CVE-2020-35684
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An issue was discovered in HCC Nichestack 3.0. The code that parses TCP packets relies on an unchecked value of the IP payload size (extracted from the IP header) to compute the length of the TCP payload within the TCP checksum computation function. When the IP payload size is set to be smaller than the size of the IP header, the TCP checksum computation function may read out of bounds (a low-impact write-out-of-bounds is also possible).
Se ha detectado un problema en HCC Nichestack versión 3.0. El código que analiza los paquetes TCP se basa en un valor no comprobado del tamaño de la carga útil IP (extraído del encabezado IP) para calcular la longitud de la carga útil TCP dentro de la función de cálculo de la suma de comprobación TCP. Cuando el tamaño de la carga útil IP está configurado para ser menor que el tamaño del encabezado IP, la función de cálculo de la suma de comprobación TCP puede leer fuera de límites (también es posible una escritura fuera de límites de bajo impacto).
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-12-24 CVE Reserved
- 2021-08-19 CVE Published
- 2024-08-04 CVE Updated
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-789208.pdf | Mitigation |
|
https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack | Mitigation | |
https://www.hcc-embedded.com | Product | |
https://www.kb.cert.org/vuls/id/608209 | Third Party Advisory |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Siemens Search vendor "Siemens" | Sentron 3wl Com35 Firmware Search vendor "Siemens" for product "Sentron 3wl Com35 Firmware" | < 1.2.0 Search vendor "Siemens" for product "Sentron 3wl Com35 Firmware" and version " < 1.2.0" | - |
Affected
| in | Siemens Search vendor "Siemens" | Sentron 3wl Com35 Search vendor "Siemens" for product "Sentron 3wl Com35" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Sentron 3wa Com190 Firmware Search vendor "Siemens" for product "Sentron 3wa Com190 Firmware" | < 2.0.0 Search vendor "Siemens" for product "Sentron 3wa Com190 Firmware" and version " < 2.0.0" | - |
Affected
| in | Siemens Search vendor "Siemens" | Sentron 3wa Com190 Search vendor "Siemens" for product "Sentron 3wa Com190" | - | - |
Safe
|
Hcc-embedded Search vendor "Hcc-embedded" | Nichestack Search vendor "Hcc-embedded" for product "Nichestack" | 3.0 Search vendor "Hcc-embedded" for product "Nichestack" and version "3.0" | - |
Affected
|