CVE-2021-26788
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Oryx Embedded CycloneTCP 1.7.6 to 2.0.0, fixed in 2.0.2, is affected by incorrect input validation, which may cause a denial of service (DoS). To exploit the vulnerability, an attacker needs to have TCP connectivity to the target system. Receiving a maliciously crafted TCP packet from an unauthenticated endpoint is sufficient to trigger the bug.
Oryx Embedded CycloneTCP versiones 1.7.6 hasta 2.0.0, corregido en versión 2.0.2, está afectado por una comprobación incorrecta de la entrada, lo que puede causar una denegación de servicio (DoS). Para explotar la vulnerabilidad, un atacante necesitar tener conectividad TCP con el sistema de destino. Recibir un paquete TCP diseñado con fines malicioso desde un endpoint no autenticado es suficiente para desencadenar el bug
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-02-05 CVE Reserved
- 2021-03-08 CVE Published
- 2023-11-22 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/Oryx-Embedded/CycloneTCP/commit/de5336016edbe1e90327d0ed1cba5c4e49114366?branch=de5336016edbe1e90327d0ed1cba5c4e49114366&diff=split | 2021-03-12 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Oryx-embedded Search vendor "Oryx-embedded" | Cyclonetcp Search vendor "Oryx-embedded" for product "Cyclonetcp" | >= 1.7.6 <= 2.0.0 Search vendor "Oryx-embedded" for product "Cyclonetcp" and version " >= 1.7.6 <= 2.0.0" | - |
Affected
|