First published: Thu Apr 22 2021(Updated: )
A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (Versions including affected DNS modules), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), TALON TC Compact (BACnet) (All versions < V3.5.5), TALON TC Modular (BACnet) (All versions < V3.5.5). The DNS domain name label parsing functionality does not properly validate the null-terminated name in DNS-responses. The parsing of malformed responses could result in a read past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to cause a denial-of-service condition or leak the read memory.
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Nucleus NET | ||
Siemens Nucleus ReadyStart v3 | <2017.02.3 | |
Siemens Nucleus ReadyStart v4 | <4.1.0 | |
Siemens Nucleus Source Code | ||
Siemens Simotics Connect 400 Firmware | <0.5.0.0 | |
Siemens Simotics Connect 400 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-27736 is medium, with a severity value of 6.5.
The affected software versions are APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), Nucleus NET (All versions), Nucleus R.
The CWE ID of CVE-2020-27736 is 125,170.
You can find more information about CVE-2020-27736 at the following references: [Reference 1](https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf), [Reference 2](https://cert-portal.siemens.com/productcert/pdf/ssa-669158.pdf), [Reference 3](https://cert-portal.siemens.com/productcert/pdf/ssa-705111.pdf).
To fix CVE-2020-27736, it is recommended to update the affected software versions to the latest version.