Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2021/05/26/6 | Mailing List Patch Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-406691.pdf | Patch Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf | Patch Third Party Advisory |
https://kb.isc.org/docs/cve-2021-25217 | Exploit Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2021/06/msg00002.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5QI4DYC7J4BGHEW3NH4XHMWTHYC36UK4/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LB42JWIV4M4WDNXX5VGIP26FEYWKIF/ | |
https://security.gentoo.org/glsa/202305-22 | |
https://security.netapp.com/advisory/ntap-20220325-0011/ | Third Party Advisory |
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
|
Configuration 15 (hide)
|
03 May 2023, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf - Patch, Third Party Advisory | |
CPE | cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:* cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:* cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:* |
13 Sep 2022, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 May 2022, 20:47
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20220325-0011/ - Third Party Advisory | |
References | (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-406691.pdf - Patch, Third Party Advisory | |
CPE | cpe:2.3:o:siemens:ruggedcom_rox_rx1500_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:ruggedcom_rox_rx1524_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:ruggedcom_rox_rx1500:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:ruggedcom_rox_rx1510:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:ruggedcom_rox_rx1400_firmware:*:*:*:*:*:*:*:* cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:ruggedcom_rox_rx1501:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:solidfire_\&_hci_management_node:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:ruggedcom_rox_rx1511:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:ruggedcom_rox_rx1501_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:ruggedcom_rox_rx5000_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:ruggedcom_rox_rx1512_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:ruggedcom_rox_rx1510_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:ruggedcom_rox_rx5000:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:ruggedcom_rox_mx5000_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:ruggedcom_rox_rx1524:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:ruggedcom_rox_rx1536:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:ruggedcom_rox_rx1400:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:ruggedcom_rox_mx5000:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:ruggedcom_rox_rx1536_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:ruggedcom_rox_rx1511_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:ruggedcom_rox_rx1512:-:*:*:*:*:*:*:* |
25 Mar 2022, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Mar 2022, 17:42
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Jun 2021, 16:47
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-119 | |
CPE | cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc2:*:*:*:*:*:* cpe:2.3:a:isc:dhcp:4.1-esv:r12_p1:*:*:*:*:*:* cpe:2.3:a:isc:dhcp:4.1-esv:r13:*:*:*:*:*:* cpe:2.3:a:isc:dhcp:4.1-esv:r10rc1:*:*:*:*:*:* cpe:2.3:a:isc:dhcp:4.1-esv:r11b1:*:*:*:*:*:* cpe:2.3:a:isc:dhcp:4.1-esv:r15-p1:*:*:*:*:*:* cpe:2.3:a:isc:dhcp:4.1-esv:r13b1:*:*:*:*:*:* cpe:2.3:a:isc:dhcp:4.1-esv:r11_b1:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* cpe:2.3:a:isc:dhcp:4.1-esv:r11_rc1:*:*:*:*:*:* cpe:2.3:a:isc:dhcp:4.1-esv:r11rc1:*:*:*:*:*:* cpe:2.3:a:isc:dhcp:4.1-esv:r12:*:*:*:*:*:* cpe:2.3:a:isc:dhcp:4.1-esv:r12-p1:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* cpe:2.3:a:isc:dhcp:4.1-esv:r14_b1:*:*:*:*:*:* cpe:2.3:a:isc:dhcp:4.1-esv:r10:*:*:*:*:*:* cpe:2.3:a:isc:dhcp:4.1-esv:r10_b1:*:*:*:*:*:* cpe:2.3:a:isc:dhcp:4.1-esv:r11:*:*:*:*:*:* cpe:2.3:a:isc:dhcp:4.1-esv:r14b1:*:*:*:*:*:* cpe:2.3:a:isc:dhcp:4.1-esv:r12b1:*:*:*:*:*:* cpe:2.3:a:isc:dhcp:4.1-esv:r11rc2:*:*:*:*:*:* cpe:2.3:a:isc:dhcp:4.1-esv:r16:*:*:*:*:*:* cpe:2.3:a:isc:dhcp:*:*:*:*:*:*:*:* cpe:2.3:a:isc:dhcp:4.1-esv:r1:*:*:*:*:*:* cpe:2.3:a:isc:dhcp:4.1-esv:r12_b1:*:*:*:*:*:* cpe:2.3:a:isc:dhcp:4.1-esv:r10_rc1:*:*:*:*:*:* cpe:2.3:a:isc:dhcp:4.1-esv:r15:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* cpe:2.3:a:isc:dhcp:4.1-esv:r13_b1:*:*:*:*:*:* cpe:2.3:a:isc:dhcp:4.1-esv:r10b1:*:*:*:*:*:* cpe:2.3:a:isc:dhcp:4.1-esv:r15_b1:*:*:*:*:*:* cpe:2.3:a:isc:dhcp:4.1-esv:r14:*:*:*:*:*:* |
|
References | (MLIST) http://www.openwall.com/lists/oss-security/2021/05/26/6 - Mailing List, Patch, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5QI4DYC7J4BGHEW3NH4XHMWTHYC36UK4/ - Mailing List, Third Party Advisory | |
References | (CONFIRM) https://kb.isc.org/docs/cve-2021-25217 - Exploit, Vendor Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2021/06/msg00002.html - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2LB42JWIV4M4WDNXX5VGIP26FEYWKIF/ - Mailing List, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 3.3
v3 : 7.4 |
05 Jun 2021, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Jun 2021, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Jun 2021, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 May 2021, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Published : 2021-05-26 22:15
Updated : 2024-02-04 21:47
NVD link : CVE-2021-25217
Mitre link : CVE-2021-25217
CVE.ORG link : CVE-2021-25217
JSON object : View
siemens
- ruggedcom_rox_rx1500_firmware
- ruggedcom_rox_rx1536
- ruggedcom_rox_rx1500
- ruggedcom_rox_mx5000_firmware
- ruggedcom_rox_rx1511_firmware
- ruggedcom_rox_rx1512
- sinec_ins
- ruggedcom_rox_rx5000_firmware
- ruggedcom_rox_rx1510
- ruggedcom_rox_rx1511
- ruggedcom_rox_rx1501_firmware
- ruggedcom_rox_mx5000
- ruggedcom_rox_rx1536_firmware
- ruggedcom_rox_rx1512_firmware
- ruggedcom_rox_rx1524_firmware
- ruggedcom_rox_rx1524
- ruggedcom_rox_rx1400
- ruggedcom_rox_rx1501
- ruggedcom_rox_rx1400_firmware
- ruggedcom_rox_rx5000
- ruggedcom_rox_rx1510_firmware
debian
- debian_linux
fedoraproject
- fedora
isc
- dhcp
netapp
- solidfire_\&_hci_management_node
- ontap_select_deploy_administration_utility
Improper Restriction of Operations within the Bounds of a Memory Buffer