CVE-2020-27736

MEDIUM

Siemens Nucleus Net < 2017.02.3 - Out-of-Bounds Read

Title source: rule
STIX 2.1

Description

A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (Versions including affected DNS modules), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), TALON TC Compact (BACnet) (All versions < V3.5.5), TALON TC Modular (BACnet) (All versions < V3.5.5). The DNS domain name label parsing functionality does not properly validate the null-terminated name in DNS-responses. The parsing of malformed responses could result in a read past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to cause a denial-of-service condition or leak the read memory.

Scores

CVSS v3 6.5
EPSS 0.0083
EPSS Percentile 74.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H

Details

CWE
CWE-170 CWE-125
Status published
Products (5)
siemens/nucleus_net
siemens/nucleus_readystart_v3 < 2017.02.3
siemens/nucleus_readystart_v4 < 4.1.0
siemens/nucleus_source_code
siemens/simotics_connect_400_firmware < 0.5.0.0
Published Apr 22, 2021
Tracked Since Feb 18, 2026