

Products Affected

auvesy

  • versiondog
CWE
CWE-125

Out-of-bounds Read