Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2017-2681

Summary
Assigner-siemens
Assigner Org ID-cec7a2ec-15b4-4faf-bd53-b40f371f3a77
Published At-11 May, 2017 | 10:00
Updated At-10 Sep, 2024 | 09:33
Rejected At-
Credits

Specially crafted PROFINET DCP packets sent on a local Ethernet segment (Layer 2) to an affected product could cause a denial of service condition of that product. Human interaction is required to recover the system. PROFIBUS interfaces are not affected.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:siemens
Assigner Org ID:cec7a2ec-15b4-4faf-bd53-b40f371f3a77
Published At:11 May, 2017 | 10:00
Updated At:10 Sep, 2024 | 09:33
Rejected At:
▼CVE Numbering Authority (CNA)

Specially crafted PROFINET DCP packets sent on a local Ethernet segment (Layer 2) to an affected product could cause a denial of service condition of that product. Human interaction is required to recover the system. PROFIBUS interfaces are not affected.

Affected Products
Vendor
Siemens AGSiemens
Product
Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller
Default Status
unknown
Versions
Affected
  • All versions < V4.1.1 Patch04
Vendor
Siemens AGSiemens
Product
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200
Default Status
unknown
Versions
Affected
  • All versions < V4.2.1 Patch03
Vendor
Siemens AGSiemens
Product
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P
Default Status
unknown
Versions
Affected
  • All versions < V4.4.0 Patch01
Vendor
Siemens AGSiemens
Product
IE/AS-i Link PN IO
Default Status
unknown
Versions
Affected
  • All versions
Vendor
Siemens AGSiemens
Product
IE/PB-Link (incl. SIPLUS NET variants)
Default Status
unknown
Versions
Affected
  • All versions < V3.0
Vendor
Siemens AGSiemens
Product
SCALANCE M-800 family (incl. S615, MUM-800 and RM1224)
Default Status
unknown
Versions
Affected
  • All versions < V4.03
Vendor
Siemens AGSiemens
Product
SCALANCE W-700 IEEE 802.11n family
Default Status
unknown
Versions
Affected
  • All versions < V6.1
Vendor
Siemens AGSiemens
Product
SCALANCE X-200 family (incl. SIPLUS NET variants)
Default Status
unknown
Versions
Affected
  • All versions < V5.2.2
Vendor
Siemens AGSiemens
Product
SCALANCE X-200IRT family (incl. SIPLUS NET variants)
Default Status
unknown
Versions
Affected
  • All versions < V5.4.0
Vendor
Siemens AGSiemens
Product
SCALANCE X-300 family (incl. X408 and SIPLUS NET variants)
Default Status
unknown
Versions
Affected
  • All versions < V4.1.0
Vendor
Siemens AGSiemens
Product
SCALANCE X408 family
Default Status
unknown
Versions
Affected
  • All versions < V4.1.0
Vendor
Siemens AGSiemens
Product
SCALANCE X414
Default Status
unknown
Versions
Affected
  • All versions < V3.10.2
Vendor
Siemens AGSiemens
Product
SCALANCE XM-400 family
Default Status
unknown
Versions
Affected
  • All versions < V6.1
Vendor
Siemens AGSiemens
Product
SCALANCE XR-500 family
Default Status
unknown
Versions
Affected
  • All versions < V6.1
Vendor
Siemens AGSiemens
Product
SIMATIC CM 1542-1
Default Status
unknown
Versions
Affected
  • All versions < V2.0
Vendor
Siemens AGSiemens
Product
SIMATIC CM 1542SP-1
Default Status
unknown
Versions
Affected
  • All versions < V1.0.15
Vendor
Siemens AGSiemens
Product
SIMATIC CP 1243-1 (incl. SIPLUS variants)
Default Status
unknown
Versions
Affected
  • All versions < V2.1.82
Vendor
Siemens AGSiemens
Product
SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants)
Default Status
unknown
Versions
Affected
  • From 0 before * (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC CP 1243-1 IEC (incl. SIPLUS variants)
Default Status
unknown
Versions
Affected
  • All versions
Vendor
Siemens AGSiemens
Product
SIMATIC CP 1243-8 IRC
Default Status
unknown
Versions
Affected
  • All versions < V2.1.82
Vendor
Siemens AGSiemens
Product
SIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants)
Default Status
unknown
Versions
Affected
  • All versions < V1.0.15
Vendor
Siemens AGSiemens
Product
SIMATIC CP 1543-1 (incl. SIPLUS variants)
Default Status
unknown
Versions
Affected
  • All versions < V2.1
Vendor
Siemens AGSiemens
Product
SIMATIC CP 1543SP-1 (incl. SIPLUS variants)
Default Status
unknown
Versions
Affected
  • All versions < V1.0.15
Vendor
Siemens AGSiemens
Product
SIMATIC CP 1604
Default Status
unknown
Versions
Affected
  • All versions < V2.7
Vendor
Siemens AGSiemens
Product
SIMATIC CP 1616
Default Status
unknown
Versions
Affected
  • All versions < V2.7
Vendor
Siemens AGSiemens
Product
SIMATIC CP 343-1 (incl. SIPLUS variants)
Default Status
unknown
Versions
Affected
  • All versions < V3.1.3
Vendor
Siemens AGSiemens
Product
SIMATIC CP 343-1 Advanced (incl. SIPLUS variants)
Default Status
unknown
Versions
Affected
  • All versions
Vendor
Siemens AGSiemens
Product
SIMATIC CP 343-1 Lean (incl. SIPLUS variants)
Default Status
unknown
Versions
Affected
  • All versions < V3.1.3
Vendor
Siemens AGSiemens
Product
SIMATIC CP 443-1 (incl. SIPLUS variants)
Default Status
unknown
Versions
Affected
  • All versions < V3.2.17
Vendor
Siemens AGSiemens
Product
SIMATIC CP 443-1 Advanced (incl. SIPLUS variants)
Default Status
unknown
Versions
Affected
  • All versions < V3.2.17
Vendor
Siemens AGSiemens
Product
SIMATIC CP 443-1 OPC UA
Default Status
unknown
Versions
Affected
  • All versions
Vendor
Siemens AGSiemens
Product
SIMATIC DK-16xx PN IO
Default Status
unknown
Versions
Affected
  • All versions < V2.7
Vendor
Siemens AGSiemens
Product
SIMATIC ET 200AL IM 157-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V1.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC ET 200M (incl. SIPLUS variants)
Default Status
unknown
Versions
Affected
  • All versions
Vendor
Siemens AGSiemens
Product
SIMATIC ET 200MP IM 155-5 PN BA
Default Status
unknown
Versions
Affected
  • From 0 before V4.0.1 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC ET 200MP IM 155-5 PN HF
Default Status
unknown
Versions
Affected
  • From 0 before V4.2.0 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC ET 200MP IM 155-5 PN ST
Default Status
unknown
Versions
Affected
  • From 0 before V4.1.0 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC ET 200pro IM 154-3 PN HF
Default Status
unknown
Versions
Affected
  • From 0 before * (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC ET 200pro IM 154-4 PN HF
Default Status
unknown
Versions
Affected
  • From 0 before * (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC ET 200SP IM 155-6 PN BA
Default Status
unknown
Versions
Affected
  • From 0 before * (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC ET 200SP IM 155-6 PN HF
Default Status
unknown
Versions
Affected
  • From 0 before V4.2.0 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC ET 200SP IM 155-6 PN HS
Default Status
unknown
Versions
Affected
