CVE-2021-27500
Published on: Not Yet Published
Last Modified on: 05/13/2022 01:36:00 AM UTC
Certain versions of OpENer EtherNet/IP from EIPStackGroup contain the following vulnerability:
A specifically crafted packet sent by an attacker to EIPStackGroup OpENer EtherNet/IP commits and versions prior to Feb 10, 2021 may result in a denial-of-service condition.
- CVE-2021-27500 has been assigned by
[email protected] to track the vulnerability
- Affected Vendor/Software:
EIPStackGroup - OpENer EtherNet/IP version < Feb 10, 2021
CVE References
Description | Tags ⓘ | Link |
---|---|---|
GitHub - EIPStackGroup/OpENer: OpENer is an EtherNet/IP stack for I/O adapter devices. It supports multiple I/O and explicit connections and includes objects and services for making EtherNet/IP-compliant products as defined in the ODVA specification. | github.com text/html |
![]() |
EIPStackGroup OpENer Ethernet/IP | CISA | www.cisa.gov text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Software
Vendor | Product | Version |
---|---|---|
EIPStackGroup | OpENer_EtherNet/IP | < Feb 10, 2021 |
Discovery Credit
Tal Keren and Sharon Brizinov of Claroty reported these vulnerabilities to CISA.
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2021-27500 : A specifically crafted packet sent by an attacker to EIPStackGroup OpENer EtherNet/IP commits and… twitter.com/i/web/status/1… | 2022-05-12 20:13:42 |
![]() |
CVE-2021-27500 | 2022-05-12 20:57:08 |