#VU56289 Allocation of Resources Without Limits or Throttling in JTEKT Corporation products - CVE-2021-33011


Vulnerability identifier: #VU56289

Vulnerability risk: Low

CVSSv4.0: 1.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-33011

CWE-ID: CWE-770

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
TOYOPUC PC10G-CPU TCC-6353
Hardware solutions / Firmware
TOYOPUC PC10GE TCC-6464
Hardware solutions / Firmware
TOYOPUC PC10P TCC-6372
Hardware solutions / Firmware
TOYOPUC PC10P-DP TCC-6726
Hardware solutions / Firmware
TOYOPUC PC10P-DP-IO TCC-6752
Hardware solutions / Firmware
TOYOPUC PC10B-P TCC-6373
Hardware solutions / Firmware
TOYOPUC PC10B TCC-1021
Hardware solutions / Firmware
TOYOPUC PC10B-E/C TCU-6521
Hardware solutions / Firmware
TOYOPUC PC10E TCC-4637
Hardware solutions / Firmware
TOYOPUC PC10PE TCC-1101
Hardware solutions / Firmware
TOYOPUC PC10PE-1616P TCC-1102
Hardware solutions / Firmware
TOYOPUC EF10 TCU-6982
Hardware solutions / Firmware
TOYOPUC Plus CPU TCC-6740
Hardware solutions / Firmware
TOYOPUC Plus EX TCU-6741
Hardware solutions / Firmware
TOYOPUC Plus EX2 TCU-6858
Hardware solutions / Firmware
TOYOPUC Plus EFR TCU-6743
Hardware solutions / Firmware
TOYOPUC Plus EFR2 TCU-6859
Hardware solutions / Firmware
TOYOPUC Plus 2P-EFR TCU-6929
Hardware solutions / Firmware
TOYOPUC Plus BUS-EX TCU-6900
Hardware solutions / Firmware
TOYOPUC PC3J/PC2J FL/ET-T-V2H THU-6289
Hardware solutions / Firmware
TOYOPUC PC3J/PC2J 2PORT-EFR THU-6404
Hardware solutions / Firmware
TOYOPUC Nano 10GX TUC-1157
Hardware solutions / Firmware
TOYOPUC Nano CPU TUC-6941
Hardware solutions / Firmware
TOYOPUC Nano 2ET TUU-6949
Hardware solutions / Firmware
TOYOPUC Nano Safety TUC-1085
Hardware solutions / Firmware
TOYOPUC Nano Safety RS00IP TUU-1086
Hardware solutions / Firmware
TOYOPUC Nano Safety RS01IP TUU-1087
Hardware solutions / Firmware

Vendor: JTEKT Corporation

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to the affected product may not be able to properly process an ICMP flood. A remote attacker on the local network can cause a denial of service condition on the target system.

Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

TOYOPUC PC10G-CPU TCC-6353: All versions

TOYOPUC PC10GE TCC-6464: All versions

TOYOPUC PC10P TCC-6372: All versions

TOYOPUC PC10P-DP TCC-6726: All versions

TOYOPUC PC10P-DP-IO TCC-6752: All versions

TOYOPUC PC10B-P TCC-6373: All versions

TOYOPUC PC10B TCC-1021: All versions

TOYOPUC PC10B-E/C TCU-6521: All versions

TOYOPUC PC10E TCC-4637: All versions

TOYOPUC PC10PE TCC-1101: All versions

TOYOPUC PC10PE-1616P TCC-1102: All versions

TOYOPUC EF10 TCU-6982: All versions

TOYOPUC Plus CPU TCC-6740: All versions

TOYOPUC Plus EX TCU-6741: All versions

TOYOPUC Plus EX2 TCU-6858: All versions

TOYOPUC Plus EFR TCU-6743: All versions

TOYOPUC Plus EFR2 TCU-6859: All versions

TOYOPUC Plus 2P-EFR TCU-6929: All versions

TOYOPUC Plus BUS-EX TCU-6900: All versions

TOYOPUC PC3J/PC2J FL/ET-T-V2H THU-6289: All versions

TOYOPUC PC3J/PC2J 2PORT-EFR THU-6404: All versions

TOYOPUC Nano 10GX TUC-1157: All versions

TOYOPUC Nano CPU TUC-6941: All versions

TOYOPUC Nano 2ET TUU-6949: All versions

TOYOPUC Nano Safety TUC-1085: All versions

TOYOPUC Nano Safety RS00IP TUU-1086: All versions

TOYOPUC Nano Safety RS01IP TUU-1087: All versions


External links
https://ics-cert.us-cert.gov/advisories/icsa-21-245-02


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability