// For flags

CVE-2020-35684

 

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in HCC Nichestack 3.0. The code that parses TCP packets relies on an unchecked value of the IP payload size (extracted from the IP header) to compute the length of the TCP payload within the TCP checksum computation function. When the IP payload size is set to be smaller than the size of the IP header, the TCP checksum computation function may read out of bounds (a low-impact write-out-of-bounds is also possible).

Se ha detectado un problema en HCC Nichestack versión 3.0. El código que analiza los paquetes TCP se basa en un valor no comprobado del tamaño de la carga útil IP (extraído del encabezado IP) para calcular la longitud de la carga útil TCP dentro de la función de cálculo de la suma de comprobación TCP. Cuando el tamaño de la carga útil IP está configurado para ser menor que el tamaño del encabezado IP, la función de cálculo de la suma de comprobación TCP puede leer fuera de límites (también es posible una escritura fuera de límites de bajo impacto).

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-12-24 CVE Reserved
  • 2021-08-19 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Siemens
Search vendor "Siemens"
Sentron 3wl Com35 Firmware
Search vendor "Siemens" for product "Sentron 3wl Com35 Firmware"
< 1.2.0
Search vendor "Siemens" for product "Sentron 3wl Com35 Firmware" and version " < 1.2.0"
-
Affected
in Siemens
Search vendor "Siemens"
Sentron 3wl Com35
Search vendor "Siemens" for product "Sentron 3wl Com35"
--
Safe
Siemens
Search vendor "Siemens"
Sentron 3wa Com190 Firmware
Search vendor "Siemens" for product "Sentron 3wa Com190 Firmware"
< 2.0.0
Search vendor "Siemens" for product "Sentron 3wa Com190 Firmware" and version " < 2.0.0"
-
Affected
in Siemens
Search vendor "Siemens"
Sentron 3wa Com190
Search vendor "Siemens" for product "Sentron 3wa Com190"
--
Safe
Hcc-embedded
Search vendor "Hcc-embedded"
Nichestack
Search vendor "Hcc-embedded" for product "Nichestack"
3.0
Search vendor "Hcc-embedded" for product "Nichestack" and version "3.0"
-
Affected