zoom meetings-for-chrome-os CVE-2021-20610 vulnerability in Zoom Products
Published on December 1, 2021

Improper Handling of Length Parameter Inconsistency vulnerability in Mitsubishi Electric MELSEC iQ-R Series R00/01/02CPU, MELSEC iQ-R Series R04/08/16/32/120(EN)CPU, MELSEC iQ-R Series R08/16/32/120SFCPU, MELSEC iQ-R Series R08/16/32/120PCPU, MELSEC iQ-R Series R08/16/32/120PSFCPU, MELSEC iQ-R Series R16/32/64MTCPU, MELSEC iQ-R Series R12CCPU-V, MELSEC Q Series Q03UDECPU, MELSEC Q Series Q04/06/10/13/20/26/50/100UDEHCPU, MELSEC Q Series Q03/04/06/13/26UDVCPU, MELSEC Q Series Q04/06/13/26UDPVCPU, MELSEC Q Series Q12DCCPU-V, MELSEC Q Series Q24DHCCPU-V(G), MELSEC Q Series Q24/26DHCCPU-LS, MELSEC Q Series MR-MQ100, MELSEC Q Series Q172/173DCPU-S1, MELSEC Q Series Q172/173DSCPU, MELSEC Q Series Q170MCPU, MELSEC Q Series Q170MSCPU(-S1), MELSEC L Series L02/06/26CPU(-P), MELSEC L Series L26CPU-(P)BT and MELIPC Series MI5122-VW allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition by sending specially crafted packets. System reset is required for recovery.

Vendor Advisory NVD

Vulnerability Analysis

CVE-2021-20610 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
NONE
Integrity Impact:
NONE
Availability Impact:
HIGH

Weakness Type

What is a length manipulation Vulnerability?

The software parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data. If an attacker can manipulate the length parameter associated with an input such that it is inconsistent with the actual length of the input, this can be leveraged to cause the target application to behave in unexpected, and possibly, malicious ways. One of the possible motives for doing so is to pass in arbitrarily large input to the application. Another possible motivation is the modification of application state by including invalid data for subsequent properties of the application. Such weaknesses commonly lead to attacks such as buffer overflows and execution of arbitrary code.

CVE-2021-20610 has been classified to as a length manipulation vulnerability or weakness.


Products Associated with CVE-2021-20610

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2021-20610 are published in these products:

