CVE-2021-31883 vulnerability in Siemens Products
Published on November 9, 2021
A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303). When processing a DHCP ACK message, the DHCP client application does not validate the length of the Vendor option(s), leading to Denial-of-Service conditions. (FSMD-2021-0013)
Weakness Type
What is a Buffer Overflow Vulnerability?
The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
CVE-2021-31883 has been classified to as a Buffer Overflow vulnerability or weakness.
Products Associated with CVE-2021-31883
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2021-31883 are published in these products:
Affected Versions
Siemens Capital Embedded AR Classic 431-422:- Before * is affected.
- Before V2303 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.