CVE-2021-25664
Summary
| CVE | CVE-2021-25664 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-04-22 21:15:00 UTC |
| Updated | 2022-05-01 01:18:00 UTC |
| Description | A vulnerability has been identified in Capital VSTAR (Versions including affected IPv6 stack), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (Versions including affected IPv6 stack). The function that processes the Hop-by-Hop extension header in IPv6 packets and its options lacks any checks against the length field of the header, allowing attackers to put the function into an infinite loop by supplying arbitrary length values. |
Risk And Classification
Problem Types: CWE-835
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Siemens | Capital Vstar | - | All | All | All |
| Application | Siemens | Nucleus 4 | All | All | All | All |
| Application | Siemens | Nucleus Net | All | All | All | All |
| Application | Siemens | Nucleus Net | - | All | All | All |
| Application | Siemens | Nucleus Readystart | All | All | All | All |
| Application | Siemens | Nucleus Readystart V3 | All | All | All | All |
| Application | Siemens | Nucleus Readystart V4 | All | All | All | All |
| Application | Siemens | Nucleus Source Code | - | All | All | All |
| Application | Siemens | Vstar | - | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Siemens Nucleus Products IPv6 Stack | CISA | MISC | us-cert.cisa.gov | |
| cert-portal.siemens.com/productcert/pdf/ssa-248289.pdf | MISC | cert-portal.siemens.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.