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Affected Versions

Mitsubishi Electric Corporation MELSEC iQ-R Series R00CPU: Mitsubishi Electric Corporation MELSEC iQ-R Series R01CPU: Mitsubishi Electric Corporation MELSEC iQ-R Series R02CPU: Mitsubishi Electric Corporation MELSEC iQ-R Series R04CPU: Mitsubishi Electric Corporation MELSEC iQ-R Series R08CPU: Mitsubishi Electric Corporation MELSEC iQ-R Series R16CPU: Mitsubishi Electric Corporation MELSEC iQ-R Series R32CPU: Mitsubishi Electric Corporation MELSEC iQ-R Series R120CPU: Mitsubishi Electric Corporation MELSEC iQ-R Series R04ENCPU: Mitsubishi Electric Corporation MELSEC iQ-R Series R08ENCPU: Mitsubishi Electric Corporation MELSEC iQ-R Series R16ENCPU: Mitsubishi Electric Corporation MELSEC iQ-R Series R32ENCPU: Mitsubishi Electric Corporation MELSEC iQ-R Series R120ENCPU: Mitsubishi Electric Corporation MELSEC iQ-R Series R08SFCPU: Mitsubishi Electric Corporation MELSEC iQ-R Series R16SFCPU: Mitsubishi Electric Corporation MELSEC iQ-R Series R32SFCPU: Mitsubishi Electric Corporation MELSEC iQ-R Series R120SFCPU: Mitsubishi Electric Corporation MELSEC iQ-R Series R08PCPU: Mitsubishi Electric Corporation MELSEC iQ-R Series R16PCPU: Mitsubishi Electric Corporation MELSEC iQ-R Series R32PCPU: Mitsubishi Electric Corporation MELSEC iQ-R Series R120PCPU: Mitsubishi Electric Corporation MELSEC iQ-R Series R08PSFCPU: Mitsubishi Electric Corporation MELSEC iQ-R Series R16PSFCPU: Mitsubishi Electric Corporation MELSEC iQ-R Series R32PSFCPU: Mitsubishi Electric Corporation MELSEC iQ-R Series R120PSFCPU: Mitsubishi Electric Corporation MELSEC iQ-R Series R16MTCPU: Mitsubishi Electric Corporation MELSEC iQ-R Series R32MTCPU: Mitsubishi Electric Corporation MELSEC iQ-R Series R64MTCPU: Mitsubishi Electric Corporation MELSEC iQ-R Series R12CCPU-V: Mitsubishi Electric Corporation MELSEC Q Series Q03UDECPU: Mitsubishi Electric Corporation MELSEC Q Series Q04UDEHCPU: Mitsubishi Electric Corporation MELSEC Q Series Q06UDEHCPU: Mitsubishi Electric Corporation MELSEC Q Series Q10UDEHCPU: Mitsubishi Electric Corporation MELSEC Q Series Q13UDEHCPU: Mitsubishi Electric Corporation MELSEC Q Series Q20UDEHCPU: Mitsubishi Electric Corporation MELSEC Q Series Q26UDEHCPU: Mitsubishi Electric Corporation MELSEC Q Series Q50UDEHCPU: Mitsubishi Electric Corporation MELSEC Q Series Q100UDEHCPU: Mitsubishi Electric Corporation MELSEC Q Series Q03UDVCPU: Mitsubishi Electric Corporation MELSEC Q Series Q04UDVCPU: Mitsubishi Electric Corporation MELSEC Q Series Q06UDVCPU: Mitsubishi Electric Corporation MELSEC Q Series Q13UDVCPU: Mitsubishi Electric Corporation MELSEC Q Series Q26UDVCPU: Mitsubishi Electric Corporation MELSEC Q Series Q04UDPVCPU: Mitsubishi Electric Corporation MELSEC Q Series Q06UDPVCPU: Mitsubishi Electric Corporation MELSEC Q Series Q13UDPVCPU: Mitsubishi Electric Corporation MELSEC Q Series Q26UDPVCPU: Mitsubishi Electric Corporation MELSEC Q Series Q12DCCPU-V: Mitsubishi Electric Corporation MELSEC Q Series Q24DHCCPU-V: Mitsubishi Electric Corporation MELSEC Q Series Q24DHCCPU-VG: Mitsubishi Electric Corporation MELSEC Q Series Q24DHCCPU-LS: Mitsubishi Electric Corporation MELSEC Q Series Q26DHCCPU-LS: Mitsubishi Electric Corporation MELSEC Q Series MR-MQ100: Mitsubishi Electric Corporation MELSEC Q Series Q172DCPU-S1: Mitsubishi Electric Corporation MELSEC Q Series Q173DCPU-S1: Mitsubishi Electric Corporation MELSEC Q Series Q172DSCPU: Mitsubishi Electric Corporation MELSEC Q Series Q173DSCPU: Mitsubishi Electric Corporation MELSEC Q Series Q170MCPU: Mitsubishi Electric Corporation MELSEC Q Series Q170MSCPU: Mitsubishi Electric Corporation MELSEC Q Series Q170MSCPU-S1: Mitsubishi Electric Corporation MELSEC L Series L02CPU: Mitsubishi Electric Corporation MELSEC L Series L06CPU: Mitsubishi Electric Corporation MELSEC L Series L26CPU: Mitsubishi Electric Corporation MELSEC L Series L02CPU-P: Mitsubishi Electric Corporation MELSEC L Series L06CPU-P: Mitsubishi Electric Corporation MELSEC L Series L26CPU-P: Mitsubishi Electric Corporation MELSEC L Series L26CPU-BT: Mitsubishi Electric Corporation MELSEC L Series L26CPU-PBT: Mitsubishi Electric Corporation MELIPC Series MI5122-VW:

Exploit Probability

EPSS
0.66%
Percentile
70.83%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.