CVE-2021-27393
Published Apr 22, 2021
Last updated 3 years ago
Overview
- Description
- A vulnerability has been identified in Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2013.08), Nucleus Source Code (Versions including affected DNS modules). The DNS client does not properly randomize UDP port numbers of DNS requests. That could allow an attacker to poison the DNS cache or spoof DNS resolving.
- Source
- productcert@siemens.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 5.3
- Impact score
- 1.4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:P/A:N
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:nucleus_net:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A987CFB-4A41-4F82-8C7F-31DE8F0650DE" }, { "criteria": "cpe:2.3:a:siemens:nucleus_readystart_v3:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "68638787-E37D-483F-8E83-51C9A52ECC8D", "versionEndExcluding": "2013.08" }, { "criteria": "cpe:2.3:a:siemens:nucleus_source_code:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "53A38C64-612A-4BC5-83D5-D3FA1C90E0F7" } ], "operator": "OR" } ] } ]