A vulnerability has been identified in Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2013.08), Nucleus Source Code (Versions including affected DNS modules). The DNS client does not properly randomize UDP port numbers of DNS requests. That could allow an attacker to poison the DNS cache or spoof DNS resolving.
                
            References
                    | Link | Resource | 
|---|---|
| https://cert-portal.siemens.com/productcert/pdf/ssa-201384.pdf | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
                                
                                
  | 
                        
Information
                Published : 2021-04-22 14:15
Updated : 2022-04-22 12:38
NVD link : CVE-2021-27393
Mitre link : CVE-2021-27393
JSON object : View
CWE
                
                    
                        
                        CWE-330
                        
            Use of Insufficiently Random Values
Products Affected
                siemens
- nucleus_readystart_v3
 - nucleus_source_code
 - nucleus_net
 


