Vulnerability CVE-2020-27737


Published: 2021-04-22   Modified: 2021-04-23

Description:
A vulnerability has been identified in Nucleus 4 (All versions < V4.1.0), Nucleus NET (All versions), Nucleus RTOS (versions including affected DNS modules), Nucleus ReadyStart (All versions < V2017.02.3), Nucleus Source Code (versions including affected DNS modules), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), VSTAR (versions including affected DNS modules). The DNS response parsing functionality does not properly validate various length and counts of the records. The parsing of malformed responses could result in a read past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to cause a denial-of-service condition or leak the memory past the allocated structure.

Type:

CWE-125

(Out-of-bounds Read)

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5.8/10
4.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
Partial
Affected software
Siemens -> Nucleus 4 
Siemens -> Nucleus net 
Siemens -> Nucleus readystart 
Siemens -> Nucleus source code 
Siemens -> Vstar 
Siemens -> Nucleus rtos 

 References:
https://cert-portal.siemens.com/productcert/pdf/ssa-705111.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-669158.pdf

Copyright 2024, cxsecurity.com

 

Back to Top