VARIoT IoT vulnerabilities database
| VAR-202108-0212 | CVE-2020-35684 | NicheStack embedded TCP/IP has vulnerabilities |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An issue was discovered in HCC Nichestack 3.0. The code that parses TCP packets relies on an unchecked value of the IP payload size (extracted from the IP header) to compute the length of the TCP payload within the TCP checksum computation function. When the IP payload size is set to be smaller than the size of the IP header, the TCP checksum computation function may read out of bounds (a low-impact write-out-of-bounds is also possible). HCC Embedded's software called InterNiche stack (NicheStack) and NicheLite, which provides TCP/IP networking capability to embedded systems, is impacted by multiple vulnerabilities. The Forescout and JFrog researchers who discovered this set of vulnerabilities have identified these as "INFRA:HALT"CVE-2020-25767 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-25926 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-03-02
CVE-2020-25927 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-25928 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-35683 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_ipv4 module version 1.5.
A fix for this will be available from HCC on 2021-03-02
CVE-2020-35684 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2020-35685 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2021-27565 Affected
Vendor Statement:
The infinite loop entered in case this occurs is really for the user to implement when integrating the software. But whatever their implementation this code should not be structured like this.
CVE-2021-31226 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31227 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31228 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31400 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-02-26
CVE-2021-31401 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2021-36762 Unknown
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is fixed in in_tftp module version 1.2CVE-2020-25767 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-25926 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-03-02
CVE-2020-25927 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-25928 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-35683 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_ipv4 module version 1.5.
A fix for this will be available from HCC on 2021-03-02
CVE-2020-35684 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2020-35685 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2021-27565 Affected
Vendor Statement:
The infinite loop entered in case this occurs is really for the user to implement when integrating the software. But whatever their implementation this code should not be structured like this.
CVE-2021-31226 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31227 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31228 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31400 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-02-26
CVE-2021-31401 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2021-36762 Unknown
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is fixed in in_tftp module version 1.2.
InterNiche Technologies NicheStack has an input validation error vulnerability, which exists due to insufficient input validation provided by users in the TCP component. A remote attacker can use this vulnerability to pass specially crafted input to the application and perform a denial of service (DoS) attack. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Siemens Security Advisory
| VAR-202108-0211 | CVE-2020-35683 | NicheStack embedded TCP/IP has vulnerabilities |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An issue was discovered in HCC Nichestack 3.0. The code that parses ICMP packets relies on an unchecked value of the IP payload size (extracted from the IP header) to compute the ICMP checksum. When the IP payload size is set to be smaller than the size of the IP header, the ICMP checksum computation function may read out of bounds, causing a Denial-of-Service. HCC Embedded's software called InterNiche stack (NicheStack) and NicheLite, which provides TCP/IP networking capability to embedded systems, is impacted by multiple vulnerabilities. The Forescout and JFrog researchers who discovered this set of vulnerabilities have identified these as "INFRA:HALT"CVE-2020-25767 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-25926 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-03-02
CVE-2020-25927 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-25928 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-35683 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_ipv4 module version 1.5.
A fix for this will be available from HCC on 2021-03-02
CVE-2020-35684 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2020-35685 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2021-27565 Affected
Vendor Statement:
The infinite loop entered in case this occurs is really for the user to implement when integrating the software. But whatever their implementation this code should not be structured like this.
CVE-2021-31226 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31227 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31228 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31400 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-02-26
CVE-2021-31401 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2021-36762 Unknown
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is fixed in in_tftp module version 1.2CVE-2020-25767 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-25926 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-03-02
CVE-2020-25927 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-25928 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-35683 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_ipv4 module version 1.5.
A fix for this will be available from HCC on 2021-03-02
CVE-2020-35684 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2020-35685 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2021-27565 Affected
Vendor Statement:
The infinite loop entered in case this occurs is really for the user to implement when integrating the software. But whatever their implementation this code should not be structured like this.
CVE-2021-31226 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31227 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31228 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31400 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-02-26
CVE-2021-31401 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2021-36762 Unknown
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is fixed in in_tftp module version 1.2.