  • From 0 before V4.0.1 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC ET 200SP IM 155-6 PN ST
Default Status
unknown
Versions
Affected
  • From 0 before V4.1.0 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC ET 200SP IM 155-6 PN ST BA
Default Status
unknown
Versions
Affected
  • From 0 before V4.1.0 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC ET200ecoPN, 16DI, DC24V, 8xM12
Default Status
unknown
Versions
Affected
  • All versions
Vendor
Siemens AGSiemens
Product
SIMATIC ET200ecoPN, 16DO DC24V/1,3A, 8xM12
Default Status
unknown
Versions
Affected
  • All versions
Vendor
Siemens AGSiemens
Product
SIMATIC ET200ecoPN, 4AO U/I 4xM12
Default Status
unknown
Versions
Affected
  • All versions
Vendor
Siemens AGSiemens
Product
SIMATIC ET200ecoPN, 8 DIO, DC24V/1,3A, 8xM12
Default Status
unknown
Versions
Affected
  • All versions
Vendor
Siemens AGSiemens
Product
SIMATIC ET200ecoPN, 8 DO, DC24V/2A, 8xM12
Default Status
unknown
Versions
Affected
  • All versions
Vendor
Siemens AGSiemens
Product
SIMATIC ET200ecoPN, 8AI RTD/TC 8xM12
Default Status
unknown
Versions
Affected
  • All versions
Vendor
Siemens AGSiemens
Product
SIMATIC ET200ecoPN, 8AI; 4 U/I; 4 RTD/TC 8xM12
Default Status
unknown
Versions
Affected
  • All versions
Vendor
Siemens AGSiemens
Product
SIMATIC ET200ecoPN, 8DI, DC24V, 4xM12
Default Status
unknown
Versions
Affected
  • All versions
Vendor
Siemens AGSiemens
Product
SIMATIC ET200ecoPN, 8DI, DC24V, 8xM12
Default Status
unknown
Versions
Affected
  • All versions
Vendor
Siemens AGSiemens
Product
SIMATIC ET200ecoPN, 8DO, DC24V/0,5A, 4xM12
Default Status
unknown
Versions
Affected
  • All versions
Vendor
Siemens AGSiemens
Product
SIMATIC ET200ecoPN, 8DO, DC24V/1,3A, 4xM12
Default Status
unknown
Versions
Affected
  • All versions
Vendor
Siemens AGSiemens
Product
SIMATIC ET200ecoPN, 8DO, DC24V/1,3A, 8xM12
Default Status
unknown
Versions
Affected
  • All versions
Vendor
Siemens AGSiemens
Product
SIMATIC ET200ecoPN: IO-Link Master
Default Status
unknown
Versions
Affected
  • All versions
Vendor
Siemens AGSiemens
Product
SIMATIC ET200S (incl. SIPLUS variants)
Default Status
unknown
Versions
Affected
  • All versions
Vendor
Siemens AGSiemens
Product
SIMATIC HMI Comfort Panels, HMI Multi Panels, HMI Mobile Panels (incl. SIPLUS variants)
Default Status
unknown
Versions
Affected
  • All versions < V15.1
Vendor
Siemens AGSiemens
Product
SIMATIC MV420 SR-B
Default Status
unknown
Versions
Affected
  • From 0 before V7.0.6 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC MV420 SR-B Body
Default Status
unknown
Versions
Affected
  • From 0 before V7.0.6 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC MV420 SR-P
Default Status
unknown
Versions
Affected
  • From 0 before V7.0.6 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC MV420 SR-P Body
Default Status
unknown
Versions
Affected
  • From 0 before V7.0.6 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC MV440 HR
Default Status
unknown
Versions
Affected
  • From 0 before V7.0.6 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC MV440 SR
Default Status
unknown
Versions
Affected
  • From 0 before V7.0.6 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC MV440 UR
Default Status
unknown
Versions
Affected
  • From 0 before V7.0.6 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC PN/PN Coupler (incl. SIPLUS NET variants)
Default Status
unknown
Versions
Affected
  • All versions < V4.0
Vendor
Siemens AGSiemens
Product
SIMATIC RF650R
Default Status
unknown
Versions
Affected
  • All versions < V3.0
Vendor
Siemens AGSiemens
Product
SIMATIC RF680R
Default Status
unknown
Versions
Affected
  • All versions < V3.0
Vendor
Siemens AGSiemens
Product
SIMATIC RF685R
Default Status
unknown
Versions
Affected
  • All versions < V3.0
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1200 CPU family (incl. SIPLUS variants)
Default Status
unknown
Versions
Affected
  • All versions < V4.2.1
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)
Default Status
unknown
Versions
Affected
  • All versions < V2.1
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 Software Controller
Default Status
unknown
Versions
Affected
  • All versions < V2.1
Vendor
Siemens AGSiemens
Product
SIMATIC S7-200 SMART
Default Status
unknown
Versions
Affected
  • All versions < V2.3
Vendor
Siemens AGSiemens
Product
SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)
Default Status
unknown
Versions
Affected
  • From 0 before V3.X.14 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
Default Status
unknown
Versions
Affected
  • From 0 before V6.0.7 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-400 PN/DP V6 CPU family (incl. SIPLUS variants)
Default Status
unknown
Versions
Affected
  • From 0 before V6.0.6 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)
Default Status
unknown
Versions
Affected
  • From 0 before V7.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-410 CPU family (incl. SIPLUS variants)
Default Status
unknown
Versions
Affected
  • All versions < V8.2
Vendor
Siemens AGSiemens
Product
SIMATIC TDC CP51M1
Default Status
unknown
Versions
Affected
  • From 0 before V1.1.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC TDC CPU555
Default Status
unknown
Versions
Affected
  • From 0 before V1.1.1 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC Teleservice Adapter IE Advanced
Default Status
unknown
Versions
Affected
  • All versions
Vendor
Siemens AGSiemens
Product
SIMATIC Teleservice Adapter IE Basic
Default Status
unknown
Versions
Affected
  • All versions
Vendor
Siemens AGSiemens
Product
SIMATIC Teleservice Adapter IE Standard
Default Status
unknown
Versions
Affected
  • All versions
Vendor
Siemens AGSiemens
Product
SIMATIC WinAC RTX 2010
Default Status
unknown
Versions
Affected
  • All versions < V2010 SP3
Vendor
Siemens AGSiemens
Product
SIMATIC WinAC RTX F 2010
Default Status
unknown
Versions
Affected
  • All versions < V2010 SP3
Vendor
Siemens AGSiemens
Product
SIMOCODE pro V PROFINET (incl. SIPLUS variants)
Default Status
unknown
Versions
Affected
  • All versions < V2.0.0
Vendor
Siemens AGSiemens
Product
SIMOTION
Default Status
unknown
Versions
Affected
  • All versions < V4.5 HF1
Vendor
Siemens AGSiemens
Product
SINAMICS DCM w. PN
Default Status
unknown
Versions
Affected
  • All versions < V1.4 SP1 HF5
Vendor
Siemens AGSiemens
Product
SINAMICS DCP w. PN
Default Status
unknown
Versions
Affected
  • All versions < V1.2 HF1
Vendor
Siemens AGSiemens
Product
SINAMICS G110M w. PN
Default Status
unknown
Versions
Affected
  • All versions < V4.7 SP6 HF3
Vendor
Siemens AGSiemens
Product
SINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants)
Default Status
unknown
Versions
Affected
  • All versions < V4.7 SP6 HF3
Vendor
Siemens AGSiemens
Product
SINAMICS G130 V4.7 w. PN
Default Status
unknown
Versions
