René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

163 lines
5.3 KiB
JSON

{
"id": "CVE-2021-33541",
"sourceIdentifier": "info@cert.vde.com",
"published": "2021-06-25T19:15:09.757",
"lastModified": "2021-07-02T00:11:39.970",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Phoenix Contact Classic Line Controllers ILC1x0 and ILC1x1 in all versions/variants are affected by a Denial-of-Service vulnerability. The communication protocols and device access do not feature authentication measures. Remote attackers can use specially crafted IP packets to cause a denial of service on the PLC's network communication module. A successful attack stops all network communication. To restore the network connectivity the device needs to be restarted. The automation task is not affected."
},
{
"lang": "es",
"value": "Phoenix Contact Classic Line Controllers ILC1x0 e ILC1x1 en todas sus versiones/variantes est\u00e1n afectados por una vulnerabilidad de denegaci\u00f3n de servicio. Los protocolos de comunicaci\u00f3n y el acceso al dispositivo no cuentan con medidas de autenticaci\u00f3n. Unos atacantes remotos pueden usar paquetes IP especialmente dise\u00f1ados para causar una denegaci\u00f3n de servicio en el m\u00f3dulo de comunicaci\u00f3n de red del PLC. Un ataque con \u00e9xito detiene toda la comunicaci\u00f3n de red. Para restablecer la conectividad de la red es necesario reiniciar el dispositivo. La tarea de automatizaci\u00f3n no est\u00e1 afectada"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "info@cert.vde.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "info@cert.vde.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:phoenixcontact:ilc1x0_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5AC07A81-D5D6-449C-93F8-93D6E87487DD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:phoenixcontact:ilc1x0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE45F6AF-7286-48F7-B4BE-AFC948884C7C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:phoenixcontact:ilc1x1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E168AB1-1B81-4990-95E4-56C36275609B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:phoenixcontact:ilc1x1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E318A8B-D1D1-4DD5-AF71-DCBFEFCF2C5E"
}
]
}
]
}
],
"references": [
{
"url": "https://cert.vde.com/en-us/advisories/vde-2021-019",
"source": "info@cert.vde.com",
"tags": [
"Third Party Advisory"
]
}
]
}