CVE-2021-27477

CVSS V2 High 7.8 CVSS V3 High 7.5
Description
When JTEKT Corporation TOYOPUC PLC versions PC10G-CPU, 2PORT-EFR, Plus CPU, Plus EX, Plus EX2, Plus EFR, Plus EFR2, Plus 2P-EFR, PC10P-DP, PC10P-DP-IO, Plus BUS-EX, Nano 10GX, Nano 2ET,PC10PE, PC10PE-16/16P, PC10E, FL/ET-T-V2H, PC10B,PC10B-P, Nano CPU, PC10P, and PC10GE receive an invalid frame, the outside area of a receive buffer for FL-net are overwritten. As a result, the PLC CPU detects a system error, and the affected products stop.
Overview
  • CVE ID
  • CVE-2021-27477
  • Assigner
  • ics-cert@hq.dhs.gov
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2021-07-01T13:15:08
  • Last Modified Date
  • 2022-10-07T19:16:17
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:jtekt:pc10g-cpu_firmware:*:*:*:*:*:*:*:* 1 OR 3.91
cpe:2.3:h:jtekt:pc10g-cpu:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:jtekt:2port-efr_firmware:*:*:*:*:*:*:*:* 1 OR 1.50
cpe:2.3:h:jtekt:2port-efr:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:jtekt:plus_cpu_firmware:*:*:*:*:*:*:*:* 1 OR 3.11
cpe:2.3:h:jtekt:plus_cpu:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:jtekt:plus_ex_firmware:*:*:*:*:*:*:*:* 1 OR 3.11
cpe:2.3:h:jtekt:plus_ex:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:jtekt:plus_ex2_firmware:*:*:*:*:*:*:*:* 1 OR 3.11
cpe:2.3:h:jtekt:plus_ex2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:jtekt:plus_efr_firmware:*:*:*:*:*:*:*:* 1 OR 3.11
cpe:2.3:h:jtekt:plus_efr:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:jtekt:plus_efr2_firmware:*:*:*:*:*:*:*:* 1 OR 3.11
cpe:2.3:h:jtekt:plus_efr2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:jtekt:plus_2p-efr_firmware:*:*:*:*:*:*:*:* 1 OR 3.11
cpe:2.3:h:jtekt:plus_2p-efr:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:jtekt:pc10p-dp_firmware:*:*:*:*:*:*:*:* 1 OR 1.50
cpe:2.3:h:jtekt:pc10p-dp:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:jtekt:pc10p-dp-io_firmware:*:*:*:*:*:*:*:* 1 OR 1.50
cpe:2.3:h:jtekt:pc10p-dp-io:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:jtekt:plus_bus-ex_firmware:*:*:*:*:*:*:*:* 1 OR 2.13
cpe:2.3:h:jtekt:plus_bus-ex:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:jtekt:nano_10gx_firmware:*:*:*:*:*:*:*:* 1 OR 3.00
cpe:2.3:h:jtekt:nano_10gx:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:jtekt:nano_2et_firmware:*:*:*:*:*:*:*:* 1 OR 2.40
cpe:2.3:h:jtekt:nano_2et:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:jtekt:pc10pe_firmware:*:*:*:*:*:*:*:* 1 OR 1.02
cpe:2.3:h:jtekt:pc10pe:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:jtekt:pc10pe-16\/16p_firmware:*:*:*:*:*:*:*:* 1 OR 1.02
cpe:2.3:h:jtekt:pc10pe-16\/16p:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:jtekt:pc10e_firmware:*:*:*:*:*:*:*:* 1 OR 1.02
cpe:2.3:h:jtekt:pc10e:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:jtekt:fl\/et-t-v2h_firmware:*:*:*:*:*:*:*:* 1 OR f2.8_e1.5
cpe:2.3:h:jtekt:fl\/et-t-v2h:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:jtekt:pc10b_firmware:*:*:*:*:*:*:*:* 1 OR 1.11
cpe:2.3:h:jtekt:pc10b:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:jtekt:pc10b-p_firmware:*:*:*:*:*:*:*:* 1 OR 1.11
cpe:2.3:h:jtekt:pc10b-p:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:jtekt:nano_cpu_firmware:*:*:*:*:*:*:*:* 1 OR 2.08
cpe:2.3:h:jtekt:nano_cpu:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:jtekt:pc10p_firmware:*:*:*:*:*:*:*:* 1 OR 1.05
cpe:2.3:h:jtekt:pc10p:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:jtekt:pc10ge_firmware:*:*:*:*:*:*:*:* 1 OR 1.04
cpe:2.3:h:jtekt:pc10ge:-:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:N/I:N/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 7.8
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 6.9
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • NONE
  • Availability Impact
  • HIGH
  • Base Score
  • 7.5
  • Base Severity
  • HIGH
  • Exploitability Score
  • 3.9
  • Impact Score
  • 3.6
References
Reference URL Reference Tags
https://us-cert.cisa.gov/ics/advisories/icsa-21-180-04 Third Party Advisory US Government Resource
History
Created Old Value New Value Data Type Notes
2022-05-10 07:08:24 Added to TrackCVE
2022-12-05 05:19:21 2021-07-01T13:15Z 2021-07-01T13:15:08 CVE Published Date updated
2022-12-05 05:19:21 2022-10-07T19:16:17 CVE Modified Date updated
2022-12-05 05:19:21 Analyzed Vulnerability Status updated