InterNiche Technologies NicheStack has an input validation error vulnerability, which stems from the boundary conditions of ICMP components. An attacker can use this vulnerability to trigger an out-of-bounds read error and cause a system denial of service. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Siemens Security Advisory
| VAR-202108-0327 | CVE-2021-1602 | Remote command execution vulnerability in Cisco Small Business RV160 and RV260 series VPN routers |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
A vulnerability in the web-based management interface of Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device using root-level privileges. Due to the nature of the vulnerability, only commands without parameters can be executed. Cisco Small Business RV160 and RV260 are routers. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202108-0276 | CVE-2021-22396 | eCNS280_TD and eSE620X vESS Vulnerability in privilege management |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
There is a privilege escalation vulnerability in some Huawei products. Due to improper privilege management, a local attacker with common privilege may access some specific files in the affected products. Successful exploit will cause privilege escalation.Affected product versions include:eCNS280_TD V100R005C00,V100R005C10;eSE620X vESS V100R001C10SPC200,V100R001C20SPC200. eCNS280_TD and eSE620X vESS Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Huawei eCNS280_TD is the core network equipment of the wireless broadband trunking system of China's Huawei (Huawei) company. Huawei ESE620X vESS is a virtual enterprise service controller of China's Huawei (Huawei) company. The vulnerabilities stem from that the product does not properly impose security restrictions. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202108-0213 | CVE-2020-35685 | NicheStack embedded TCP/IP has vulnerabilities |
CVSS V2: 6.4 CVSS V3: 9.1 Severity: CRITICAL |
An issue was discovered in HCC Nichestack 3.0. The code that generates Initial Sequence Numbers (ISNs) for TCP connections derives the ISN from an insufficiently random source. As a result, an attacker may be able to determine the ISN of current and future TCP connections and either hijack existing ones or spoof future ones. (Proper ISN generation should aim to follow at least the specifications outlined in RFC 6528.). HCC Embedded's software called InterNiche stack (NicheStack) and NicheLite, which provides TCP/IP networking capability to embedded systems, is impacted by multiple vulnerabilities. The Forescout and JFrog researchers who discovered this set of vulnerabilities have identified these as "INFRA:HALT"CVE-2020-25767 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-25926 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-03-02
CVE-2020-25927 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-25928 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-35683 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_ipv4 module version 1.5.
A fix for this will be available from HCC on 2021-03-02
CVE-2020-35684 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2020-35685 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2021-27565 Affected
Vendor Statement:
The infinite loop entered in case this occurs is really for the user to implement when integrating the software. But whatever their implementation this code should not be structured like this.
CVE-2021-31226 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31227 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31228 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31400 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-02-26
CVE-2021-31401 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2021-36762 Unknown
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is fixed in in_tftp module version 1.2CVE-2020-25767 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-25926 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-03-02
CVE-2020-25927 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-25928 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-35683 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_ipv4 module version 1.5.
A fix for this will be available from HCC on 2021-03-02
CVE-2020-35684 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2020-35685 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2021-27565 Affected
Vendor Statement:
The infinite loop entered in case this occurs is really for the user to implement when integrating the software. But whatever their implementation this code should not be structured like this.
CVE-2021-31226 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31227 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31228 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31400 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-02-26
CVE-2021-31401 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2021-36762 Unknown
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is fixed in in_tftp module version 1.2. SENTRON 3WA COM190 is an accessory module for 3WA circuit breakers, providing connections via PROFINET IO and Modbus TCP. SENTRON 3WL COM35 is an accessory module of 3WL circuit breaker, which provides connection through PROFINET IO and Modbus TCP. SENTRON 7KM PAC Switched Ethernet PROFINET Expansion Module is a plug-in device that provides switched Ethernet PROFINET V3 connections for 7KM PAC32x0/4200 and 3VA COM100/800 devices.