Affected
  • All versions < V4.7 HF27
Vendor
Siemens AGSiemens
Product
SINAMICS G130 V4.8 w. PN
Default Status
unknown
Versions
Affected
  • All versions < V4.8 HF4
Vendor
Siemens AGSiemens
Product
SINAMICS G150 V4.7 w. PN
Default Status
unknown
Versions
Affected
  • V4.7: All versions < V4.7 HF27
Vendor
Siemens AGSiemens
Product
SINAMICS G150 V4.8 w. PN
Default Status
unknown
Versions
Affected
  • All versions < V4.8 HF4
Vendor
Siemens AGSiemens
Product
SINAMICS S110 w. PN
Default Status
unknown
Versions
Affected
  • All versions < V4.4 SP3 HF5
Vendor
Siemens AGSiemens
Product
SINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants)
Default Status
unknown
Versions
Affected
  • All versions < V4.7
Vendor
Siemens AGSiemens
Product
SINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants)
Default Status
unknown
Versions
Affected
  • All versions
Vendor
Siemens AGSiemens
Product
SINAMICS S120 V4.7 w. PN (incl. SIPLUS variants)
Default Status
unknown
Versions
Affected
  • All versions < V4.7 HF27
Vendor
Siemens AGSiemens
Product
SINAMICS S120 V4.8 w. PN (incl. SIPLUS variants)
Default Status
unknown
Versions
Affected
  • All versions < V4.8 HF4
Vendor
Siemens AGSiemens
Product
SINAMICS S150 V4.7 w. PN
Default Status
unknown
Versions
Affected
  • All versions < V4.7 HF27
Vendor
Siemens AGSiemens
Product
SINAMICS S150 V4.8 w. PN
Default Status
unknown
Versions
Affected
  • All versions < V4.8 HF4
Vendor
Siemens AGSiemens
Product
SINAMICS V90 w. PN
Default Status
unknown
Versions
Affected
  • All versions < V1.01
Vendor
Siemens AGSiemens
Product
SINUMERIK 828D V4.5 and prior
Default Status
unknown
Versions
Affected
  • All versions < V4.5 SP6 HF2
Vendor
Siemens AGSiemens
Product
SINUMERIK 828D V4.7
Default Status
unknown
Versions
Affected
  • All versions < V4.7 SP4 HF1
Vendor
Siemens AGSiemens
Product
SINUMERIK 840D sl V4.5 and prior
Default Status
unknown
Versions
Affected
  • All versions < V4.5 SP6 HF2
Vendor
Siemens AGSiemens
Product
SINUMERIK 840D sl V4.7
Default Status
unknown
Versions
Affected
  • All versions < V4.7 SP4 HF1
Vendor
Siemens AGSiemens
Product
SIPLUS ET 200MP IM 155-5 PN HF
Default Status
unknown
Versions
Affected
  • From 0 before V4.2.0 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS ET 200MP IM 155-5 PN HF
Default Status
unknown
Versions
Affected
  • From 0 before V4.2.0 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL
Default Status
unknown
Versions
Affected
  • From 0 before V4.2.0 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS ET 200MP IM 155-5 PN ST
Default Status
unknown
Versions
Affected
  • From 0 before V4.1.0 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS ET 200MP IM 155-5 PN ST TX RAIL
Default Status
unknown
Versions
Affected
  • From 0 before V4.1.0 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS ET 200SP IM 155-6 PN HF
Default Status
unknown
Versions
Affected
  • From 0 before V4.2.0 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS ET 200SP IM 155-6 PN HF
Default Status
unknown
Versions
Affected
  • From 0 before V4.2.0 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL
Default Status
unknown
Versions
Affected
  • From 0 before V4.2.0 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS ET 200SP IM 155-6 PN ST
Default Status
unknown
Versions
Affected
  • From 0 before V4.1.0 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS ET 200SP IM 155-6 PN ST BA
Default Status
unknown
Versions
Affected
  • From 0 before V4.1.0 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL
Default Status
unknown
Versions
Affected
  • From 0 before V4.1.0 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS ET 200SP IM 155-6 PN ST TX RAIL
Default Status
unknown
Versions
Affected
  • From 0 before V4.1.0 (custom)
Vendor
Siemens AGSiemens
Product
SIRIUS ACT 3SU1 interface module PROFINET
Default Status
unknown
Versions
Affected
  • All versions < V1.1.0
Vendor
Siemens AGSiemens
Product
SIRIUS Motor Starter M200D PROFINET
Default Status
unknown
Versions
Affected
  • All versions
Vendor
Siemens AGSiemens
Product
SIRIUS Soft Starter 3RW44 PN
Default Status
unknown
Versions
Affected
  • All versions
Vendor
Siemens AGSiemens
Product
SITOP PSU8600 PROFINET
Default Status
unknown
Versions
Affected
  • All versions < V1.2.0
Vendor
Siemens AGSiemens
Product
SITOP UPS1600 PROFINET (incl. SIPLUS variants)
Default Status
unknown
Versions
Affected
  • All versions < V2.2.0
Vendor
Siemens AGSiemens
Product
Softnet PROFINET IO for PC-based Windows systems
Default Status
unknown
Versions
Affected
  • All versions < V14 SP1
Problem Types
TypeCWE IDDescription
CWECWE-400CWE-400: Uncontrolled Resource Consumption
Type: CWE
CWE ID: CWE-400
Description: CWE-400: Uncontrolled Resource Consumption
Metrics
VersionBase scoreBase severityVector
3.16.5MEDIUM
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
4.07.1HIGH
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Version: 4.0
Base score: 7.1
Base severity: HIGH
Vector:
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securitytracker.com/id/1038463
vdb-entry
x_refsource_SECTRACK
http://www.securityfocus.com/bid/98369
vdb-entry
x_refsource_BID
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-293562.pdf
x_refsource_CONFIRM
https://cert-portal.siemens.com/productcert/pdf/ssa-293562.pdf
x_refsource_MISC
https://cert-portal.siemens.com/productcert/html/ssa-293562.html
N/A
Hyperlink: http://www.securitytracker.com/id/1038463
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.securityfocus.com/bid/98369
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-293562.pdf
Resource:
x_refsource_CONFIRM
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-293562.pdf
Resource:
x_refsource_MISC
Hyperlink: https://cert-portal.siemens.com/productcert/html/ssa-293562.html
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securitytracker.com/id/1038463
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.securityfocus.com/bid/98369
vdb-entry
x_refsource_BID
x_transferred
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-293562.pdf
x_refsource_CONFIRM
x_transferred
https://cert-portal.siemens.com/productcert/pdf/ssa-293562.pdf
x_refsource_MISC
x_transferred
https://cert-portal.siemens.com/productcert/html/ssa-293562.html
x_transferred
Hyperlink: http://www.securitytracker.com/id/1038463
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.securityfocus.com/bid/98369
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-293562.pdf
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-293562.pdf
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://cert-portal.siemens.com/productcert/html/ssa-293562.html
Resource:
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:productcert@siemens.com
Published At:11 May, 2017 | 10:29
Updated At:20 Apr, 2025 | 01:37

