A denial of service vulnerability exists in MDT's firmware for the KNXnet/IP Secure router SCN-IP100.03 and KNX IP interface SCN-IP000.03 before v3.0.4, that allows a remote attacker to turn the device unresponsive to all requests on the KNXnet/IP Secure layer, until the device is rebooted, via a SESSION_REQUEST frame with a modified total length field.
References
Link | Resource |
---|---|
https://github.com/robertguetzkow/CVE-2021-37740 | Exploit Release Notes Third Party Advisory |
https://www.mdt.de/EN_IP_Interface_Router.html | Broken Link |
https://www.mdt.de/download/MDT_CL_SCN_IP_03_IP_Interface_Router.pdf | Release Notes Vendor Advisory |
https://github.com/robertguetzkow/CVE-2021-37740 | Exploit Release Notes Third Party Advisory |
https://www.mdt.de/EN_IP_Interface_Router.html | Broken Link |
https://www.mdt.de/download/MDT_CL_SCN_IP_03_IP_Interface_Router.pdf | Release Notes Vendor Advisory |
Configurations
History
No history.
Information
Published : 2022-04-20 20:15
Updated : 2024-11-21 06:15
NVD link : CVE-2021-37740
Mitre link : CVE-2021-37740
CVE.ORG link : CVE-2021-37740
JSON object : View
Products Affected
mdt
- scn-ip100.03
- scn-ip000.03_firmware
- scn-ip000.03
- scn-ip100.03_firmware
CWE