SB2021041629 - Multiple vulnerabilities in EIPStackGroup OpENer Ethernet/IP



SB2021041629 - Multiple vulnerabilities in EIPStackGroup OpENer Ethernet/IP

Published: April 16, 2021 Updated: June 21, 2021

Security Bulletin ID SB2021041629
Severity
Medium
Patch available
NO
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Incorrect Conversion between Numeric Types (CVE-ID: CVE-2021-27482)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect conversion between numeric types in OpENer EtherNet/IP. A remote attacker can send a specifically crafted packet and cause a denial of service condition on the target system.


2) Out-of-bounds read (CVE-ID: CVE-2021-27478)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in OpENer EtherNet/IP. A remote attacker can send a specifically crafted packet, trigger out-of-bounds read error and read contents of memory on the system.


3) Reachable Assertion (CVE-ID: CVE-2021-27500)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion in OpENer EtherNet/IP. A remote attacker can send a specially crafted packet and cause a denial of service condition on the target system.


4) Reachable Assertion (CVE-ID: CVE-2021-27498)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion in OpENer EtherNet/IP. A remote attacker can send a specially crafted packet and cause a denial of service condition on the target system.


5) Out-of-bounds read (CVE-ID: CVE-2021-21777)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition in the Ethernet/IP UDP handler functionality. A remote attacker can trigger out-of-bounds read error and cause a denial of service condition on the system.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.