Specially crafted PROFINET DCP packets sent on a local Ethernet segment (Layer 2) to an affected product could cause a denial of service condition of that product. Human interaction is required to recover the system. PROFIBUS interfaces are not affected.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.07.1HIGH
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Secondary3.16.5MEDIUM
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Primary3.16.5MEDIUM
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Primary2.06.1MEDIUM
AV:A/AC:L/Au:N/C:N/I:N/A:C
Type: Secondary
Version: 4.0
Base score: 7.1
Base severity: HIGH
Vector:
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 2.0
Base score: 6.1
Base severity: MEDIUM
Vector:
AV:A/AC:L/Au:N/C:N/I:N/A:C
CPE Matches

Siemens AG
siemens
>>simatic_cp_343-1_std_firmware>>Versions before 3.1.3(exclusive)
cpe:2.3:o:siemens:simatic_cp_343-1_std_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_cp_343-1_std>>-
cpe:2.3:h:siemens:simatic_cp_343-1_std:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_cp_343-1_lean_firmware>>Versions before 3.1.3(exclusive)
cpe:2.3:o:siemens:simatic_cp_343-1_lean_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_cp_343-1_lean>>-
cpe:2.3:h:siemens:simatic_cp_343-1_lean:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_cp_343-1_adv_firmware>>*
cpe:2.3:o:siemens:simatic_cp_343-1_adv_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_cp_343-1_adv>>-
cpe:2.3:h:siemens:simatic_cp_343-1_adv:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_cp_443-1_std_firmware>>Versions before 3.2.17(exclusive)
cpe:2.3:o:siemens:simatic_cp_443-1_std_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_cp_443-1_std>>-
cpe:2.3:h:siemens:simatic_cp_443-1_std:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_cp_443-1_adv_firmware>>Versions before 3.2.17(exclusive)
cpe:2.3:o:siemens:simatic_cp_443-1_adv_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_cp_443-1_adv>>-
cpe:2.3:h:siemens:simatic_cp_443-1_adv:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_cp_443-1_opc-ua_firmware>>*
cpe:2.3:o:siemens:simatic_cp_443-1_opc-ua_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_cp_443-1_opc-ua>>-
cpe:2.3:h:siemens:simatic_cp_443-1_opc-ua:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_cp_1243-1_firmware>>Versions before 2.1.82(exclusive)
cpe:2.3:o:siemens:simatic_cp_1243-1_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_cp_1243-1>>-
cpe:2.3:h:siemens:simatic_cp_1243-1:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_cm_1542-1_firmware>>Versions before 2.0(exclusive)
cpe:2.3:o:siemens:simatic_cm_1542-1_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_cm_1542-1>>-
cpe:2.3:h:siemens:simatic_cm_1542-1:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_cp_1543sp-1_firmware>>Versions before 1.0.15(exclusive)
cpe:2.3:o:siemens:simatic_cp_1543sp-1_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_cp_1542sp-1>>-
cpe:2.3:h:siemens:simatic_cp_1542sp-1:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_cp_1542sp-1_irc_firmware>>Versions before 1.0.15(exclusive)
cpe:2.3:o:siemens:simatic_cp_1542sp-1_irc_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_cp_1542sp-1_irc>>-
cpe:2.3:h:siemens:simatic_cp_1542sp-1_irc:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_cp_1543sp-1_firmware>>Versions before 2.1(exclusive)
cpe:2.3:o:siemens:simatic_cp_1543sp-1_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_cp_1543sp-1>>-
cpe:2.3:h:siemens:simatic_cp_1543sp-1:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_cp_1543-1_firmware>>Versions before 1.0.15(exclusive)
cpe:2.3:o:siemens:simatic_cp_1543-1_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_cp_1543-1>>-
cpe:2.3:h:siemens:simatic_cp_1543-1:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_rf650r_firmware>>Versions before 3.0(exclusive)
cpe:2.3:o:siemens:simatic_rf650r_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_rf650r>>-
cpe:2.3:h:siemens:simatic_rf650r:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_rf680r_firmware>>Versions before 3.0(exclusive)
cpe:2.3:o:siemens:simatic_rf680r_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_rf680r>>-
cpe:2.3:h:siemens:simatic_rf680r:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_rf685r_firmware>>Versions before 3.0(exclusive)
cpe:2.3:o:siemens:simatic_rf685r_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_rf685r>>-
cpe:2.3:h:siemens:simatic_rf685r:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_cp_1616_firmware>>Versions before 2.7(exclusive)
cpe:2.3:o:siemens:simatic_cp_1616_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_cp_1616>>-
cpe:2.3:h:siemens:simatic_cp_1616:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_cp_1604_firmware>>Versions before 2.7(exclusive)
cpe:2.3:o:siemens:simatic_cp_1604_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_cp_1604>>-
cpe:2.3:h:siemens:simatic_cp_1604:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_dk-16xx_pn_io_firmware>>Versions before 2.7(exclusive)
cpe:2.3:o:siemens:simatic_dk-16xx_pn_io_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_dk-16xx_pn_io>>-
cpe:2.3:h:siemens:simatic_dk-16xx_pn_io:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>scalance_x200_firmware>>Versions before 5.2.2(exclusive)
cpe:2.3:o:siemens:scalance_x200_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>scalance_x200>>-
cpe:2.3:h:siemens:scalance_x200:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>scalance_x200_irt_firmware>>Versions before 5.4.0(exclusive)
cpe:2.3:o:siemens:scalance_x200_irt_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>scalance_x200_irt>>-
cpe:2.3:h:siemens:scalance_x200_irt:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>scalance_x300_firmware>>Versions before 4.1.0(exclusive)
cpe:2.3:o:siemens:scalance_x300_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>scalance_x300>>-
cpe:2.3:h:siemens:scalance_x300:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>scalance_x408_firmware>>Versions before 4.1.0(exclusive)
cpe:2.3:o:siemens:scalance_x408_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>scalance_x408>>-
cpe:2.3:h:siemens:scalance_x408:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>scalance_x414_firmware>>Versions before 3.10.2(exclusive)
cpe:2.3:o:siemens:scalance_x414_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>scalance_x414>>-
cpe:2.3:h:siemens:scalance_x414:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>scalance_xm400_firmware>>Versions before 6.1(exclusive)
cpe:2.3:o:siemens:scalance_xm400_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>scalance_xm400>>-
cpe:2.3:h:siemens:scalance_xm400:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>scalance_xr500_firmware>>Versions before 6.1(exclusive)
cpe:2.3:o:siemens:scalance_xr500_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>scalance_xr500>>-
cpe:2.3:h:siemens:scalance_xr500:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-400Secondaryproductcert@siemens.com
CWE-400Primarynvd@nist.gov
CWE ID: CWE-400
Type: Secondary
Source: productcert@siemens.com
CWE ID: CWE-400
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.securityfocus.com/bid/98369productcert@siemens.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1038463productcert@siemens.com
Third Party Advisory
VDB Entry
https://cert-portal.siemens.com/productcert/html/ssa-293562.htmlproductcert@siemens.com
N/A
https://cert-portal.siemens.com/productcert/pdf/ssa-293562.pdfproductcert@siemens.com
Vendor Advisory
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-293562.pdfproductcert@siemens.com
Broken Link
http://www.securityfocus.com/bid/98369af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1038463af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
https://cert-portal.siemens.com/productcert/html/ssa-293562.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://cert-portal.siemens.com/productcert/pdf/ssa-293562.pdfaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-293562.pdfaf854a3a-2127-422b-91ae-364da2661108
Broken Link
Hyperlink: http://www.securityfocus.com/bid/98369
Source: productcert@siemens.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1038463
Source: productcert@siemens.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://cert-portal.siemens.com/productcert/html/ssa-293562.html
Source: productcert@siemens.com
Resource: N/A
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-293562.pdf
Source: productcert@siemens.com
Resource:
Vendor Advisory
Hyperlink: https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-293562.pdf
Source: productcert@siemens.com
Resource:
Broken Link
Hyperlink: http://www.securityfocus.com/bid/98369
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1038463
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://cert-portal.siemens.com/productcert/html/ssa-293562.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-293562.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-293562.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link

