A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions). The total length of an UDP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on a user-defined applications that runs on top of the UDP protocol. (FSMD-2021-0006)
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
History
No history.
Information
Published : 2021-11-09 12:15
Updated : 2024-11-21 06:05
NVD link : CVE-2021-31345
Mitre link : CVE-2021-31345
CVE.ORG link : CVE-2021-31345
JSON object : View
Products Affected
siemens
- capital_vstar
- apogee_pxc_compact
- apogee_modular_equiment_controller_firmware
- talon_tc_compact_firmware
- nucleus_readystart_v3
- apogee_pxc_modular_firmware
- talon_tc_modular_firmware
- nucleus_net
- apogee_modular_building_controller
- apogee_modular_building_controller_firmware
- talon_tc_compact
- apogee_pxc_compact_firmware
- apogee_modular_equiment_controller
- apogee_pxc_modular
- talon_tc_modular
- nucleus_source_code
CWE
CWE-1284
Improper Validation of Specified Quantity in Input