A vulnerability has been identified in Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2013.08), Nucleus Source Code (Versions including affected DNS modules). The DNS client does not properly randomize UDP port numbers of DNS requests. That could allow an attacker to poison the DNS cache or spoof DNS resolving.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-201384.pdf | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: siemens
Published: 2021-04-22T20:42:21
Updated: 2022-01-11T11:27:04
Reserved: 2021-02-18T00:00:00
Link: CVE-2021-27393
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-04-22T21:15:10.393
Modified: 2022-04-22T19:38:54.327
Link: CVE-2021-27393
JSON object: View
Redhat Information
No data.
CWE