Lucene search

K
nvd[email protected]NVD:CVE-2021-33316
HistoryMay 11, 2022 - 6:15 p.m.

CVE-2021-33316

2022-05-1118:15:22
CWE-20
web.nvd.nist.gov
2
trendnet switch
integer underflow
buffer overflow
lldp component
cve-2021-33316

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

61.0%

The TRENDnet TI-PG1284i switch(hw v2.0R) prior to version 2.0.2.S0 suffers from an integer underflow vulnerability. This vulnerability exists in its lldp related component. Due to lack of proper validation on length field of ChassisID TLV, by sending a crafted lldp packet to the device, integer underflow would occur and the negative number will be passed to memcpy() later, which may cause buffer overflow or invalid memory access.

Affected configurations

Nvd
Node
trendnetti-pg1284i_firmwareRange<2.0.2.s0
AND
trendnetti-pg1284iMatch2.0r
Node
trendnetti-g102i_firmwareMatch-
AND
trendnetti-g102iMatch-
Node
trendnetti-g160i_firmwareMatch-
AND
trendnetti-g160iMatch-
Node
trendnetti-g642i_firmwareMatch-
AND
trendnetti-g642iMatch-
Node
trendnetti-pg102i_firmwareMatch-
AND
trendnetti-pg102iMatch-
Node
trendnetti-pg541i_firmwareMatch-
AND
trendnetti-pg541iMatch-
Node
trendnetti-rp262i_firmwareMatch-
AND
trendnetti-rp262iMatch-
Node
trendnetteg-30102ws_firmwareMatch-
AND
trendnetteg-30102wsMatch-
Node
trendnettpe-30102ws_firmwareMatch-
AND
trendnettpe-30102wsMatch-
VendorProductVersionCPE
trendnetti-pg1284i_firmware*cpe:2.3:o:trendnet:ti-pg1284i_firmware:*:*:*:*:*:*:*:*
trendnetti-pg1284i2.0rcpe:2.3:h:trendnet:ti-pg1284i:2.0r:*:*:*:*:*:*:*
trendnetti-g102i_firmware-cpe:2.3:o:trendnet:ti-g102i_firmware:-:*:*:*:*:*:*:*
trendnetti-g102i-cpe:2.3:h:trendnet:ti-g102i:-:*:*:*:*:*:*:*
trendnetti-g160i_firmware-cpe:2.3:o:trendnet:ti-g160i_firmware:-:*:*:*:*:*:*:*
trendnetti-g160i-cpe:2.3:h:trendnet:ti-g160i:-:*:*:*:*:*:*:*
trendnetti-g642i_firmware-cpe:2.3:o:trendnet:ti-g642i_firmware:-:*:*:*:*:*:*:*
trendnetti-g642i-cpe:2.3:h:trendnet:ti-g642i:-:*:*:*:*:*:*:*
trendnetti-pg102i_firmware-cpe:2.3:o:trendnet:ti-pg102i_firmware:-:*:*:*:*:*:*:*
trendnetti-pg102i-cpe:2.3:h:trendnet:ti-pg102i:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 181

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

61.0%

Related for NVD:CVE-2021-33316