Published on: Not Yet Published

Last Modified on: 05/13/2022 01:36:00 AM UTC


Certain versions of OpENer EtherNet/IP from EIPStackGroup contain the following vulnerability:

A specifically crafted packet sent by an attacker to EIPStackGroup OpENer EtherNet/IP commits and versions prior to Feb 10, 2021 may result in a denial-of-service condition.

  • CVE-2021-27498 has been assigned by URL Logo [email protected] to track the vulnerability
  • Affected Vendor/Software: URL Logo EIPStackGroup - OpENer EtherNet/IP version < Feb 10, 2021

CVE References

Description Tags Link
GitHub - EIPStackGroup/OpENer: OpENer is an EtherNet/IP stack for I/O adapter devices. It supports multiple I/O and explicit connections and includes objects and services for making EtherNet/IP-compliant products as defined in the ODVA specification.
EIPStackGroup OpENer Ethernet/IP | CISA

Known Affected Software

Vendor Product Version
EIPStackGroup OpENer_EtherNet/IP< Feb 10, 2021

Discovery Credit

Tal Keren and Sharon Brizinov of Claroty reported these vulnerabilities to CISA.

Social Mentions

Source Title Posted (UTC)
Twitter Icon @CVEreport CVE-2021-27498 : A specifically crafted packet sent by an attacker to EIPStackGroup OpENer EtherNet/IP commits and…… 2022-05-12 20:13:16
Reddit Logo Icon /r/netcve CVE-2021-27498 2022-05-12 20:57:08
© 2022 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license. and Source URL Uptime Status