Vulnerability CVE-2021-31401


Published: 2021-08-19

Description:
An issue was discovered in tcp_rcv() in nptcp.c in HCC embedded InterNiche 4.0.1. The TCP header processing code doesn't sanitize the value of the IP total length field (header length + data length). With a crafted IP packet, an integer overflow occurs whenever the value of the IP data length is calculated by subtracting the length of the header from the total length of the IP packet.

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Hcc-embedded -> Nichestack 

 References:
https://cert-portal.siemens.com/productcert/pdf/ssa-789208.pdf
https://www.kb.cert.org/vuls/id/608209
https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/

Copyright 2024, cxsecurity.com

 

Back to Top