ID

VAR-202105-0691


CVE

CVE-2021-27385


TITLE

Siemens SmartVNC Resource Management Error Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2021-37749 // CNNVD: CNNVD-202105-575

DESCRIPTION

A vulnerability has been identified in SIMATIC HMI Comfort Outdoor Panels V15 7\" & 15\" (incl. SIPLUS variants) (All versions < V15.1 Update 6), SIMATIC HMI Comfort Outdoor Panels V16 7\" & 15\" (incl. SIPLUS variants) (All versions < V16 Update 4), SIMATIC HMI Comfort Panels V15 4\" - 22\" (incl. SIPLUS variants) (All versions < V15.1 Update 6), SIMATIC HMI Comfort Panels V16 4\" - 22\" (incl. SIPLUS variants) (All versions < V16 Update 4), SIMATIC HMI KTP Mobile Panels V15 KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V15.1 Update 6), SIMATIC HMI KTP Mobile Panels V16 KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V16 Update 4), SIMATIC WinCC Runtime Advanced V15 (All versions < V15.1 Update 6), SIMATIC WinCC Runtime Advanced V16 (All versions < V16 Update 4), SINAMICS GH150 (All versions), SINAMICS GL150 (with option X30) (All versions), SINAMICS GM150 (with option X30) (All versions), SINAMICS SH150 (All versions), SINAMICS SL150 (All versions), SINAMICS SM120 (All versions), SINAMICS SM150 (All versions), SINAMICS SM150i (All versions). A remote attacker could send specially crafted packets to SmartVNC device layout handler on client side, which could influence the amount of resources consumed and result in a Denial-of-Service (infinite loop) condition. Several Siemens products contain resource exhaustion vulnerabilities.Denial of service (DoS) It may be put into a state. Siemens SmartVNC is an industrial control equipment of Siemens (Siemens), Germany. SmartVNC has a resource management error vulnerability. Attackers can use this vulnerability to cause program denial of service. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Trust: 2.79

sources: NVD: CVE-2021-27385 // JVNDB: JVNDB-2021-006950 // CNVD: CNVD-2021-37749 // CNNVD: CNNVD-202104-975 // VULMON: CVE-2021-27385

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-37749

AFFECTED PRODUCTS

vendor:siemensmodel:simatic wincc runtime advancedscope:eqversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp700fscope:eqversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp400fscope:ltversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort outdoor panels 15\"scope:eqversion:16

Trust: 1.0

vendor:siemensmodel:simatic wincc runtime advancedscope:eqversion:15.1

Trust: 1.0

vendor:siemensmodel:sinamics sl150scope:eqversion:*

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp700fscope:eqversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp900fscope:ltversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp900scope:eqversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort outdoor panels 15\"scope:eqversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort outdoor panels 7\"scope:eqversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort panels 4\"scope:eqversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp700fscope:ltversion:16

Trust: 1.0

vendor:siemensmodel:sinamics gm150scope:eqversion:*

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp700scope:eqversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp900fscope:ltversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp900scope:eqversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort panels 22\"scope:eqversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort outdoor panels 7\"scope:eqversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic wincc runtime advancedscope:ltversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort panels 4\"scope:eqversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp700fscope:ltversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp700scope:eqversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp900scope:ltversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp400fscope:eqversion:16

Trust: 1.0

vendor:siemensmodel:sinamics sm150scope:eqversion:*

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort panels 22\"scope:eqversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort outdoor panels 15\"scope:ltversion:16

Trust: 1.0

vendor:siemensmodel:sinamics sm150iscope:eqversion:*

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort panels 4\"scope:ltversion:16

Trust: 1.0

vendor:siemensmodel:simatic wincc runtime advancedscope:ltversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort outdoor panels 15\"scope:ltversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp900scope:ltversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp400fscope:eqversion:15.1

Trust: 1.0

vendor:siemensmodel:sinamics gh150scope:eqversion:*

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort outdoor panels 7\"scope:ltversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort panels 4\"scope:ltversion:15.1

Trust: 1.0

vendor:siemensmodel:sinamics gl150scope:eqversion:*

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp700scope:ltversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp900fscope:eqversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort panels 22\"scope:ltversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort outdoor panels 7\"scope:ltversion:15.1

Trust: 1.0

vendor:siemensmodel:sinamics sm120scope:eqversion:*

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp700scope:ltversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp900fscope:eqversion:15.1

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panels ktp400fscope:ltversion:16

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort panels 22\"scope:ltversion:15.1

Trust: 1.0

vendor:siemensmodel:sinamics sh150scope:eqversion:*

Trust: 1.0

vendor:シーメンスmodel:sinamics sh150scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:sinamics sl150scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:sinamics sm120scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:sinamics sm150iscope: - version: -

Trust: 0.8

vendor:シーメンスmodel:simatic hmi comfort outdoor panels 7"scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:sinamics gh150scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:sinamics sm150scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:sinamics gl150scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:sinamics gm150scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:simatic wincc runtime advancedscope: - version: -

