2021-31400 | InterNiche NicheStack TCP Segment tcp_in.c tcp_pulloutofband infinite loop
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
7.2 | $0-$5k | 0.94 |
A vulnerability was found in InterNiche NicheStack 4.0.1 and classified as critical. This issue affects the function tcp_pulloutofband
of the file tcp_in.c of the component TCP Segment Handler. The manipulation with an unknown input leads to a denial of service vulnerability. Using CWE to declare the problem leads to CWE-835. Impacted is availability. The summary by CVE is:
An issue was discovered in tcp_pulloutofband() in tcp_in.c in HCC embedded InterNiche 4.0.1. The TCP out-of-band urgent-data processing function invokes a panic function if the pointer to the end of the out-of-band data points outside of the TCP segment’s data. If the panic function hadn’t a trap invocation removed, it will enter an infinite loop and therefore cause DoS (continuous loop or a device reset).
The weakness was published 08/19/2021. It is possible to read the advisory at forescout.com. The identification of this vulnerability is CVE-2021-31400 since 04/15/2021. The exploitation is known to be easy. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. Technical details of the vulnerability are known, but there is no available exploit. The attack technique deployed by this issue is T1499 according to MITRE ATT&CK.
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Vendor
Name
VulDB Meta Base Score: 7.5
VulDB Meta Temp Score: 7.2
VulDB Base Score: 7.5
VulDB Temp Score: 7.2
VulDB Vector: 🔒
VulDB Reliability: 🔍
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
🔍 | 🔍 | 🔍 | 🔍 | 🔍 | 🔍 |
🔍 | 🔍 | 🔍 | 🔍 | 🔍 | 🔍 |
🔍 | 🔍 | 🔍 | 🔍 | 🔍 | 🔍 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Denial of service
CWE: CWE-835
ATT&CK: T1499
Local: No
Remote: Yes
Availability: 🔒
Status: Not defined
Price Prediction: 🔍
Current Price Estimation: 🔒
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍
Active Actors: 🔍
Active APT Groups: 🔍Recommended: no mitigation known
Status: 🔍
0-Day Time: 🔒
04/15/2021 CVE assigned
08/19/2021 Advisory disclosed
08/19/2021 VulDB entry created
08/21/2021 VulDB last updateAdvisory: forescout.com
Status: Not defined
CVE: CVE-2021-31400 (🔒)
Created: 08/19/2021 16:37
Updated: 08/21/2021 16:14
Changes: (2) source_cve_assigned source_cve_nvd_summary
Complete: 🔍
Comments
Enable the mail alert feature now!