First published: Mon Mar 08 2021(Updated: )
Oryx Embedded CycloneTCP 1.7.6 to 2.0.0, fixed in 2.0.2, is affected by incorrect input validation, which may cause a denial of service (DoS). To exploit the vulnerability, an attacker needs to have TCP connectivity to the target system. Receiving a maliciously crafted TCP packet from an unauthenticated endpoint is sufficient to trigger the bug.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oryx-embedded Cyclonetcp | >=1.7.6<=2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26788 is a vulnerability in Oryx Embedded CycloneTCP versions 1.7.6 to 2.0.0, which is fixed in version 2.0.2.
CVE-2021-26788 affects Oryx Embedded CycloneTCP by causing incorrect input validation, leading to a potential denial of service (DoS) attack.
To exploit CVE-2021-26788, an attacker needs TCP connectivity to the target system and can send a maliciously crafted TCP packet.
The severity of CVE-2021-26788 is high, with a severity score of 7.5.
To fix CVE-2021-26788, upgrade Oryx Embedded CycloneTCP to version 2.0.2 or later.