The Siemens Interniche IP stack low-voltage equipment has security vulnerabilities. No detailed vulnerability details are currently provided. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Siemens Security Advisory
| VAR-202107-0328 | CVE-2021-22778 | plural Schneider Electric Inadequate protection of credentials in products |
CVSS V2: 3.6 CVSS V3: 7.1 Severity: HIGH |
Insufficiently Protected Credentials vulnerability exists in EcoStruxure Control Expert (all versions prior to V15.0 SP1, including all versions of Unity Pro), EcoStruxure Process Expert (all versions, including all versions of EcoStruxure Hybrid DCS), and SCADAPack RemoteConnect for x70, all versions, that could cause protected derived function blocks to be read or modified by unauthorized users when accessing a project file. EcoStruxure Control Expert , EcoStruxure Process Expert , SCADAPack RemoteConnect Exists in an inadequate protection of credentials.Information may be obtained and information may be tampered with. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202106-0919 | CVE-2021-21279 | Contiki-NG Infinite loop vulnerability in |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Contiki-NG is an open-source, cross-platform operating system for internet of things devices. In verions prior to 4.6, an attacker can perform a denial-of-service attack by triggering an infinite loop in the processing of IPv6 neighbor solicitation (NS) messages. This type of attack can effectively shut down the operation of the system because of the cooperative scheduling used for the main parts of Contiki-NG and its communication stack. The problem has been patched in Contiki-NG 4.6. Users can apply the patch for this vulnerability out-of-band as a workaround. Contiki-NG Exists in an infinite loop vulnerability.Denial of service (DoS) It may be put into a state. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Attackers can use this vulnerability to effectively shut down the operation of the system
| VAR-202107-0331 | CVE-2021-22781 | plural Schneider Electric Inadequate protection of credentials in products |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Insufficiently Protected Credentials vulnerability exists in EcoStruxure Control Expert (all versions prior to V15.0 SP1, including all versions of Unity Pro), EcoStruxure Process Expert (all versions, including all versions of EcoStruxure Hybrid DCS), and SCADAPack RemoteConnect for x70, all versions, that could cause a leak of SMTP credential used for mailbox authentication when an attacker can access a project file. EcoStruxure Control Expert , EcoStruxure Process Expert , SCADAPack RemoteConnect Exists in an inadequate protection of credentials.Information may be obtained. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202107-0570 | CVE-2021-21820 | D-LINK DIR-3040 Vulnerability in Using Hard Coded Credentials |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A hard-coded password vulnerability exists in the Libcli Test Environment functionality of D-LINK DIR-3040 1.13B03. A specially crafted network request can lead to code execution. An attacker can send a sequence of requests to trigger this vulnerability. D-LINK DIR-3040 Is vulnerable to the use of hard-coded credentials.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. D-Link DIR-3040 is a router of D-Link company in Taiwan. Provides the function of connecting to the network. No detailed vulnerability details are currently provided. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202107-0569 | CVE-2021-21819 | D-LINK DIR-3040 Vulnerability in |
CVSS V2: 9.0 CVSS V3: 7.2 Severity: HIGH |
A code execution vulnerability exists in the Libcli Test Environment functionality of D-LINK DIR-3040 1.13B03. A specially crafted network request can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger this vulnerability. D-LINK DIR-3040 Contains an unspecified vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. D-LINK DIR-3040 is a router of D-Link company in Taiwan, China, which provides the function of connecting to the network. No detailed vulnerability details are currently provided. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202107-0567 | CVE-2021-21817 | D-LINK DIR-3040 Information Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An information disclosure vulnerability exists in the Zebra IP Routing Manager functionality of D-LINK DIR-3040 1.13B03. A specially crafted network request can lead to the disclosure of sensitive information. An attacker can send a sequence of requests to trigger this vulnerability. D-LINK DIR-3040 Contains an unspecified vulnerability.Information may be obtained. D-LINK DIR-3040 is a router of D-Link company in Taiwan, China, which provides the function of connecting to the network. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202107-0288 | CVE-2021-20596 | Made by Mitsubishi Electric MELSEC F series Ethernet In the interface block NULL Pointer reference vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
NULL Pointer Dereference in MELSEC-F Series FX3U-ENET firmware version 1.14 and prior, FX3U-ENET-L firmware version 1.14 and prior and FX3U-ENET-P502 firmware version 1.14 and prior allows a remote unauthenticated attacker to cause a DoS condition in communication by sending specially crafted packets. Control by MELSEC-F series PLC is not affected and system reset is required for recovery. Made by Mitsubishi Electric MELSEC F series Ethernet Interface blocks NULL Pointer reference (CWE-476 , CVE-2021-20596) A vulnerability exists. This vulnerability information is provided by the developer for the purpose of making it known to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developers.If the product receives a malicious packet crafted by a remote third party, an error will occur and communication will interfere with service operation. (DoS) It may be in a state. In addition, by resetting the system, service operation is interrupted. (DoS) Recovery from the state is possible. According to the developer MELSEC F It has no effect on the control of the basic units of the series. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Misubishi Electric Mitsubishi Electric MELSEC-F Series is a basic micro PLC with scalability of analog and communication functions for industrial control equipment of Mitsubishi Electric Corporation. Mitsubishi Electric MELSEC-F Series contains a code issue vulnerability that could cause a denial of service condition for communication with the product
