Denial of Service Vulnerability in Capital Embedded AR Classic by Siemens
CVE-2021-31882

6.5MEDIUM

Key Information:

Summary

A significant vulnerability exists in the DHCP client application of Siemens' Capital Embedded AR Classic. It fails to appropriately validate the length of Domain Name Server (DNS) IP option(s) within DHCP ACK packets. This oversight can allow attackers to exploit the vulnerability, potentially causing Denial of Service (DoS) conditions that disrupt the normal operation of the affected systems. Users of Capital Embedded AR Classic, especially those on versions 431-422 and R20-11 prior to V2303, should take immediate action to mitigate potential risks associated with this security gap.

Affected Version(s)

Capital Embedded AR Classic 431-422 0

Capital Embedded AR Classic R20-11 0

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.