Vulnerability in IPv6 Stack of Siemens Products
CVE-2021-25664
8.7HIGH
Key Information:
- Vendor
- Siemens
- Status
- Vendor
- CVE Published:
- 22 April 2021
Summary
A vulnerability exists in the processing of the Hop-by-Hop extension header within the IPv6 stack of various Siemens products. The lack of length check for the header allows attackers to send specially crafted packets that can cause the function to enter an infinite loop, leading to potential denial of service and interruptions in the normal operation of affected devices.
Affected Version(s)
Capital Embedded AR Classic 431-422 0
Capital Embedded AR Classic R20-11 0
Nucleus NET All versions
References
CVSS V4
Score:
8.7
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved