Apache PLC4X - PLC4C (Only the C language implementation was effected) was vulnerable to an unsigned integer underflow flaw inside the tcp transport. Users should update to 0.9.1, which addresses this issue. However, in order to exploit this vulnerability, a user would have to actively connect to a mallicious device which could send a response with invalid content. Currently we consider the probability of this being exploited as quite minimal, however this could change in the future, especially with the industrial networks growing more and more together.
References
Link | Resource |
---|---|
https://lists.apache.org/thread/jxx6qc84z60xbbhn6vp2s5qf09psrtc7 | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2021/12/20/2 | Mailing List Third Party Advisory |
Configurations
Information
Published : 2021-12-19 01:15
Updated : 2022-01-04 10:00
NVD link : CVE-2021-43083
Mitre link : CVE-2021-43083
JSON object : View
CWE
CWE-191
Integer Underflow (Wrap or Wraparound)
Products Affected
apache
- plc4x