// For flags

CVE-2021-25677

 

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (Versions including affected DNS modules), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), SIMOTICS CONNECT 400 (All versions >= V0.5.0.0 < V1.0.0.0), TALON TC Compact (BACnet) (All versions < V3.5.5), TALON TC Modular (BACnet) (All versions < V3.5.5). The DNS client does not properly randomize DNS transaction IDs. That could allow an attacker to poison the DNS cache or spoof DNS resolving.

Se ha identificado una vulnerabilidad en Nucleus NET (Todas las versiones), Nucleus ReadyStart V3 (Todas las versiones anteriores a la versión V2017.02.3), Nucleus ReadyStart V4 (Todas las versiones anteriores a la versión V4.1.0), Nucleus Source Code (Versiones que incluyen los módulos DNS afectados), SIMOTICS CONNECT 400 (Todas las versiones anteriores a la versión V0.5.0.0), SIMOTICS CONNECT 400 (Todas las versiones posteriores o iguales a la versión V0.5.0.0 anteriores a la versión V1.0.0). El cliente DNS no aleatoriza correctamente los ID de las transacciones DNS. Esto podría permitir a un atacante envenenar la caché DNS o falsificar la resolución DNS

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-01-21 CVE Reserved
  • 2021-04-22 CVE Published
  • 2024-01-06 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-330: Use of Insufficiently Random Values
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Siemens
Search vendor "Siemens"
Simotics Connect 400 Firmware
Search vendor "Siemens" for product "Simotics Connect 400 Firmware"
>= 0.5.0.0
Search vendor "Siemens" for product "Simotics Connect 400 Firmware" and version " >= 0.5.0.0"
-
Affected
in Siemens
Search vendor "Siemens"
Simotics Connect 400
Search vendor "Siemens" for product "Simotics Connect 400"
--
Safe
Siemens
Search vendor "Siemens"
Nucleus Net
Search vendor "Siemens" for product "Nucleus Net"
*-
Affected
Siemens
Search vendor "Siemens"
Nucleus Readystart V3
Search vendor "Siemens" for product "Nucleus Readystart V3"
< 2017.02.4
Search vendor "Siemens" for product "Nucleus Readystart V3" and version " < 2017.02.4"
-
Affected
Siemens
Search vendor "Siemens"
Nucleus Readystart V4
Search vendor "Siemens" for product "Nucleus Readystart V4"
< 4.1.0
Search vendor "Siemens" for product "Nucleus Readystart V4" and version " < 4.1.0"
-
Affected
Siemens
Search vendor "Siemens"
Nucleus Source Code
Search vendor "Siemens" for product "Nucleus Source Code"
--
Affected