A vulnerability has been identified in Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2013.08), Nucleus Source Code (Versions including affected DNS modules). The DNS client does not properly randomize UDP port numbers of DNS requests. That could allow an attacker to poison the DNS cache or spoof DNS resolving.
References
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: siemens

Published: 2021-04-22T20:42:21

Updated: 2022-01-11T11:27:04

Reserved: 2021-02-18T00:00:00


Link: CVE-2021-27393

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2021-04-22T21:15:10.393

Modified: 2022-04-22T19:38:54.327


Link: CVE-2021-27393

JSON object: View

cve-icon Redhat Information

No data.

CWE