Change History

0
Information is not available yet

Similar CVEs

122Records found

CVE-2023-39610
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.09% / 26.27%
||
7 Day CHG~0.00%
Published-31 Oct, 2023 | 00:00
Updated-12 Sep, 2024 | 14:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in TP-Link Tapo C100 v1.1.15 Build 211130 Rel.15378n(4555) and before allows attackers to cause a Denial of Service (DoS) via supplying a crafted web request.

Action-Not Available
Vendor-n/aTP-Link Systems Inc.
Product-tapo_c100_firmwaretapo_c100n/atapo_c100
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2019-3874
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.05% / 14.01%
||
7 Day CHG~0.00%
Published-25 Mar, 2019 | 18:30
Updated-04 Aug, 2024 | 19:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are believed to be vulnerable.

Action-Not Available
Vendor-Linux Kernel Organization, IncDebian GNU/LinuxNetApp, Inc.The Linux FoundationRed Hat, Inc.Canonical Ltd.
Product-ubuntu_linuxdebian_linuxlinux_kernelcn1610hci_management_nodeenterprise_linuxcn1610_firmwareactive_iq_unified_manager_for_vmware_vspheresnapprotectsolidfirekernel
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2025-22892
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-7.1||HIGH
EPSS-0.02% / 4.25%
||
7 Day CHG~0.00%
Published-13 May, 2025 | 21:02
Updated-14 May, 2025 | 13:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Uncontrolled resource consumption for some OpenVINO™ model server software maintained by Intel(R) before version 2024.4 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

Action-Not Available
Vendor-n/a
Product-OpenVINO™ model server software maintained by Intel(R)
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2025-21352
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.29% / 51.79%
||
7 Day CHG~0.00%
Published-11 Feb, 2025 | 17:58
Updated-12 Mar, 2025 | 01:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Internet Connection Sharing (ICS) Denial of Service Vulnerability

Internet Connection Sharing (ICS) Denial of Service Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2025 (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2008 R2 Service Pack 1Windows Server 2012 R2 (Server Core installation)Windows Server 2025Windows Server 2012Windows 10 Version 1507Windows 11 version 22H2Windows 10 Version 1607Windows Server 2022Windows Server 2008 Service Pack 2Windows Server 2019Windows Server 2012 (Server Core installation)Windows Server 2008 Service Pack 2 (Server Core installation)Windows 10 Version 21H2Windows 10 Version 22H2Windows 11 Version 23H2Windows Server 2016Windows Server 2012 R2Windows 11 version 22H3Windows Server 2019 (Server Core installation)Windows 10 Version 1809Windows 11 Version 24H2Windows Server 2016 (Server Core installation)Windows Server 2022, 23H2 Edition (Server Core installation)
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2019-15264
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.4||HIGH
EPSS-0.32% / 54.16%
||
7 Day CHG~0.00%
Published-16 Oct, 2019 | 18:36
Updated-21 Nov, 2024 | 19:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Aironet Access Points and Catalyst 9100 Access Points CAPWAP Denial of Service Vulnerability

A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol implementation of Cisco Aironet and Catalyst 9100 Access Points (APs) could allow an unauthenticated, adjacent attacker to cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to improper resource management during CAPWAP message processing. An attacker could exploit this vulnerability by sending a high volume of legitimate wireless management frames within a short time to an affected device. A successful exploit could allow the attacker to cause a device to restart unexpectedly, resulting in a DoS condition for clients associated with the AP.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-aironet_2800aironet_1850_firmwareaironet_4800_firmwareaironet_1800aironet_1560aironet_3800aironet_1540_firmwareaironet_1560_firmwareaironet_3800_firmwareaironet_2800_firmwareaironet_1540catalyst_9100catalyst_9100_firmwareaironet_4800Cisco Aironet Access Point Software
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-57082
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 22.23%
||
7 Day CHG~0.00%
Published-05 Feb, 2025 | 00:00
Updated-18 Feb, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A prototype pollution in the lib.createUploader function of @rpldy/uploader v1.8.1 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2018-16310
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.26% / 49.64%
||
7 Day CHG~0.00%
Published-06 Sep, 2018 | 23:00
Updated-27 Aug, 2024 | 21:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Technicolor TG588V V2 devices allow remote attackers to cause a denial of service (networking outage) via a flood of random MAC addresses, as demonstrated by macof. NOTE: this might overlap CVE-2018-15852 and CVE-2018-15907. NOTE: Technicolor denies that the described behavior is a vulnerability and states that Wi-Fi traffic is slowed or stopped only while the devices are exposed to a MAC flooding attack. This has been confirmed through testing against official up-to-date versions

Action-Not Available
Vendor-technicolorn/atechnicolor
Product-tg588vtg588v_firmwaren/atg588v
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2019-0046
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.11% / 29.88%
||
7 Day CHG~0.00%
Published-11 Jul, 2019 | 19:40
Updated-16 Sep, 2024 | 20:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS: EX4300 Series: Denial of Service upon receipt of large number of specific valid packets on management interface.

