7.5
CVE-2021-31401
- EPSS 0.71%
- Published 19.08.2021 12:15:08
- Last modified 21.11.2024 06:05:35
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
An issue was discovered in tcp_rcv() in nptcp.c in HCC embedded InterNiche 4.0.1. The TCP header processing code doesn't sanitize the value of the IP total length field (header length + data length). With a crafted IP packet, an integer overflow occurs whenever the value of the IP data length is calculated by subtracting the length of the header from the total length of the IP packet.
Data is provided by the National Vulnerability Database (NVD)
Hcc-embedded ≫ Nichestack Version < 4.3
Siemens ≫ Sentron 3wl Com35 Firmware Version < 1.2.0
Siemens ≫ Sentron 3wa Com190 Firmware Version < 2.0.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.71% | 0.699 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:N/A:P
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.