Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-27458

EPSS 0.26% · P50
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-27458

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
If Ethernet communication of the JTEKT Corporation TOYOPUC product series’ (TOYOPUC-PC10 Series: PC10G-CPU TCC-6353: All versions, PC10GE TCC-6464: All versions, PC10P TCC-6372: All versions, PC10P-DP TCC-6726: All versions, PC10P-DP-IO TCC-6752: All versions, PC10B-P TCC-6373: All versions, PC10B TCC-1021: All versions, PC10B-E/C TCU-6521: All versions, PC10E TCC-4737: All versions; TOYOPUC-Plus Series: Plus CPU TCC-6740: All versions, Plus EX TCU-6741: All versions, Plus EX2 TCU-6858: All versions, Plus EFR TCU-6743: All versions, Plus EFR2 TCU-6859: All versions, Plus 2P-EFR TCU-6929: All versions, Plus BUS-EX TCU-6900: All versions; TOYOPUC-PC3J/PC2J Series: FL/ET-T-V2H THU-6289: All versions, 2PORT-EFR THU-6404: All versions) are left in an open state by an attacker, Ethernet communications cannot be established with other devices, depending on the settings of the link parameters.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
不恰当的资源关闭或释放
Source: NVD (National Vulnerability Database)
Vulnerability Title
JTEKT TOYOPUC-Plus 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
JTEKT TOYOPUC-Plus是日本JTEKT公司的一个PLC。 多款TOYOPUC产品存在安全漏洞,该漏洞源于产品的以太网通信处于开放状态时,根据链路参数的设置,无法与其他设备建立以太网通信。以下产品及版本受到影响:TOYOPUC-PC10G-CPU TCC-6353、 TOYOPUC-PC10GE TCC-6464、 TOYOPUC-PC10P TCC-6372、 TOYOPUC-PC10P-DP TCC-6726、 TOYOPUC-PC10P-DP-IO TCC-6752、 TOYOPUC-P
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-JTEKT Corporation TOYOPUC products TOYOPUC-PC10 Series: PC10G-CPU TCC-6353: All versions, PC10GE TCC-6464: All versions, PC10P TCC-6372: All versions, PC10P-DP TCC-6726: All versions, PC10P-DP-IO TCC-6752: All versions, PC10B-P TCC-6373: All versions, PC10B TCC-1021: All versions, PC10B-E/ -

II. Public POCs for CVE-2021-27458

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-27458

登录查看更多情报信息。

Same Patch Batch · n/a · 2021-04-19 · 32 CVEs total

CVE-2021-31255GPAC 缓冲区错误漏洞
CVE-2021-29399XMB 跨站脚本漏洞
CVE-2021-21981VMware NSX-T 权限许可和访问控制问题漏洞
CVE-2021-27027Autodesk FBX Review 缓冲区错误漏洞
CVE-2021-27028Autodesk FBX Review 缓冲区错误漏洞
CVE-2021-27029Autodesk FBX Review 代码问题漏洞
CVE-2021-27030Autodesk FBX Review 路径遍历漏洞
CVE-2021-27031Autodesk FBX Review 资源管理错误漏洞
CVE-2020-28141Online Discussion Forum 跨站脚本漏洞
CVE-2021-31262GPAC 代码问题漏洞
CVE-2021-31261GPAC 缓冲区错误漏洞
CVE-2021-31260GPAC 代码问题漏洞
CVE-2021-31259GPAC 代码问题漏洞
CVE-2021-31258GPAC 代码问题漏洞
CVE-2021-31257GPAC 代码问题漏洞
CVE-2021-31256GPAC 缓冲区错误漏洞
CVE-2021-20208SUSE Linux Enterprise Server 安全漏洞
CVE-2021-31254GPAC 缓冲区错误漏洞
CVE-2021-30199GPAC 代码问题漏洞
CVE-2021-30022GPAC 输入验证错误漏洞

Showing top 20 of 32 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2021-27458

No comments yet


Leave a comment