ID

VAR-202105-0690


CVE

CVE-2021-27384


TITLE

Vulnerabilities in access to memory areas after buffer termination in multiple Siemens products

Trust: 0.8

sources: JVNDB: JVNDB-2021-006949

DESCRIPTION

A vulnerability has been identified in SIMATIC HMI Comfort Outdoor Panels V15 7\" & 15\" (incl. SIPLUS variants) (All versions < V15.1 Update 6), SIMATIC HMI Comfort Outdoor Panels V16 7\" & 15\" (incl. SIPLUS variants) (All versions < V16 Update 4), SIMATIC HMI Comfort Panels V15 4\" - 22\" (incl. SIPLUS variants) (All versions < V15.1 Update 6), SIMATIC HMI Comfort Panels V16 4\" - 22\" (incl. SIPLUS variants) (All versions < V16 Update 4), SIMATIC HMI KTP Mobile Panels V15 KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V15.1 Update 6), SIMATIC HMI KTP Mobile Panels V16 KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V16 Update 4), SIMATIC WinCC Runtime Advanced V15 (All versions < V15.1 Update 6), SIMATIC WinCC Runtime Advanced V16 (All versions < V16 Update 4), SINAMICS GH150 (All versions), SINAMICS GL150 (with option X30) (All versions), SINAMICS GM150 (with option X30) (All versions), SINAMICS SH150 (All versions), SINAMICS SL150 (All versions), SINAMICS SM120 (All versions), SINAMICS SM150 (All versions), SINAMICS SM150i (All versions). SmartVNC has an out-of-bounds memory access vulnerability in the device layout handler, represented by a binary data stream on client side, which can potentially result in code execution. Several Siemens products are vulnerable to access to memory areas after buffer termination.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Siemens SmartVNC is an industrial control equipment of Siemens (Siemens), Germany. Siemens SmartVNC has an out-of-bounds memory access vulnerability. Remote attackers can use the vulnerability to submit special requests, which can crash the application or execute arbitrary code in the context of the application. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Trust: 2.79

sources: NVD: CVE-2021-27384 // JVNDB: JVNDB-2021-006949 // CNVD: CNVD-2021-37750 // CNNVD: CNNVD-202104-975 // VULMON: CVE-2021-27384

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-37750

AFFECTED PRODUCTS

vendor:siemensmodel:simatic wincc runtime advancedscope:eqversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp700fscope:eqversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp400fscope:ltversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort outdoor panels 15\"scope:eqversion:16

Trust: 1.0

vendor:siemensmodel:simatic wincc runtime advancedscope:eqversion:15.1

Trust: 1.0

vendor:siemensmodel:sinamics sl150scope:eqversion:*

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp700fscope:eqversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp900fscope:ltversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp900scope:eqversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort outdoor panels 15\"scope:eqversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort outdoor panels 7\"scope:eqversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort panels 4\"scope:eqversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp700fscope:ltversion:16

Trust: 1.0

vendor:siemensmodel:sinamics gm150scope:eqversion:*

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp700scope:eqversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp900fscope:ltversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp900scope:eqversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort panels 22\"scope:eqversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort outdoor panels 7\"scope:eqversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic wincc runtime advancedscope:ltversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort panels 4\"scope:eqversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp700fscope:ltversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp700scope:eqversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp900scope:ltversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp400fscope:eqversion:16

Trust: 1.0

vendor:siemensmodel:sinamics sm150scope:eqversion:*

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort panels 22\"scope:eqversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort outdoor panels 15\"scope:ltversion:16

Trust: 1.0

vendor:siemensmodel:sinamics sm150iscope:eqversion:*

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort panels 4\"scope:ltversion:16

Trust: 1.0

vendor:siemensmodel:simatic wincc runtime advancedscope:ltversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort outdoor panels 15\"scope:ltversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp900scope:ltversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp400fscope:eqversion:15.1

Trust: 1.0

vendor:siemensmodel:sinamics gh150scope:eqversion:*

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort outdoor panels 7\"scope:ltversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort panels 4\"scope:ltversion:15.1

Trust: 1.0

vendor:siemensmodel:sinamics gl150scope:eqversion:*

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp700scope:ltversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp900fscope:eqversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort panels 22\"scope:ltversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort outdoor panels 7\"scope:ltversion:15.1

Trust: 1.0

vendor:siemensmodel:sinamics sm120scope:eqversion:*

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp700scope:ltversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp900fscope:eqversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp400fscope:ltversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort panels 22\"scope:ltversion:15.1

Trust: 1.0

vendor:siemensmodel:sinamics sh150scope:eqversion:*

Trust: 1.0

vendor:シーメンスmodel:sinamics sh150scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:sinamics sl150scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:sinamics sm120scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:sinamics sm150iscope: - version: -

Trust: 0.8

vendor:シーメンスmodel:simatic hmi comfort outdoor panels 7"scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:sinamics gh150scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:sinamics sm150scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:sinamics gl150scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:sinamics gm150scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:simatic wincc runtime advancedscope: - version: -

