Uploaded image for project: 'EtherNet/IP Core V3'
  1. EtherNet/IP Core V3
  2. PSEIP-1053

Vulnerability in cpf item parsers due to lack of packet boundary checks

    Details

    • Account:
      SPC EthernetIp Core (SPCETHERNET)

      Description

      The device does not adequately validate incoming packets that use the Common Packet Format (CPF) structure. If a malformed or malicious packet claims to include an unusually large number of CPF items, the device may attempt to process more data than was actually received. This can lead to instability or, in some cases, cause the device to become unresponsive.

      Impact:
      This issue has only been observed on devices using the cifX50 (netX100) platform. Devices based on other platforms (e.g., netX90, netX51) are not affected.

      Steps to Reproduce:
      Repeatedly sending specially crafted "SendRRData" packets with a very high item count may cause the device to become unresponsive over time.

      Planned Fix:
      Packet boundary checks will be improved to ensure that malformed data cannot cause the device to access memory outside of the actual packet. This will prevent potential crashes or instability due to malformed CPF packets.

      Workaround:
      No workaround is currently available. We recommend avoiding the use of untrusted or malformed CPF packets until a fix is provided.

        Attachments

          Expenses

            Activity

              Status Description

                People

                • Reporter:
                  OKompani Omid Kompani
                • Votes:
                  0 Vote for this issue
                  Watchers:
                  0 Start watching this issue

                  Dates

                  • Created:
                    Updated:
                    Resolved: