ID

VAR-202108-0801


CVE

CVE-2021-33485


TITLE

CODESYS Control Runtime system  Out-of-bounds write vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2021-010246

DESCRIPTION

CODESYS Control Runtime system before 3.5.17.10 has a Heap-based Buffer Overflow. CODESYS Control Runtime system Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.71

sources: NVD: CVE-2021-33485 // JVNDB: JVNDB-2021-010246 // VULMON: CVE-2021-33485

AFFECTED PRODUCTS

vendor:codesysmodel:controlscope:lteversion:4.2.0.0

Trust: 1.0

vendor:codesysmodel:embedded target visu toolkitscope:ltversion:3.5.17.10

Trust: 1.0

vendor:codesysmodel:control runtime system toolkitscope:ltversion:3.5.17.10

Trust: 1.0

vendor:codesysmodel:control rtescope:ltversion:3.5.17.10

Trust: 1.0

vendor:codesysmodel:remote target visu toolkitscope:ltversion:3.5.17.10

Trust: 1.0

vendor:codesysmodel:hmiscope:ltversion:3.5.17.10

Trust: 1.0

vendor:codesysmodel:controlscope:ltversion:4.2.0.0

Trust: 1.0

vendor:codesysmodel:control win slscope:ltversion:3.5.17.10

Trust: 1.0

vendor:codesysmodel:hmiscope: - version: -

Trust: 0.8

vendor:codesysmodel:controlscope: - version: -

Trust: 0.8

vendor:codesysmodel:embedded target visu toolkitscope: - version: -

Trust: 0.8

vendor:codesysmodel:control runtime system toolkitscope: - version: -

Trust: 0.8

vendor:codesysmodel:remote target visu toolkitscope: - version: -

Trust: 0.8

vendor:codesysmodel:control rtescope: - version: -

Trust: 0.8

vendor:codesysmodel:control win slscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-010246 // NVD: CVE-2021-33485

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-33485
value: CRITICAL

Trust: 1.0

NVD: CVE-2021-33485
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202108-303
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2021-33485
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

nvd@nist.gov: CVE-2021-33485
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2021-33485
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2021-010246 // CNNVD: CNNVD-202108-303 // NVD: CVE-2021-33485

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-010246 // NVD: CVE-2021-33485

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202108-303

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202108-303

PATCH

title:Advisory 2021-09url:https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14805&token=f0b86f99bb302ddd4aadec483aed5f5d3fddbf1a&download=

Trust: 0.8

title:3S-Smart Software Solutions CODESYS Control runtime system Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=158555

Trust: 0.6

sources: JVNDB: JVNDB-2021-010246 // CNNVD: CNNVD-202108-303

EXTERNAL IDS

db:NVDid:CVE-2021-33485

Trust: 3.3

db:JVNDBid:JVNDB-2021-010246

Trust: 0.8

db:CNNVDid:CNNVD-202108-303

Trust: 0.6

db:VULMONid:CVE-2021-33485

Trust: 0.1

sources: VULMON: CVE-2021-33485 // JVNDB: JVNDB-2021-010246 // CNNVD: CNNVD-202108-303 // NVD: CVE-2021-33485

REFERENCES

url:https://customers.codesys.com/index.php?eid=dumpfile&t=f&f=14805&token=f0b86f99bb302ddd4aadec483aed5f5d3fddbf1a&download=

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-33485

Trust: 0.8

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2021-33485 // JVNDB: JVNDB-2021-010246 // CNNVD: CNNVD-202108-303 // NVD: CVE-2021-33485

SOURCES

db:VULMONid:CVE-2021-33485
db:JVNDBid:JVNDB-2021-010246
db:CNNVDid:CNNVD-202108-303
db:NVDid:CVE-2021-33485

LAST UPDATE DATE

2024-08-14T15:17:08.707000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-33485date:2021-08-03T00:00:00
db:JVNDBid:JVNDB-2021-010246date:2022-06-27T08:38:00
db:CNNVDid:CNNVD-202108-303date:2021-08-18T00:00:00
db:NVDid:CVE-2021-33485date:2021-08-17T13:14:46.410

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-33485date:2021-08-03T00:00:00
db:JVNDBid:JVNDB-2021-010246date:2022-06-27T00:00:00
db:CNNVDid:CNNVD-202108-303date:2021-08-03T00:00:00
db:NVDid:CVE-2021-33485date:2021-08-03T16:15:08.583