Trust: 0.8

vendor:siemensmodel:smartvncscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2021-37749 // JVNDB: JVNDB-2021-006950 // NVD: CVE-2021-27385

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-27385
value: HIGH

Trust: 1.0

NVD: CVE-2021-27385
value: HIGH

Trust: 0.8

CNVD: CNVD-2021-37749
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202105-575
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202104-975
value: MEDIUM

Trust: 0.6

VULMON: CVE-2021-27385
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-27385
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2021-37749
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2021-27385
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2021-27385
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-37749 // VULMON: CVE-2021-27385 // JVNDB: JVNDB-2021-006950 // CNNVD: CNNVD-202105-575 // CNNVD: CNNVD-202104-975 // NVD: CVE-2021-27385

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.0

problemtype:CWE-835

Trust: 1.0

problemtype:Resource exhaustion (CWE-400) [ Other ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-006950 // NVD: CVE-2021-27385

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202105-575

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-202105-575

PATCH

title:SSA-286838 Siemens Security Advisoryurl:https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf

Trust: 0.8

title:Patch for Siemens SmartVNC Resource Management Error Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/268656

Trust: 0.6

title:Siemens SmartVNC Remediation of resource management error vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=151561

Trust: 0.6

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=43c9c77785b8d29daef02185f41ca476

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=9465a8ef1f8c1b0042244cb02cfe271e

Trust: 0.1

sources: CNVD: CNVD-2021-37749 // VULMON: CVE-2021-27385 // JVNDB: JVNDB-2021-006950 // CNNVD: CNNVD-202105-575

EXTERNAL IDS

db:NVDid:CVE-2021-27385

Trust: 3.9

db:ICS CERTid:ICSA-21-131-12

Trust: 3.1

db:SIEMENSid:SSA-286838

Trust: 1.7

db:SIEMENSid:SSA-538778

Trust: 1.7

db:JVNid:JVNVU91051134

Trust: 0.8

db:JVNDBid:JVNDB-2021-006950

Trust: 0.8

db:CNVDid:CNVD-2021-37749

Trust: 0.6

db:ICS CERTid:ICSA-21-131-04

Trust: 0.6

db:CS-HELPid:SB2021051206

Trust: 0.6

db:CNNVDid:CNNVD-202105-575

Trust: 0.6

db:CS-HELPid:SB2021041363

Trust: 0.6

db:CNNVDid:CNNVD-202104-975

Trust: 0.6

db:VULMONid:CVE-2021-27385

Trust: 0.1

sources: CNVD: CNVD-2021-37749 // VULMON: CVE-2021-27385 // JVNDB: JVNDB-2021-006950 // CNNVD: CNNVD-202105-575 // CNNVD: CNNVD-202104-975 // NVD: CVE-2021-27385

REFERENCES

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-131-12

Trust: 2.9

url:https://cert-portal.siemens.com/productcert/pdf/ssa-538778.pdf

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf

Trust: 1.7

url:https://jvn.jp/vu/jvnvu91051134/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2021-27385

Trust: 0.8

url:https://www.cisa.gov/uscert/ics/advisories/icsa-21-131-12

Trust: 0.8

url:https://www.cybersecurity-help.cz/vdb/sb2021051206

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-131-04

Trust: 0.6

url:https://vigilance.fr/vulnerability/smartvnc-multiple-vulnerabilities-35360

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021041363

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/400.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://cert-portal.siemens.com/productcert/txt/ssa-286838.txt

Trust: 0.1

sources: CNVD: CNVD-2021-37749 // VULMON: CVE-2021-27385 // JVNDB: JVNDB-2021-006950 // CNNVD: CNNVD-202105-575 // CNNVD: CNNVD-202104-975 // NVD: CVE-2021-27385

CREDITS

Siemens reported these vulnerabilities to CISA.

Trust: 0.6

sources: CNNVD: CNNVD-202105-575

SOURCES

db:CNVDid:CNVD-2021-37749
db:VULMONid:CVE-2021-27385
db:JVNDBid:JVNDB-2021-006950
db:CNNVDid:CNNVD-202105-575
db:CNNVDid:CNNVD-202104-975
db:NVDid:CVE-2021-27385

LAST UPDATE DATE

2024-08-14T13:11:37.021000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-37749date:2021-05-28T00:00:00
db:VULMONid:CVE-2021-27385date:2021-05-21T00:00:00
db:JVNDBid:JVNDB-2021-006950date:2022-01-26T07:30:00
db:CNNVDid:CNNVD-202105-575date:2022-10-26T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-14T00:00:00
db:NVDid:CVE-2021-27385date:2022-10-25T19:56:01.580

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-37749date:2021-05-28T00:00:00
db:VULMONid:CVE-2021-27385date:2021-05-12T00:00:00
db:JVNDBid:JVNDB-2021-006950date:2022-01-26T00:00:00
db:CNNVDid:CNNVD-202105-575date:2021-05-11T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-13T00:00:00
db:NVDid:CVE-2021-27385date:2021-05-12T14:15:11.727