A vulnerability in the pfe-chassisd Chassis Manager (CMLC) daemon of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) to the EX4300 when specific valid broadcast packets create a broadcast storm condition when received on the me0 interface of the EX4300 Series device. A reboot of the device is required to restore service. Continued receipt of these valid broadcast packets will create a sustained Denial of Service (DoS) against the device. Affected releases are Juniper Networks Junos OS: 16.1 versions above and including 16.1R1 prior to 16.1R7-S5; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R3; 17.3 versions prior to 17.3R3-S2; 17.4 versions prior to 17.4R2; 18.1 versions prior to 18.1R3; 18.2 versions prior to 18.2R2.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-junosJunos OS
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2019-0038
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.06% / 19.45%
||
7 Day CHG~0.00%
Published-10 Apr, 2019 | 20:13
Updated-17 Sep, 2024 | 01:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SRX Series: Crafted packets destined to fxp0 management interface on SRX340/SRX345 devices can lead to DoS

Crafted packets destined to the management interface (fxp0) of an SRX340 or SRX345 services gateway may create a denial of service (DoS) condition due to buffer space exhaustion. This issue only affects the SRX340 and SRX345 services gateways. No other products or platforms are affected by this vulnerability. Affected releases are Juniper Networks Junos OS: 15.1X49 versions prior to 15.1X49-D160 on SRX340/SRX345; 17.3 on SRX340/SRX345; 17.4 versions prior to 17.4R2-S3, 17.4R3 on SRX340/SRX345; 18.1 versions prior to 18.1R3-S1 on SRX340/SRX345; 18.2 versions prior to 18.2R2 on SRX340/SRX345; 18.3 versions prior to 18.3R1-S2, 18.3R2 on SRX340/SRX345. This issue does not affect Junos OS releases prior to 15.1X49 on any platform.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-junossrx340srx345Junos OS
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2018-15907
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.26% / 49.64%
||
7 Day CHG~0.00%
Published-29 Aug, 2018 | 19:00
Updated-05 Aug, 2024 | 10:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Technicolor (formerly RCA) TC8305C devices allow remote attackers to cause a denial of service (networking outage) via a flood of random MAC addresses, as demonstrated by macof. NOTE: this might overlap CVE-2018-15852 and CVE-2018-16310. NOTE: Technicolor denies that the described behavior is a vulnerability and states that Wi-Fi traffic is slowed or stopped only while the devices are exposed to a MAC flooding attack. This has been confirmed through testing against official up-to-date versions

Action-Not Available
Vendor-technicolorn/a
Product-tc8305ctc8305c_firmwaren/a
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2022-20691
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.05% / 15.21%
||
7 Day CHG~0.00%
Published-07 Dec, 2022 | 16:56
Updated-03 Aug, 2024 | 02:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Cisco Discovery Protocol functionality of Cisco ATA 190 Series Adaptive Telephone Adapter firmware could allow an unauthenticated, adjacent attacker to cause a DoS condition of an affected device. This vulnerability is due to missing length validation of certain Cisco Discovery Protocol packet header fields. An attacker could exploit this vulnerability by sending crafted Cisco Discovery Protocol packets to an affected device. A successful exploit could allow the attacker to cause the device to exhaust available memory and cause the service to restart. Cisco has released firmware updates that address this vulnerability.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ata_192_firmwareata_190ata_190_firmwareata_191_firmwareata_191ata_192Cisco Analog Telephone Adaptor (ATA) Software
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CVE-2018-0063
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.12% / 31.05%
||
7 Day CHG~0.00%
Published-10 Oct, 2018 | 18:00
Updated-16 Sep, 2024 | 18:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS: Nexthop index allocation failed: private index space exhausted after incoming ARP requests to management interface

A vulnerability in the IP next-hop index database in Junos OS 17.3R3 may allow a flood of ARP requests, sent to the management interface, to exhaust the private Internal routing interfaces (IRIs) next-hop limit. Once the IRI next-hop database is full, no further next hops can be learned and existing entries cannot be cleared, leading to a sustained denial of service (DoS) condition. An indicator of compromise for this issue is the report of the following error message: %KERN-4: Nexthop index allocation failed: private index space exhausted This issue only affects the management interface, and does not impact regular transit traffic through the FPCs. This issue also only affects Junos OS 17.3R3. No prior versions of Junos OS are affected by this issue. Affected releases are Juniper Networks Junos OS: 17.3R3.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-junosJunos OS
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2018-0441
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.4||HIGH
EPSS-0.42% / 61.14%
||
7 Day CHG~0.00%
Published-17 Oct, 2018 | 22:00
Updated-26 Nov, 2024 | 14:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS Access Points Software 802.11r Fast Transition Denial of Service Vulnerability

A vulnerability in the 802.11r Fast Transition feature set of Cisco IOS Access Points (APs) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a corruption of certain timer mechanisms triggered by specific roaming events. This corruption will eventually cause a timer crash. An attacker could exploit this vulnerability by sending malicious reassociation events multiple times to the same AP in a short period of time, causing a DoS condition on the affected AP.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-access_pointsCisco Aironet Access Point Software
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2018-0471
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.4||HIGH
EPSS-0.38% / 58.44%
||
7 Day CHG~0.00%
Published-05 Oct, 2018 | 14:00
Updated-26 Nov, 2024 | 14:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software Cisco Discovery Protocol Memory Leak Vulnerability

A vulnerability in the Cisco Discovery Protocol (CDP) module of Cisco IOS XE Software Releases 16.6.1 and 16.6.2 could allow an unauthenticated, adjacent attacker to cause a memory leak that may lead to a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain CDP packets. An attacker could exploit this vulnerability by sending certain CDP packets to an affected device. A successful exploit could cause an affected device to continuously consume memory and eventually result in a memory allocation failure that leads to a crash, triggering a reload of the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeCisco IOS XE Software
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2018-0029
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-5.7||MEDIUM
EPSS-0.15% / 36.64%
||
7 Day CHG~0.00%
Published-11 Jul, 2018 | 18:00
Updated-16 Sep, 2024 | 19:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS: Kernel crash (vmcore) during broadcast storm after enabling 'monitor traffic interface fxp0'

While experiencing a broadcast storm, placing the fxp0 interface into promiscuous mode via the 'monitor traffic interface fxp0' can cause the system to crash and restart (vmcore). This issue only affects Junos OS 15.1 and later releases, and affects both single core and multi-core REs. Releases prior to Junos OS 15.1 are unaffected by this vulnerability. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1F6-S11, 15.1R4-S9, 15.1R6-S6, 15.1R7; 15.1X49 versions prior to 15.1X49-D140; 15.1X53 versions prior to 15.1X53-D59 on EX2300/EX3400; 15.1X53 versions prior to 15.1X53-D67 on QFX10K; 15.1X53 versions prior to 15.1X53-D233 on QFX5200/QFX5110; 15.1X53 versions prior to 15.1X53-D471, 15.1X53-D490 on NFX; 16.1 versions prior to 16.1R3-S8, 16.1R5-S4, 16.1R6-S1, 16.1R7; 16.2 versions prior to 16.2R1-S6, 16.2R2-S5, 16.2R3; 17.1 versions prior to 17.1R1-S7, 17.1R2-S7, 17.1R3; 17.2 versions prior to 17.2R1-S6, 17.2R2-S4, 17.2R3; 17.2X75 versions prior to 17.2X75-D90, 17.2X75-D110; 17.3 versions prior to 17.3R1-S4, 17.3R2; 17.4 versions prior to 17.4R1-S3, 17.4R2.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-qfx5200nfx250junosqfx5110ex3400ex2300Junos OS
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2021-31365
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.08% / 24.46%
||
7 Day CHG~0.00%
Published-19 Oct, 2021 | 18:16
Updated-16 Sep, 2024 | 20:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS: EX2300, EX3400 and EX4300 Series: An Aggregated Ethernet (AE) interface will go down due to a stream of specific layer 2 frames