| VAR-202107-0568 | CVE-2021-21818 | D-LINK DIR-3040 Vulnerability in Using Hard Coded Credentials |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A hard-coded password vulnerability exists in the Zebra IP Routing Manager functionality of D-LINK DIR-3040 1.13B03. A specially crafted network request can lead to a denial of service. An attacker can send a sequence of requests to trigger this vulnerability. D-LINK DIR-3040 Is vulnerable to the use of hard-coded credentials.Denial of service (DoS) It may be put into a state. D-LINK DIR-3040 is a router of D-Link Corporation in Taiwan. Provides the function of connecting to the network. Attackers can cause the target to deny service through special requests. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202107-0329 | CVE-2021-22779 | plural Schneider Electric Product spoofing authentication evasion vulnerability |
CVSS V2: 6.4 CVSS V3: 9.1 Severity: CRITICAL |
Authentication Bypass by Spoofing vulnerability exists in EcoStruxure Control Expert (all versions prior to V15.0 SP1, including all versions of Unity Pro), EcoStruxure Control Expert V15.0 SP1, EcoStruxure Process Expert (all versions, including all versions of EcoStruxure Hybrid DCS), SCADAPack RemoteConnect for x70 (all versions), Modicon M580 CPU (all versions - part numbers BMEP* and BMEH*), Modicon M340 CPU (all versions - part numbers BMXP34*), that could cause unauthorized access in read and write mode to the controller by spoofing the Modbus communication between the engineering software and the controller. plural Schneider Electric The product contains a vulnerability in spoofing authentication bypass.Information may be obtained and information may be tampered with. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202107-0330 | CVE-2021-22780 | plural Schneider Electric Inadequate protection of credentials in products |
CVSS V2: 3.6 CVSS V3: 7.1 Severity: HIGH |
Insufficiently Protected Credentials vulnerability exists in EcoStruxure Control Expert (all versions prior to V15.0 SP1, including all versions of Unity Pro), EcoStruxure Process Expert (all versions, including all versions of EcoStruxure Hybrid DCS), and SCADAPack RemoteConnect for x70, all versions, that could cause unauthorized access to a project file protected by a password when this file is shared with untrusted sources. An attacker may bypass the password protection and be able to view and modify a project file. EcoStruxure Control Expert , EcoStruxure Process Expert , SCADAPack RemoteConnect Exists in an inadequate protection of credentials.Information may be obtained and information may be tampered with. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202107-0332 | CVE-2021-22782 | plural Schneider Electric Vulnerability in lack of encryption of critical data in products |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Missing Encryption of Sensitive Data vulnerability exists in EcoStruxure Control Expert (all versions prior to V15.0 SP1, including all versions of Unity Pro), EcoStruxure Process Expert (all versions, including all versions of EcoStruxure Hybrid DCS), and SCADAPack RemoteConnect for x70, all versions, that could cause an information leak allowing disclosure of network and process information, credentials or intellectual property when an attacker can access a project file. EcoStruxure Control Expert , EcoStruxure Process Expert , SCADAPack RemoteConnect There is a vulnerability in the lack of encryption of critical data.Information may be obtained. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202108-1891 | CVE-2021-37161 | Nexus Control Panel buffer overflow vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A buffer overflow issue was discovered in the HMI3 Control Panel contained within the Swisslog Healthcare Nexus Panel, operated by released versions of software before Nexus Software 7.2.5.7. A buffer overflow allows an attacker to overwrite an internal queue data structure and can lead to remote code execution. Swisslog Healthcare Nexus Panel is a medical device of Swisslog Healthcare. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202108-1557 | CVE-2021-37167 | Nexus Control Panel Privilege Escalation Vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
An insecure permissions issue was discovered in HMI3 Control Panel in Swisslog Healthcare Nexus Panel operated by released versions of software before Nexus Software 7.2.5.7. A user logged in using the default credentials can gain root access to the device, which provides permissions for all of the functionality of the device. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202108-1892 | CVE-2021-37162 | Nexus Control Panel buffer overflow vulnerability (CNVD-2021-62180) |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A buffer overflow issue was discovered in HMI3 Control Panel in Swisslog Healthcare Nexus Panel operated by released versions of software before Nexus Software 7.2.5.7. If an attacker sends a malformed UDP message, a buffer underflow occurs, leading to an out-of-bounds copy and possible remote code execution. Attackers can use this vulnerability to overwrite the internal queue data structure, which can realize remote code execution. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202108-1894 | CVE-2021-37164 | Nexus Control Panel out-of-bounds write vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A buffer overflow issue was discovered in HMI3 Control Panel in Swisslog Healthcare Nexus Panel operated by released versions of software before Nexus Software 7.2.5.7. In the tcpTxThread function, the received data is copied to a stack buffer. An off-by-3 condition can occur, resulting in a stack-based buffer overflow. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements