CVE-2021-27393
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability has been identified in Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2013.08), Nucleus Source Code (Versions including affected DNS modules). The DNS client does not properly randomize UDP port numbers of DNS requests. That could allow an attacker to poison the DNS cache or spoof DNS resolving.
Se ha identificado una vulnerabilidad en Nucleus NET (Todas las versiones), Nucleus ReadyStart V3 (Todas las versiones anteriores a V2013.08), Nucleus Source Code (Versiones que incluyen los módulos DNS afectados). El cliente DNS no aleatoriza correctamente los números de puerto UDP de las peticiones DNS. Esto podría permitir a un atacante envenenar la caché DNS o falsificar la resolución DNS.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-02-18 CVE Reserved
- 2021-04-22 CVE Published
- 2024-01-06 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-330: Use of Insufficiently Random Values
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-201384.pdf | 2022-04-22 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Siemens Search vendor "Siemens" | Nucleus Net Search vendor "Siemens" for product "Nucleus Net" | * | - |
Affected
| ||||||
Siemens Search vendor "Siemens" | Nucleus Readystart V3 Search vendor "Siemens" for product "Nucleus Readystart V3" | < 2013.08 Search vendor "Siemens" for product "Nucleus Readystart V3" and version " < 2013.08" | - |
Affected
| ||||||
Siemens Search vendor "Siemens" | Nucleus Source Code Search vendor "Siemens" for product "Nucleus Source Code" | - | - |
Affected
|