6.5
CVE-2020-12521
- EPSS 0.08%
- Veröffentlicht 17.12.2020 23:15:13
- Zuletzt bearbeitet 21.11.2024 04:59:51
- Quelle info@cert.vde.com
- Teams Watchlist Login
- Unerledigt Login
On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS a specially crafted LLDP packet may lead to a high system load in the PROFINET stack. An attacker can cause failure of system services or a complete reboot.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Phoenixcontact ≫ Plcnext Firmware SwEditionlong_term_support Version < 2021.0
Phoenixcontact ≫ Plcnext Firmware SwEditionlong_term_support Version < 2021.0
Phoenixcontact ≫ Plcnext Firmware SwEditionlong_term_support Version < 2021.0
Phoenixcontact ≫ Plcnext Firmware SwEditionlong_term_support Version < 2021.0
Phoenixcontact ≫ Plcnext Firmware SwEditionlong_term_support Version < 2021.0
Phoenixcontact ≫ Plcnext Firmware SwEditionlong_term_support Version < 2021.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.08% | 0.217 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
nvd@nist.gov | 6.1 | 6.5 | 6.9 |
AV:A/AC:L/Au:N/C:N/I:N/A:C
|
info@cert.vde.com | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.