CVE-2021-43083

CVSS V2 Medium 6.5 CVSS V3 High 8.8
Description
Apache PLC4X - PLC4C (Only the C language implementation was effected) was vulnerable to an unsigned integer underflow flaw inside the tcp transport. Users should update to 0.9.1, which addresses this issue. However, in order to exploit this vulnerability, a user would have to actively connect to a mallicious device which could send a response with invalid content. Currently we consider the probability of this being exploited as quite minimal, however this could change in the future, especially with the industrial networks growing more and more together.
Overview
  • CVE ID
  • CVE-2021-43083
  • Assigner
  • security@apache.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2021-12-19T09:15:06
  • Last Modified Date
  • 2022-01-04T18:00:37
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:apache:plc4x:*:*:*:*:*:*:*:* 1 OR 0.9.1
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:S/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • SINGLE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 6.5
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8
  • Impact Score
  • 6.4
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • LOW
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 8.8
  • Base Severity
  • HIGH
  • Exploitability Score
  • 2.8
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
https://lists.apache.org/thread/jxx6qc84z60xbbhn6vp2s5qf09psrtc7 Vendor Advisory
http://www.openwall.com/lists/oss-security/2021/12/20/2 Mailing List Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 06:39:03 Added to TrackCVE
2022-12-06 04:20:41 2021-12-19T09:15Z 2021-12-19T09:15:06 CVE Published Date updated
2022-12-06 04:20:41 2022-01-04T18:00:37 CVE Modified Date updated
2022-12-06 04:20:41 Analyzed Vulnerability Status updated