#VU52203 Access of Memory Location After End of Buffer in SIMOTICS CONNECT 400


Published: 2021-04-14 | Updated: 2021-04-15

Vulnerability identifier: #VU52203

Vulnerability risk: Medium

CVSSv3.1: 4.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:U/RC:C]

CVE-ID: CVE-2021-25677

CWE-ID: CWE-788

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
SIMOTICS CONNECT 400
Hardware solutions / Other hardware appliances

Vendor: Siemens

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the DNS client does not properly randomize DNS transaction IDs. A remote attacker can poison the DNS cache or spoof DNS resolving. 

Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

SIMOTICS CONNECT 400: 0.5.0.0


External links
http://ics-cert.us-cert.gov/advisories/icsa-21-103-13
http://cert-portal.siemens.com/productcert/pdf/ssa-669158.pdf


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability