CVE-2021-38451

The affected product’s proprietary protocol CSC allows for calling numerous function codes. In order to call those function codes, the user must supply parameters. There is no sanitation on the value of the offset, which allows the client to specify any offset and read out-of-bounds data.
References
Link Resource
https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 Patch Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:auvesy:versiondog:*:*:*:*:*:*:*:*

History

27 Oct 2021, 15:06

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 3.5
v3 : 5.7
CPE cpe:2.3:a:auvesy:versiondog:*:*:*:*:*:*:*:*
References (CONFIRM) https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 - (CONFIRM) https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 - Patch, Third Party Advisory, US Government Resource

22 Oct 2021, 12:43

Type Values Removed Values Added
New CVE

Information

Published : 2021-10-22 12:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-38451

Mitre link : CVE-2021-38451

CVE.ORG link : CVE-2021-38451


JSON object : View

Products Affected

auvesy

  • versiondog
CWE
CWE-125

Out-of-bounds Read