// For flags

CVE-2021-43083

Apache PLC4X 0.9.0 Buffer overflow in PLC4C via crafted server response

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Apache PLC4X - PLC4C (Only the C language implementation was effected) was vulnerable to an unsigned integer underflow flaw inside the tcp transport. Users should update to 0.9.1, which addresses this issue. However, in order to exploit this vulnerability, a user would have to actively connect to a mallicious device which could send a response with invalid content. Currently we consider the probability of this being exploited as quite minimal, however this could change in the future, especially with the industrial networks growing more and more together.

Apache PLC4X - PLC4C (sólo la implementación en lenguaje C estaba afectada) era vulnerable a un fallo de desbordamiento de enteros sin signo dentro del transporte tcp. Los usuarios deberían actualizar a la versión 0.9.1, que aborda este problema. Sin embargo, para poder explotar esta vulnerabilidad, un usuario tendría que conectarse activamente a un dispositivo malicioso que pudiera enviar una respuesta con contenido no válido. Actualmente consideramos que la probabilidad de que esto sea explotado es bastante mínima, sin embargo esto podría cambiar en el futuro, especialmente con las redes industriales creciendo cada vez más juntas

*Credits: Apache PLC4X would like to thank Eugene Lim for reporting this issue.
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-10-30 CVE Reserved
  • 2021-12-19 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
  • CWE-191: Integer Underflow (Wrap or Wraparound)
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Plc4x
Search vendor "Apache" for product "Plc4x"
< 0.9.1
Search vendor "Apache" for product "Plc4x" and version " < 0.9.1"
-
Affected