Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2021-27196 |
CWE-ID | CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Relion 670 series Server applications / SCADA systems Relion 650 series Server applications / SCADA systems Relion SAM600-IO Server applications / SCADA systems RTU500 CMU Hardware solutions / Firmware REB500 Hardware solutions / Firmware FOX615 TEGO1 Hardware solutions / Firmware GMS600 Hardware solutions / Firmware PWC600 Hardware solutions / Firmware Modular Switchgear Monitoring (MSM) Hardware solutions / Firmware |
Vendor | ABB |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU51954
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-27196
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Vulnerable software versionsRelion 670 series: 1.1 - 2.2.3
Relion 650 series: 1.1 - 2.2.1
Relion SAM600-IO: 2.2.1
RTU500 CMU: 7.0 - 12.0
REB500: 7.3 - 8.3
FOX615 TEGO1: R1D02
GMS600: 1.3.0
PWC600: 1.0 - 1.1
Modular Switchgear Monitoring (MSM): before 2.1.0
External linkshttp://ics-cert.us-cert.gov/advisories/icsa-21-096-01
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.