ID

VAR-202203-1191


CVE

CVE-2021-45117


TITLE

OPC Foundation  of  ua-nodeset  in products from other multiple vendors  NULL  Pointer dereference vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2021-018979

DESCRIPTION

The OPC autogenerated ANSI C stack stubs (in the NodeSets) do not handle all error cases. This can lead to a NULL pointer dereference. OPC Foundation of ua-nodeset For products from other vendors, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state

Trust: 1.71

sources: NVD: CVE-2021-45117 // JVNDB: JVNDB-2021-018979 // VULMON: CVE-2021-45117

AFFECTED PRODUCTS

vendor:siemensmodel:simatic net pcscope:eqversion:15

Trust: 1.0

vendor:siemensmodel:telecontrol server basicscope:eqversion:3.0

Trust: 1.0

vendor:siemensmodel:simatic net pcscope:eqversion:17

Trust: 1.0

vendor:siemensmodel:simatic net pcscope:eqversion:16

Trust: 1.0

vendor:siemensmodel:sitop managerscope:eqversion: -

Trust: 1.0

vendor:opcfoundationmodel:ua-nodesetscope:ltversion:1.05.01

Trust: 1.0

vendor:siemensmodel:simatic net pcscope:eqversion:14

Trust: 1.0

vendor:シーメンスmodel:telecontrol server basicscope: - version: -

Trust: 0.8

vendor:opcmodel:ua-nodesetscope: - version: -

Trust: 0.8

vendor:シーメンスmodel:simatic net pcscope: - version: -

Trust: 0.8

vendor:シーメンスmodel:sitop managerscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-018979 // NVD: CVE-2021-45117

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-45117
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-45117
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202203-1906
value: MEDIUM

Trust: 0.6

VULMON: CVE-2021-45117
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-45117
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2021-45117
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2021-45117
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2021-45117 // JVNDB: JVNDB-2021-018979 // CNNVD: CNNVD-202203-1906 // NVD: CVE-2021-45117

PROBLEMTYPE DATA

problemtype:CWE-476

Trust: 1.0

problemtype:NULL Pointer dereference (CWE-476) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-018979 // NVD: CVE-2021-45117

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202203-1906

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-202203-1906

PATCH

title: - url:https://github.com/Live-Hack-CVE/CVE-2021-45117

Trust: 0.1

sources: VULMON: CVE-2021-45117

EXTERNAL IDS

db:NVDid:CVE-2021-45117

Trust: 3.3

db:SIEMENSid:SSA-285795

Trust: 2.5

db:ICS CERTid:ICSA-22-132-08

Trust: 1.5

db:JVNid:JVNVU92977068

Trust: 0.8

db:JVNDBid:JVNDB-2021-018979

Trust: 0.8

db:AUSCERTid:ESB-2022.2358

Trust: 0.6

db:CS-HELPid:SB2022051719

Trust: 0.6

db:CNNVDid:CNNVD-202203-1906

Trust: 0.6

db:VULMONid:CVE-2021-45117

Trust: 0.1

sources: VULMON: CVE-2021-45117 // JVNDB: JVNDB-2021-018979 // CNNVD: CNNVD-202203-1906 // NVD: CVE-2021-45117

REFERENCES

url:https://files.opcfoundation.org/securitybulletins/opc%20foundation%20security%20bulletin%20cve-2021-45117.pdf

Trust: 2.5

url:https://www.youtube.com/watch?v=qv-rbdcav4k

Trust: 2.5

url:https://cert-portal.siemens.com/productcert/pdf/ssa-285795.pdf

Trust: 2.5

url:https://jvn.jp/vu/jvnvu92977068/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2021-45117

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-08

Trust: 0.8

url:https://vigilance.fr/vulnerability/siemens-simatic-denial-of-service-via-opc-ua-ansic-stack-38293

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-22-132-08

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022051719

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2021-45117/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.2358

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/476.html

Trust: 0.1

url:https://github.com/live-hack-cve/cve-2021-45117

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-08

Trust: 0.1

sources: VULMON: CVE-2021-45117 // JVNDB: JVNDB-2021-018979 // CNNVD: CNNVD-202203-1906 // NVD: CVE-2021-45117

CREDITS

Siemens reported this vulnerability to CISA.

Trust: 0.6

sources: CNNVD: CNNVD-202203-1906

SOURCES

db:VULMONid:CVE-2021-45117
db:JVNDBid:JVNDB-2021-018979
db:CNNVDid:CNNVD-202203-1906
db:NVDid:CVE-2021-45117

LAST UPDATE DATE

2024-08-14T13:22:16.148000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-45117date:2022-09-03T00:00:00
db:JVNDBid:JVNDB-2021-018979date:2023-07-12T08:30:00
db:CNNVDid:CNNVD-202203-1906date:2022-05-18T00:00:00
db:NVDid:CVE-2021-45117date:2022-09-03T03:55:39.127

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-45117date:2022-03-21T00:00:00
db:JVNDBid:JVNDB-2021-018979date:2023-07-12T00:00:00
db:CNNVDid:CNNVD-202203-1906date:2022-03-21T00:00:00
db:NVDid:CVE-2021-45117date:2022-03-21T15:15:07.927