cve/2021/CVE-2021-20986.md

30 lines
2.6 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-20986](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20986)
![](https://img.shields.io/static/v1?label=Product&message=OHV&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=OIT&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=PCV%2FPXV%2FPGV&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=PHA&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=PROFINET%20IO%20Device&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=PXV%2FPGV%20B28%20Profisafe&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=WCS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=OHV-F230-B17%3C%3D%20V1.1.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=OIT500-F113-B17-CB%3C%3D%20V1.3.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=PGV100-F200A-B17-V1D%2C%20PGV150I-F200A-B17-V1D%2C%20PGV100-F200-B17-V1D-7477%3C%3D%20V2.0.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=PHA300-F200-B17-V1D%2C%20PHA400-F200-B17-V1D%2C%20PHA300-F200A-B17-V1D%2C%20PHA300-F200-B17-T-V1D%2C%20PHA200-F200A-B17-V1D%2C%20PHA200-F200-B17-V1D%2C%20PHA400-F200A-B17-V1D%2C%20PHA300-F200A-B17-T-V1D%2C%20PHA600-F200A-B17-V1D%2C%20PHA500-F200-B17-V1D%2C%20PHA500-F200A-B17-V1D%2C%20PHA600-F200-B17-V1D%2C%20PHA150-F200A-B17-V1D%2C%20PHA200-F200A-B17-T-V1D%2C%20PHA150-F200-B17-V1D%2C%20PHA800-F200-B17-V1D%2C%20PHA400-F200A-B17-T-V1D%2C%20PHA500-F200A-B17-T-V1D%2C%20PHA700-F200-B17-V1D%3C%3D%20V3.1.5%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=PXV100A-F200-B28-V1D%2C%20PXV100A-F200-B28-V1D-6011%2C%20PGV100A-F200-B28-V1D%2C%20PGV100A-F200A-B28-V1D%3C%3D%20V1.0.3%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=V3%3C%20V3.14.0.7%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=WCS3B-LS610%2C%20WCS3B-LS610H%2C%20WCS3B-LS610D%2C%20WCS3B-LS610DH%2C%20WCS3B-LS610H-OM%2C%20WCS3B-LS610DH-OM%2C%20WCS3B-LS610D-OM%2C%20CS3B-LS610-OM%3C%3D%20V3.0.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-787%20Out-of-bounds%20Write&color=brighgreen)
### Description
A Denial of Service vulnerability was found in Hilscher PROFINET IO Device V3 in versions prior to V3.14.0.7. This may lead to unexpected loss of cyclic communication or interruption of acyclic communication.
### POC
#### Reference
- https://cert.vde.com/en-us/advisories/vde-2021-006
#### Github
No PoCs found on GitHub currently.