Vulnerability Name:

CVE-2021-40142 (CCN-208328)

Assigned:2021-08-27
Published:2021-08-27
Updated:2022-09-03
Summary:In OPC Foundation Local Discovery Server (LDS) before 1.04.402.463, remote attackers can cause a denial of service (DoS) by sending carefully crafted messages that lead to Access of a Memory Location After the End of a Buffer.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2021-40142

Source: CONFIRM
Type: Patch, Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-321292.pdf

Source: XF
Type: UNKNOWN
opc-lds-cve202140142-dos(208328)

Source: CCN
Type: OPC Foundation Security Bulletin
Security Update for Local Discovery Server (LDS)

Source: MISC
Type: Patch, Vendor Advisory
https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2021-40142.pdf

Source: CCN
Type: Softing Web site
OPC UA and OPC Classic SDKs

Source: MISC
Type: Vendor Advisory
https://opcfoundation.org/security-bulletins/

Vulnerable Configuration:Configuration 1:
  • cpe:/a:opcfoundation:local_discover_server:*:*:*:*:*:*:*:* (Version < 1.04.402.463)

  • Configuration 2:
  • cpe:/o:siemens:simatic_process_historian_opc_ua_server_firmware:2022:-:*:*:*:*:*:*
  • OR cpe:/o:siemens:simatic_process_historian_opc_ua_server_firmware:*:*:*:*:*:*:*:* (Version < 2022)
  • AND
  • cpe:/h:siemens:simatic_process_historian_opc_ua_server:-:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:siemens:simatic_wincc_runtime:-:*:*:*:professional:*:*:*
  • OR cpe:/a:siemens:simatic_wincc:-:*:*:*:*:*:*:*
  • OR cpe:/a:siemens:simatic_net_pc:16:-:*:*:*:*:*:*
  • OR cpe:/a:siemens:simatic_net_pc:15:-:*:*:*:*:*:*
  • OR cpe:/a:siemens:simatic_net_pc:14:-:*:*:*:*:*:*
  • OR cpe:/a:siemens:telecontrol_server_basic:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:siemens:simatic_net_pc:17:-:*:*:*:*:*:*
  • OR cpe:/a:siemens:simatic_wincc_unified_scada_runtime:-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    opcfoundation local discover server *
    siemens simatic process historian opc ua server firmware 2022 -
    siemens simatic process historian opc ua server firmware *
    siemens simatic process historian opc ua server -
    siemens simatic wincc runtime -
    siemens simatic wincc -
    siemens simatic net pc 16 -
    siemens simatic net pc 15 -
    siemens simatic net pc 14 -
    siemens telecontrol server basic 3.0
    siemens simatic net pc 17 -
    siemens simatic wincc unified scada runtime -