Trust: 0.8

vendor:siemensmodel:smartvncscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2021-37750 // JVNDB: JVNDB-2021-006949 // NVD: CVE-2021-27384

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-27384
value: CRITICAL

Trust: 1.0

NVD: CVE-2021-27384
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2021-37750
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202104-975
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202105-548
value: CRITICAL

Trust: 0.6

VULMON: CVE-2021-27384
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-27384
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2021-37750
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2021-27384
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2021-27384
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-37750 // VULMON: CVE-2021-27384 // JVNDB: JVNDB-2021-006949 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202105-548 // NVD: CVE-2021-27384

PROBLEMTYPE DATA

problemtype:CWE-788

Trust: 1.0

problemtype:Access to memory area after buffer termination (CWE-788) [ Other ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-006949 // NVD: CVE-2021-27384

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202105-548

TYPE

other

Trust: 1.2

sources: CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202105-548

PATCH

title:SSA-286838 Siemens Security Advisoryurl:https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf

Trust: 0.8

title:Patch for Siemens SmartVNC memory out-of-bounds access vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/268666

Trust: 0.6

title:Siemens SmartVNC Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=155975

Trust: 0.6

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=43c9c77785b8d29daef02185f41ca476

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=9465a8ef1f8c1b0042244cb02cfe271e

Trust: 0.1

sources: CNVD: CNVD-2021-37750 // VULMON: CVE-2021-27384 // JVNDB: JVNDB-2021-006949 // CNNVD: CNNVD-202105-548

EXTERNAL IDS

db:NVDid:CVE-2021-27384

Trust: 3.9

db:ICS CERTid:ICSA-21-131-11

Trust: 2.5

db:SIEMENSid:SSA-286838

Trust: 1.7

db:SIEMENSid:SSA-538778

Trust: 1.6

db:ICS CERTid:ICSA-21-131-12

Trust: 1.2

db:JVNid:JVNVU91051134

Trust: 0.8

db:JVNDBid:JVNDB-2021-006949

Trust: 0.8

db:CNVDid:CNVD-2021-37750

Trust: 0.6

db:CS-HELPid:SB2021041363

Trust: 0.6

db:CNNVDid:CNNVD-202104-975

Trust: 0.6

db:CS-HELPid:SB2021051206

Trust: 0.6

db:ICS CERTid:ICSA-21-131-04

Trust: 0.6

db:CNNVDid:CNNVD-202105-548

Trust: 0.6

db:VULMONid:CVE-2021-27384

Trust: 0.1

sources: CNVD: CNVD-2021-37750 // VULMON: CVE-2021-27384 // JVNDB: JVNDB-2021-006949 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202105-548 // NVD: CVE-2021-27384

REFERENCES

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-131-11

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf

Trust: 1.6

url:https://cert-portal.siemens.com/productcert/pdf/ssa-538778.pdf

Trust: 1.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-131-12

Trust: 1.2

url:https://jvn.jp/vu/jvnvu91051134/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2021-27384

Trust: 0.8

url:https://www.cisa.gov/uscert/ics/advisories/icsa-21-131-11

Trust: 0.8

url:https://www.cybersecurity-help.cz/vdb/sb2021041363

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021051206

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-131-04

Trust: 0.6

url:https://vigilance.fr/vulnerability/smartvnc-multiple-vulnerabilities-35360

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/788.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://cert-portal.siemens.com/productcert/txt/ssa-286838.txt

Trust: 0.1

sources: CNVD: CNVD-2021-37750 // VULMON: CVE-2021-27384 // JVNDB: JVNDB-2021-006949 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202105-548 // NVD: CVE-2021-27384

CREDITS

Siemens reported these vulnerabilities to CISA.

Trust: 0.6

sources: CNNVD: CNNVD-202105-548

SOURCES

db:CNVDid:CNVD-2021-37750
db:VULMONid:CVE-2021-27384
db:JVNDBid:JVNDB-2021-006949
db:CNNVDid:CNNVD-202104-975
db:CNNVDid:CNNVD-202105-548
db:NVDid:CVE-2021-27384

LAST UPDATE DATE

2024-08-14T13:12:43.619000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-37750date:2021-05-28T00:00:00
db:VULMONid:CVE-2021-27384date:2021-05-21T00:00:00
db:JVNDBid:JVNDB-2021-006949date:2022-01-26T07:30:00
db:CNNVDid:CNNVD-202104-975date:2021-04-14T00:00:00
db:CNNVDid:CNNVD-202105-548date:2021-10-13T00:00:00
db:NVDid:CVE-2021-27384date:2021-12-16T18:26:10.080

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-37750date:2021-05-28T00:00:00
db:VULMONid:CVE-2021-27384date:2021-05-12T00:00:00
db:JVNDBid:JVNDB-2021-006949date:2022-01-26T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-13T00:00:00
db:CNNVDid:CNNVD-202105-548date:2021-05-11T00:00:00
db:NVDid:CVE-2021-27384date:2021-05-12T14:15:11.677