An Uncontrolled Resource Consumption vulnerability in Juniper Networks Junos OS on EX2300, EX3400 and EX4300 Series platforms allows an adjacent attacker sending a stream of layer 2 frames will trigger an Aggregated Ethernet (AE) interface to go down and thereby causing a Denial of Service (DoS). By continuously sending a stream of specific layer 2 frames an attacker will sustain the Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS EX4300 Series All versions prior to 15.1R7-S7; 16.1 versions prior to 16.1R7-S8; 17.1 versions prior to 17.1R2-S12; 17.2 versions prior to 17.2R3-S4; 17.3 versions prior to 17.3R3-S8; 17.4 versions prior to 17.4R2-S10, 17.4R3-S2; 18.1 versions prior to 18.1R3-S10; 18.2 versions prior to 18.2R2-S7, 18.2R3-S3; 18.3 versions prior to 18.3R2-S4, 18.3R3-S2; 18.4 versions prior to 18.4R1-S7, 18.4R2-S4, 18.4R3-S1; 19.1 versions prior to 19.1R1-S5, 19.1R2-S1, 19.1R3; 19.2 versions prior to 19.2R1-S5, 19.2R2; 19.3 versions prior to 19.3R2-S2, 19.3R3; 19.4 versions prior to 19.4R1-S2, 19.4R2. Juniper Networks Junos OS EX3400 and EX4300-MP Series All versions prior to 18.1R3-S12; 18.2 versions prior to 18.2R3-S7; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R2-S9, 18.4R3-S7; 19.1 versions prior to 19.1R2-S3, 19.1R3-S4; 19.2 versions prior to 19.2R3-S1; 19.3 versions prior to 19.3R3-S1; 19.4 versions prior to 19.4R3-S1; 20.1 versions prior to 20.1R3; 20.2 versions prior to 20.2R3; 20.3 versions prior to 20.3R2. Juniper Networks Junos OS EX2300 Series All versions prior to 18.3R3-S5; 18.4 versions prior to 18.4R2-S9, 18.4R3-S9; 19.1 versions prior to 19.1R2-S3, 19.1R3-S6; 19.2 versions prior to 19.2R1-S7, 19.2R3-S3; 19.3 versions prior to 19.3R2-S7, 19.3R3-S3; 19.4 versions prior to 19.4R3-S5; 20.1 versions prior to 20.1R2-S2, 20.1R3-S1; 20.2 versions prior to 20.2R3-S2; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R2-S1, 20.4R3; 21.1 versions prior to 21.1R2.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-ex4300-mpjunosex4300ex3400ex2300Junos OS
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2021-30348
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 22.27%
||
7 Day CHG~0.00%
Published-03 Jan, 2022 | 07:26
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper validation of LLM utility timers availability can lead to denial of service in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwareqca2066mdm9640_firmwaresa6150p_firmwaresm6250p_firmwareqcs610qca8337wcd9360_firmwaresdx65wcn3950_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155qca2062csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwaresa415mwcn3998wcn3950mdm9628sd720gsm6375_firmwarewcn3660bsd460_firmwaresm7315_firmwareqca6574au_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwarewcn3998_firmwareqca6420wcd9360wcn3999qrb5165_firmwaresa8155_firmwaresd662_firmwareqcs405qca6430sc8280xp_firmwarewcd9340sd765gqca6436wcn6851sa6155pqcs603_firmwarepq8009mdm9250_firmwarewcd9341qca2066_firmwareqca6696_firmwaresd750gsd870_firmwareqca1062wcn3910_firmwaresd_8cxsa8150pwsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwarewcn3988sd660_firmwaresa8195p_firmwareqcn7606_firmwarewcn6750_firmwarewcn3610mdm9640sm6375wcn3991qca8337_firmwarewcd9380_firmwaremsm8996au_firmwareqca6564ausdx55m_firmwarewcn6856_firmwareqca6574wcd9380qcs410sd690_5g_firmwareqca9379_firmwareqca6430_firmwarewcd9335_firmwarewcn3980qcs605wcd9340_firmwarewsa8815wcn6850sd7cwcn3910qca6584_firmwaremdm9650_firmwareqca6426_firmwarewcn3660b_firmwarewcn3980_firmwaresd730sdx55mqca2062_firmwarewcn6740_firmwaresd678_firmwareapq8064au_firmwarear8031_firmwareqrb5165wcn6851_firmwareqcs603qca6564a_firmwareqcm4290_firmwaresd480sd870wcn6855qcn7605_firmwareqcs610_firmwaresa6145pqca9886_firmwaresdxr1apq8096auar8031qcs405_firmwaresa8145pqca6391_firmwareqca2064sd780g_firmwarewcd9370_firmwaresdx55sd888_firmwarepq8009_firmwaresc8280xpsa8155pcsra6640sd675qca9379ar8035_firmwareqcm2290qcn7606wcn3991_firmwarewsa8830sd678sa8145p_firmwareqca1062_firmwareqcs2290_firmwaresd7c_firmwarecsrb31024mdm9628_firmwaremdm9650csra6620qcs4290mdm9250sd765g_firmwareqca6420_firmwareqca6390_firmwareqca2064_firmwaresd690_5gsd730_firmwarewcd9370sd675_firmwareqca6564qca6426wcn3990_firmwareqrb5165n_firmwaresm8450qca9377sd_8cx_firmwareqcn7605sdxr2_5g_firmwarewcd9385_firmwarewcd9326_firmwareqca2065sd662qca1064sa8155qca6584sdx55_firmwareqca6595auwcn3999_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwareqrb5165nqca6564au_firmwaresd778gsa6155p_firmwaresm6225sa515m_firmwareqcs6490sdxr2_5gmdm9607_firmwaresa415m_firmwarewcn3988_firmwaresa6145p_firmwaresm6250sd778g_firmwaresa8195papq8017_firmwarewsa8810_firmwaresm8450_firmwaresd765_firmwarewcd9326wcd9335qca8081qca6174a_firmwareqcs4290_firmwarewcd9385qca2065_firmwareqcs6490_firmwarear8035qca6390sd750g_firmwareapq8064auaqt1000wcd9375sm6250_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewsa8815_firmwarewsa8835_firmwareapq8017qcx315qca6564aqcm2290_firmwarewcn3990sd_675sd780gsd865_5gsm8450p_firmwaresd888wsa8835qcx315_firmwaremsm8996ausd665_firmwaresd888_5gsm6250pqca6574awcn6855_firmwareqca6174asm7325pwcn6750sa515mqca6574_firmwareqca9886sd855sm7325p_firmwaresd665qca6175asd765qca6574a_firmwaresd768g_firmwaresd850_firmwaresm7315sd460qca6391sdxr1_firmwareaqt1000_firmwaresdx65_firmwareqcm4290csrb31024_firmwareqcm6490_firmwaresd480_firmwaresm6225_firmwareqca6574ausa8155p_firmwaremdm9607wcd9341_firmwarewsa8810sm8450pwcn6856qca6564_firmwaresd768gqca1064_firmwarewcn6740qca6696sd845_firmwaresa6150papq8096au_firmwaresd845sm7250psd720g_firmwareqcs410_firmwareqca6175a_firmwaresd850Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-43763
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 8.79%
||
7 Day CHG~0.00%
Published-21 Jan, 2025 | 23:04
Updated-22 Apr, 2025 | 14:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In build_read_multi_rsp of gatt_sr.cc, there is a possible denial of service due to a logic error in the code. This could lead to remote (proximal/adjacent) denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2021-1563
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.10% / 28.44%
||
7 Day CHG~0.00%
Published-04 Jun, 2021 | 16:46
Updated-07 Nov, 2024 | 22:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Video Surveillance 7000 Series IP Cameras Cisco Discovery and Link Layer Discovery Protocol Memory Leak Vulnerabilities

