Vulnerability Description
A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions). The total length of an UDP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on a user-defined applications that runs on top of the UDP protocol. (FSMD-2021-0006)
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Siemens | Capital Vstar | All versions |
| Siemens | Nucleus Net | All versions |
| Siemens | Nucleus Readystart V3 | < 2014.12 |
| Siemens | Nucleus Source Code | All versions |
| Siemens | Apogee Modular Building Controller Firmware | All versions |
| Siemens | Apogee Modular Building Controller | - |
| Siemens | Apogee Modular Equiment Controller Firmware | All versions |
| Siemens | Apogee Modular Equiment Controller | - |
| Siemens | Apogee Pxc Compact Firmware | All versions |
| Siemens | Apogee Pxc Compact | - |
| Siemens | Apogee Pxc Modular Firmware | All versions |
| Siemens | Apogee Pxc Modular | - |
| Siemens | Talon Tc Compact Firmware | All versions |
| Siemens | Talon Tc Compact | - |
| Siemens | Talon Tc Modular Firmware | All versions |
| Siemens | Talon Tc Modular | - |
Related Weaknesses (CWE)
References
- https://cert-portal.siemens.com/productcert/html/ssa-044112.html
- https://cert-portal.siemens.com/productcert/html/ssa-114589.html
- https://cert-portal.siemens.com/productcert/html/ssa-620288.html
- https://cert-portal.siemens.com/productcert/html/ssa-845392.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdfVendor Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdfVendor Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdfVendor Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdfVendor Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf
FAQ
What is CVE-2021-31345?
CVE-2021-31345 is a vulnerability with a CVSS score of 7.5 (HIGH). A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions). The total leng...
How severe is CVE-2021-31345?
CVE-2021-31345 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-31345?
Check the references section above for vendor advisories and patch information. Affected products include: Siemens Capital Vstar, Siemens Nucleus Net, Siemens Nucleus Readystart V3, Siemens Nucleus Source Code, Siemens Apogee Modular Building Controller Firmware.