IPv6 Header Processing Vulnerability in Siemens Capital VSTAR and Nucleus Products
CVE-2021-25663
Key Information:
- Vendor
Siemens
- Status
- Vendor
- CVE Published:
- 22 April 2021
What is CVE-2021-25663?
A vulnerability has been reported in Siemens Capital VSTAR and other Nucleus products that affects the processing of IPv6 headers. Specifically, the issue arises from the lack of proper validation of extension header option lengths, potentially allowing an attacker to exploit this weakness. By crafting malicious length values, an attacker can cause the function that processes these headers to enter an infinite loop, which could lead to denial of service and disruption of service availability across affected systems.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Capital Embedded AR Classic 431-422 0
Capital Embedded AR Classic R20-11 0
Nucleus NET All versions
References
CVSS V4
Timeline
Vulnerability published
Vulnerability Reserved