Lucene search

K
cve[email protected]CVE-2021-33011
HistorySep 10, 2021 - 12:15 p.m.

CVE-2021-33011

2021-09-1012:15:07
CWE-770
web.nvd.nist.gov
26
cve-2021-33011
toyopuc-pc10
toyopuc-plus
toyopuc-pc3j
toyopuc-pc2j
toyopuc-nano
icmp flood
ethernet communications
nvd

3.3 Low

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:A/AC:L/Au:N/C:N/I:N/A:P

4.3 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

4.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

23.5%

All versions of the afffected TOYOPUC-PC10 Series,TOYOPUC-Plus Series,TOYOPUC-PC3J/PC2J Series, TOYOPUC-Nano Series products may not be able to properly process an ICMP flood, which may allow an attacker to deny Ethernet communications between affected devices.

Affected configurations

NVD
Node
jtektpc10g-cpu_tcc-6353_firmware
AND
jtektpc10g-cpu_tcc-6353Match-
Node
jtektpc10ge_tcc-6464_firmware
AND
jtektpc10ge_tcc-6464Match-
Node
jtektpc10p_tcc-6372_firmware
AND
jtektpc10p_tcc-6372Match-
Node
jtektpc10p-dp_tcc-6726_firmware
AND
jtektpc10p-dp_tcc-6726Match-
Node
jtektpc10p-dp-io_tcc-6752_firmware
AND
jtektpc10p-dp-io_tcc-6752Match-
Node
jtektpc10b-p_tcc-6373_firmware
AND
jtektpc10b-p_tcc-6373Match-
Node
jtektpc10b_tcc-1021_firmware
AND
jtektpc10b_tcc-1021Match-
Node
jtektpc10b-e\/c_tcu-6521_firmware
AND
jtektpc10b-e\/c_tcu-6521Match-
Node
jtektpc10e_tcc-4637_firmware
AND
jtektpc10e_tcc-4637Match-
Node
jtektpc10pe_tcc-1101_firmware
AND
jtektpc10pe_tcc-1101Match-
Node
jtektpc10pe-1616p_tcc-1102_firmware
AND
jtektpc10pe-1616p_tcc-1102Match-
Node
jtektef10_tcu-6982_firmware
AND
jtektef10_tcu-6982Match-
Node
jtektplus_cpu_tcc-6740_firmware
AND
jtektplus_cpu_tcc-6740Match-
Node
jtektplus_ex_tcu-6741_firmware
AND
jtektplus_ex_tcu-6741Match-
Node
jtektplus_ex2_tcu-6858_firmware
AND
jtektplus_ex2_tcu-6858Match-
Node
jtektplus_efr_tcu-6743_firmware
AND
jtektplus_efr_tcu-6743Match-
Node
jtektplus_efr2_tcu-6859_firmware
AND
jtektplus_efr2_tcu-6859Match-
Node
jtektplus_2p-efr_tcu-6929_firmware
AND
jtektplus_2p-efr_tcu-6929Match-
Node
jtektplus_bus-ex_tcu-6900_firmware
AND
jtektplus_bus-ex_tcu-6900Match-
Node
jtektfl\/et-t-v2h_thu-6289_firmware
AND
jtektfl\/et-t-v2h_thu-6289Match-
Node
jtekt2port-efr_thu-6404_firmware
AND
jtekt2port-efr_thu-6404Match-
Node
jtektnano_10gx_tuc-1157_firmware
AND
jtektnano_10gx_tuc-1157Match-
Node
jtektnano_cpu_tuc-6941_firmware
AND
jtektnano_cpu_tuc-6941Match-
Node
jtektnano_2et_tuu-6949_firmware
AND
jtektnano_2et_tuu-6949Match-
Node
jtektnano_safety_tuc-1085_firmware
AND
jtektnano_safety_tuc-1085Match-
Node
jtektnano_safety_rs00ip_tuu-1086_firmware
AND
jtektnano_safety_rs00ip_tuu-1086Match-
Node
jtektnano_safety_rs01ip_tuu-1087_firmware
AND
jtektnano_safety_rs01ip_tuu-1087Match-

CNA Affected

[
  {
    "product": "JTEKT Corporation TOYOPUC products",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "TOYOPUC products TOYOPUC-PC10 Series: PC10G-CPU TCC-6353: All versions, PC10GE TCC-6464: All versions, PC10P TCC-6372: All versions, PC10P-DP TCC-6726: All versions, PC10P-DP-IO TCC-6752: All versions, PC10B-P TCC-6373: All versions, PC10B TCC-1021: All versions, PC10B-E/C TCU-6521: All versions, PC10E TCC-4637: All versions, PC10PE TCC-1101: All versions, PC10PE-1616P TCC-1102: All versions, EF10 TCU-6982: All versions TOYOPUC-Plus Series: Plus CPU TCC-6740: All versions, Plus EX TCU-6741: All versions, Plus EX2 TCU-6858: All versions, Plus EFR TCU-6743: All versions, Plus EFR2 TCU-6859: All versions, Plus 2P-EFR TCU-6929: All versions,Plus BUS-EX TCU-6900: All versions TOYOPUC-PC3J/PC2J Series: FL/ET-T-V2H THU-6289: All versions, 2PORT-EFR THU-6404: All versions TOYOPUC-Nano Series: Nano 10GX TUC-1157: All versions, Nano CPU TUC-6941: All versions, Nano 2ET TUU-6949: All versions, Nano Safety TUC-1085: All versions, Nano Safety RS00IP TUU-1086: All versions, Nano Safety RS01IP TUU-1087: All versions"
      }
    ]
  }
]

3.3 Low

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:A/AC:L/Au:N/C:N/I:N/A:P

4.3 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

4.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

23.5%

Related for CVE-2021-33011