ID

VAR-201312-0066


CVE

CVE-2013-2821


TITLE

plural Orion Substation Automation Platform Service disruption in products (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2013-005650

DESCRIPTION

NovaTech Orion Substation Automation Platform OrionLX DNP Master 1.27.38 and DNP Slave 1.23.10 and earlier and Orion5/Orion5r DNP Master 1.27.38 and DNP Slave 1.23.10 and earlier allow remote attackers to cause a denial of service (driver crash and process restart) via a crafted DNP3 TCP packet. The NovaTech Orion Substation Automation Platform is a SCADA RTU system using the DNP3 protocol. Successfully exploiting this issue can cause denial-of-service conditions

Trust: 2.61

sources: NVD: CVE-2013-2821 // JVNDB: JVNDB-2013-005650 // CNVD: CNVD-2013-15486 // BID: 64435 // IVD: 5dcb6794-2352-11e6-abef-000c29c66e3d

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 5dcb6794-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-15486

AFFECTED PRODUCTS

vendor:novatechmodel:orionlx dnp masterscope:eqversion:1.27.38

Trust: 3.0

vendor:novatechmodel:orion5 dnp masterscope:eqversion:1.27.38

Trust: 2.4

vendor:novatechmodel:orion5r dnp masterscope:eqversion:1.27.38

Trust: 2.4

vendor:novatechmodel:orionlx dnp slavescope:eqversion:1.23.10

Trust: 2.2

vendor:novatechmodel:orion5r dnp slavescope:eqversion:1.23.10

Trust: 1.6

vendor:novatechmodel:orion5 dnp slavescope:eqversion:1.23.10

Trust: 1.6

vendor:novatechmodel:orion5 dnp slavescope:lteversion:1.23.10

Trust: 0.8

vendor:novatechmodel:orion5r dnp slavescope:lteversion:1.23.10

Trust: 0.8

vendor:novatechmodel:orionlx dnp slavescope:lteversion:1.23.10

Trust: 0.8

vendor:novatechmodel:orion5/orion5r dnp slavescope:eqversion:1.23.10

Trust: 0.6

vendor:novatechmodel:orion5/orion5r dnp masterscope:eqversion:1.27.38

Trust: 0.6

vendor:orion5 dnp mastermodel: - scope:eqversion:1.27.38

Trust: 0.2

vendor:orion5 dnp slavemodel: - scope:eqversion:1.23.10

Trust: 0.2

vendor:orion5r dnp mastermodel: - scope:eqversion:1.27.38

Trust: 0.2

vendor:orion5r dnp slavemodel: - scope:eqversion:1.23.10

Trust: 0.2

vendor:orionlx dnp mastermodel: - scope:eqversion:1.27.38

Trust: 0.2

vendor:orionlx dnp slavemodel: - scope:eqversion:1.23.10

Trust: 0.2

sources: IVD: 5dcb6794-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-15486 // JVNDB: JVNDB-2013-005650 // CNNVD: CNNVD-201312-433 // NVD: CVE-2013-2821

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-2821
value: HIGH

Trust: 1.0

NVD: CVE-2013-2821
value: HIGH

Trust: 0.8

CNVD: CNVD-2013-15486
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201312-433
value: HIGH

Trust: 0.6

IVD: 5dcb6794-2352-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2013-2821
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2013-15486
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 5dcb6794-2352-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 5dcb6794-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-15486 // JVNDB: JVNDB-2013-005650 // CNNVD: CNNVD-201312-433 // NVD: CVE-2013-2821

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.8

sources: JVNDB: JVNDB-2013-005650 // NVD: CVE-2013-2821

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201312-433

TYPE

Input validation

Trust: 0.8

sources: IVD: 5dcb6794-2352-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201312-433

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-005650

PATCH

title:Orion Substation Automation Platformurl:http://www.novatechweb.com/utility/substation-automation/

Trust: 0.8

title:NovaTech Orion Substation Automation Platform DNP3 driver patch for remote denial of service vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/41915

Trust: 0.6

sources: CNVD: CNVD-2013-15486 // JVNDB: JVNDB-2013-005650

EXTERNAL IDS

db:NVDid:CVE-2013-2821

Trust: 3.5

db:ICS CERTid:ICSA-13-352-01

Trust: 3.3

db:BIDid:64435

Trust: 0.9

db:CNVDid:CNVD-2013-15486

Trust: 0.8

db:CNNVDid:CNNVD-201312-433

Trust: 0.8

db:JVNDBid:JVNDB-2013-005650

Trust: 0.8

db:IVDid:5DCB6794-2352-11E6-ABEF-000C29C66E3D

Trust: 0.2

sources: IVD: 5dcb6794-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-15486 // BID: 64435 // JVNDB: JVNDB-2013-005650 // CNNVD: CNNVD-201312-433 // NVD: CVE-2013-2821

REFERENCES

url:http://ics-cert.us-cert.gov/advisories/icsa-13-352-01

Trust: 2.5

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2821

Trust: 0.8

url:http://www.us-cert.gov/control_systems/pdf/icsa-13-352-01.pdf

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-2821

Trust: 0.8

url:http://www.novatechweb.com/utility/substation-automation/

Trust: 0.3

sources: CNVD: CNVD-2013-15486 // BID: 64435 // JVNDB: JVNDB-2013-005650 // CNNVD: CNNVD-201312-433 // NVD: CVE-2013-2821

CREDITS

Adam Crain of Automatak and Chris Sistrunk

Trust: 0.3

sources: BID: 64435

SOURCES

db:IVDid:5dcb6794-2352-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2013-15486
db:BIDid:64435
db:JVNDBid:JVNDB-2013-005650
db:CNNVDid:CNNVD-201312-433
db:NVDid:CVE-2013-2821

LAST UPDATE DATE

2025-04-11T23:09:48.799000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-15486date:2013-12-23T00:00:00
db:BIDid:64435date:2015-03-19T08:34:00
db:JVNDBid:JVNDB-2013-005650date:2013-12-24T00:00:00
db:CNNVDid:CNNVD-201312-433date:2013-12-23T00:00:00
db:NVDid:CVE-2013-2821date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:IVDid:5dcb6794-2352-11e6-abef-000c29c66e3ddate:2013-12-23T00:00:00
db:CNVDid:CNVD-2013-15486date:2013-12-23T00:00:00
db:BIDid:64435date:2013-12-18T00:00:00
db:JVNDBid:JVNDB-2013-005650date:2013-12-24T00:00:00
db:CNNVDid:CNNVD-201312-433date:2013-12-23T00:00:00
db:NVDid:CVE-2013-2821date:2013-12-21T14:22:56.207