DNS Cache Poisoning Vulnerability in Nucleus NET and Nucleus ReadyStart by Siemens
CVE-2021-27393

5.3MEDIUM

Key Information:

Vendor
Siemens
Vendor
CVE Published:
22 April 2021

Summary

A vulnerability exists in Nucleus NET and related products that impacts the DNS client’s ability to randomize UDP port numbers for requests. This flaw can potentially allow attackers to exploit the DNS cache, enabling them to execute cache poisoning attacks or spoof DNS responses, which might lead to users being redirected to malicious sites or other forms of malicious activities.

Affected Version(s)

Nucleus NET All versions

Nucleus ReadyStart V3 All versions < V2013.08

Nucleus Source Code Versions including affected DNS modules

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
🍪 This website uses cookies, like every other website on the internet 😕 By using our website, you consent to the use of cookies.