Multiple vulnerabilities in the implementation of the Cisco Discovery Protocol and Link Layer Discovery Protocol (LLDP) for Cisco Video Surveillance 7000 Series IP Cameras could allow an unauthenticated, adjacent attacker to cause a memory leak, which could lead to a denial of service (DoS) condition on an affected device. These vulnerabilities are due to incorrect processing of certain Cisco Discovery Protocol and LLDP packets at ingress time. An attacker could exploit these vulnerabilities by sending crafted Cisco Discovery Protocol or LLDP packets to an affected device. A successful exploit could allow the attacker to cause the affected device to continuously consume memory, which could cause the device to crash and reload, resulting in a DoS condition. Note: Cisco Discovery Protocol and LLDP are Layer 2 protocols. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-video_surveillance_7530pd_firmwarevideo_surveillance_7530pdvideo_surveillance_7070video_surveillance_7070_firmwareCisco Video Surveillance 7000 Series IP Cameras
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CVE-2021-0292
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.08% / 24.46%
||
7 Day CHG~0.00%
Published-15 Jul, 2021 | 20:01
Updated-16 Sep, 2024 | 17:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS Evolved: Memory leak in arpd or ndp processes can lead to Denial of Service (DoS)

An Uncontrolled Resource Consumption vulnerability in the ARP daemon (arpd) and Network Discovery Protocol (ndp) process of Juniper Networks Junos OS Evolved allows a malicious attacker on the local network to consume memory resources, ultimately resulting in a Denial of Service (DoS) condition. Link-layer functions such as IPv4 and/or IPv6 address resolution may be impacted, leading to traffic loss. The processes do not recover on their own and must be manually restarted. Changes in memory usage can be monitored using the following shell commands (header shown for clarity): user@router:/var/log# ps aux | grep arpd USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND root 31418 59.0 0.7 *5702564* 247952 ? xxx /usr/sbin/arpd --app-name arpd -I object_select --shared-objects-mode 3 user@router:/var/log# ps aux | grep arpd USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND root 31418 49.1 1.0 *5813156* 351184 ? xxx /usr/sbin/arpd --app-name arpd -I object_select --shared-objects-mode 3 Memory usage can be monitored for the ndp process in a similar fashion: user@router:/var/log# ps aux | grep ndp USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND root 14935 0.0 0.1 *5614052* 27256 ? Ssl Jun15 0:17 /usr/sbin/ndp -I no_tab_chk,object_select --app-name ndp --shared-obje user@router:/var/log# ps aux | grep ndp USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND root 14935 0.0 0.1 *5725164* 27256 ? Ssl Jun15 0:17 /usr/sbin/ndp -I no_tab_chk,object_select --app-name ndp --shared-obje This issue affects Juniper Networks Junos OS Evolved: 19.4 versions prior to 19.4R2-S3-EVO; 20.1 versions prior to 20.1R2-S4-EVO; all versions of 20.2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 19.4R2-EVO.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-junos_os_evolvedJunos OS Evolved
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2021-0257
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.08% / 24.46%
||
7 Day CHG~0.00%
Published-22 Apr, 2021 | 19:37
Updated-17 Sep, 2024 | 01:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS: MX Series, EX9200 Series: Trio-based MPCs memory leak in VPLS with integrated routing and bridging (IRB) interface

On Juniper Networks MX Series and EX9200 Series platforms with Trio-based MPCs (Modular Port Concentrators) where Integrated Routing and Bridging (IRB) interfaces are configured and mapped to a VPLS instance or a Bridge-Domain, certain Layer 2 network events at Customer Edge (CE) devices may cause memory leaks in the MPC of Provider Edge (PE) devices which can cause an out of memory condition and MPC restart. When this issue occurs, there will be temporary traffic interruption until the MPC is restored. An administrator can use the following CLI command to monitor the status of memory usage level of the MPC: user@device> show system resource-monitor fpc FPC Resource Usage Summary Free Heap Mem Watermark : 20 % Free NH Mem Watermark : 20 % Free Filter Mem Watermark : 20 % * - Watermark reached Slot # % Heap Free RTT Average RTT 1 87 PFE # % ENCAP mem Free % NH mem Free % FW mem Free 0 NA 88 99 1 NA 89 99 When the issue is occurring, the value of “% NH mem Free” will go down until the MPC restarts. This issue affects MX Series and EX9200 Series with Trio-based PFEs (Packet Forwarding Engines), including MX-MPC1-3D, MX-MPC1E-3D, MX-MPC2-3D, MX-MPC2E-3D, MPC-3D-16XGE, and CHAS-MXxx Series MPCs. No other products or platforms are affected by this issue. This issue affects Juniper Networks Junos OS on MX Series, EX9200 Series: 17.3 versions prior to 17.3R3-S10; 17.4 versions prior to 17.4R3-S3; 18.2 versions prior to 18.2R3-S7; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R3-S6; 19.2 versions prior to 19.2R3-S2; 19.3 versions prior to 19.3R3-S1; 19.4 versions prior to 19.4R2-S2, 19.4R3; 20.2 versions prior to 20.2R1-S3, 20.2R2; 20.3 versions prior to 20.3R1-S1,, 20.3R2. This issue does not affect Juniper Networks Junos OS: 17.3 versions prior to 17.3R3-S8; 17.4 versions prior to 17.4R3-S2; 18.1; 18.2 versions prior to 18.2R3-S4; 18.3 versions prior to 18.3R3-S2; 18.4 versions prior to 18.4R3-S1; 19.1; 19.2 versions prior to 19.2R2; 19.3 versions prior to 19.3R3; 19.4 versions prior to 19.4R2.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-mx2008mx960mx240mx10008mx150ex9200mx10mx2020mx10003mx10016mx2010mx5mx204mx480mx104junosmx80mx40Junos OS
CWE ID-CWE-400
Uncontrolled Resource Consumption
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CVE-2020-3487
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.4||HIGH
EPSS-0.10% / 28.44%
||
7 Day CHG~0.00%
Published-24 Sep, 2020 | 17:52
Updated-13 Nov, 2024 | 17:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Denial of Service Vulnerabilities

Multiple vulnerabilities in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol processing of Cisco IOS XE Software for Cisco Catalyst 9800 Series Wireless Controllers could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition of an affected device. These vulnerabilities are due to insufficient validation of CAPWAP packets. An attacker could exploit these vulnerabilities by sending a malformed CAPWAP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to crash and reload, resulting in a DoS condition on the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xecatalyst_9120_apcatalyst_9800-lcatalyst_9130_apcatalyst_9800-40catalyst_9800_embedded_wireless_controllercatalyst_9800-clcatalyst_9117_apcatalyst_9800-80catalyst_9115_apCisco IOS XE Software
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-400
Uncontrolled Resource Consumption
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found