{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T19:02:00.014","vulnerabilities":[{"cve":{"id":"CVE-2021-27393","sourceIdentifier":"productcert@siemens.com","published":"2021-04-22T21:15:10.393","lastModified":"2024-11-21T05:57:54.343","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability has been identified in Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2013.08), Nucleus Source Code (Versions including affected DNS modules). The DNS client does not properly randomize UDP port numbers of DNS requests. That could allow an attacker to poison the DNS cache or spoof DNS resolving."},{"lang":"es","value":"Se ha identificado una vulnerabilidad en Nucleus NET (Todas las versiones), Nucleus ReadyStart V3 (Todas las versiones anteriores a V2013.08), Nucleus Source Code (Versiones que incluyen los módulos DNS afectados). El cliente DNS no aleatoriza correctamente los números de puerto UDP de las peticiones DNS. Esto podría permitir a un atacante envenenar la caché DNS o falsificar la resolución DNS."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"productcert@siemens.com","type":"Secondary","description":[{"lang":"en","value":"CWE-330"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-330"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:nucleus_net:*:*:*:*:*:*:*:*","matchCriteriaId":"7A987CFB-4A41-4F82-8C7F-31DE8F0650DE"},{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:nucleus_readystart_v3:*:*:*:*:*:*:*:*","versionEndExcluding":"2013.08","matchCriteriaId":"68638787-E37D-483F-8E83-51C9A52ECC8D"},{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:nucleus_source_code:-:*:*:*:*:*:*:*","matchCriteriaId":"53A38C64-612A-4BC5-83D5-D3FA1C90E0F7"}]}]}],"references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-201384.pdf","source":"productcert@siemens.com","tags":["Vendor Advisory"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-201384.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}