Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-35684


An issue was discovered in HCC Nichestack 3.0. The code that parses TCP packets relies on an unchecked value of the IP payload size (extracted from the IP header) to compute the length of the TCP payload within the TCP checksum computation function. When the IP payload size is set to be smaller than the size of the IP header, the TCP checksum computation function may read out of bounds (a low-impact write-out-of-bounds is also possible).


Published

2021-08-19T12:15:08.020

Last Modified

2024-11-21T05:27:50.820

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-20

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application hcc-embedded nichestack 3.0 Yes
Operating System siemens sentron_3wl_com35_firmware < 1.2.0 Yes
Hardware siemens sentron_3wl_com35 - No
Operating System siemens sentron_3wa_com190_firmware < 2.0.0 Yes
Hardware siemens sentron_3wa_com190 - No

References