First published: Thu Apr 22 2021(Updated: )
A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (All versions including affected IPv6 stack). The function that processes the Hop-by-Hop extension header in IPv6 packets and its options lacks any checks against the length field of the header, allowing attackers to put the function into an infinite loop by supplying arbitrary length values.
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Capital Vstar | ||
Siemens Nucleus NET | ||
Siemens Nucleus ReadyStart v3 | <2017.02.4 | |
Siemens Nucleus ReadyStart v4 | <4.1.0 | |
Siemens Nucleus Source Code | ||
Siemens Capital VSTAR: Versions including the affected IPv6 stack | ||
Siemens Nucleus NET | ||
Siemens Nucleus ReadyStart v3 | <2017.02.4 | 2017.02.4 |
Siemens Nucleus ReadyStart v4 | <4.1.0 | 4.1.0 |
Siemens Nucleus Source Code: Versions including the affected IPv6 stack |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-25664 is high, with a severity value of 7.5.
The following software versions are affected: Siemens Capital Vstar, Siemens Nucleus Net, Siemens Nucleus Readystart V3 (versions up to exclusive version 2017.02.4), Siemens Nucleus Readystart V4 (versions up to exclusive version 4.1.0), and Siemens Nucleus Source Code.
To fix CVE-2021-25664, Siemens recommends following the instructions provided in the associated security advisory.
You can find more information about CVE-2021-25664 in the Siemens ProductCERT advisory and the US-CERT advisory.
The CWE for CVE-2021-25664 is CWE-835.