Back to overview

Pepperl+Fuchs: Multiple VDM100-Distance Ethernet-IP sensors with multiple vulnerabilities

VDE-2021-028
Last update
05/14/2025 15:00
Published at
08/16/2021 14:01
Vendor(s)
Pepperl+Fuchs SE
External ID
VDE-2021-028
CSAF Document

Summary

Critical vulnerabilities have been discovered in the utilized component TRECK TCP/IP Stack by Digi International Inc.

For more information see advisory by Digi International Inc.:

Digi International Security Notice - TRECK TCP/IP Stack "RIPPLE20" VU#257161 ICS-VU-035787 | Digi International

Impact

Pepperl+Fuchs analyzed and identified affected devices.

The impact on the affected device is that it can

  • no longer perform acyclic requests
  • may drop all established cyclic connections may
  • disappear completely from the network

Affected Product(s)

Model no. Product name Affected versions
243598 VDM100-150-EIP/G2 Firmware <=2.00
256831 VDM100-300-EIP/G2 Firmware <=2.00
256830 VDM100-50-EIP/G2 Firmware <=2.00

Vulnerabilities

Expand / Collapse all

Published
09/22/2025 14:57
Weakness
Out-of-bounds Write (CWE-787)
Summary

The Treck TCP/IP stack before 5.0.1.35 has an Out-of-Bounds Write via multiple malformed IPv6 packets.

References

Published
09/22/2025 14:57
Weakness
Improper Input Validation (CWE-20)
Summary

The Treck TCP/IP stack before 6.0.1.66 allows Remote Code Execution, related to IPv4 tunneling.

References

Published
09/22/2025 14:57
Weakness
Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary

The Treck TCP/IP stack before 6.0.1.66 improperly handles an IPv4/ICMPv4 Length Parameter Inconsistency, which might allow remote attackers to trigger an information leak.

References

Published
09/22/2025 14:57
Weakness
Improper Input Validation (CWE-20)
Summary

The Treck TCP/IP stack before 6.0.1.66 allows Remote Code execution via a single invalid DNS response.

References

Published
09/22/2025 14:57
Weakness
Double Free (CWE-415)
Summary

The Treck TCP/IP stack before 6.0.1.41 has an IPv4 tunneling Double Free.

References

Published
09/22/2025 14:57
Weakness
Out-of-bounds Write (CWE-787)
Summary

The Treck TCP/IP stack before 6.0.1.66 has an Integer Overflow during Memory Allocation that causes an Out-of-Bounds Write.

References

Published
09/22/2025 14:57
Weakness
Out-of-bounds Read (CWE-125)
Summary

The Treck TCP/IP stack before 6.0.1.66 has an IPv6OverIPv4 tunneling Out-of-bounds Read.

References

Published
09/22/2025 14:57
Weakness
Out-of-bounds Read (CWE-125)
Summary

The Treck TCP/IP stack before 6.0.1.28 has a DHCP Out-of-bounds Read.

References

Published
09/22/2025 14:57
Weakness
Out-of-bounds Read (CWE-125)
Summary

The Treck TCP/IP stack before 6.0.1.66 has a DHCPv6 Out-of-bounds Read.

References

Published
09/22/2025 14:57
Weakness
()
Summary

The Treck TCP/IP stack before 6.0.1.66 allows Remote Code Execution, related to IPv4 tunneling.

References

Published
09/22/2025 14:57
Weakness
Integer Underflow (Wrap or Wraparound) (CWE-191)
Summary

The Treck TCP/IP stack before 6.0.1.66 has an Ethernet Link Layer Integer Underflow.

References

Published
09/22/2025 14:57
Weakness
Out-of-bounds Read (CWE-125)
Summary

The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read.

References

Published
09/22/2025 14:57
Weakness
Missing Authorization (CWE-862)
Summary

The Treck TCP/IP stack before 6.0.1.66 has Improper ICMPv4 Access Control.

References

Published
09/22/2025 14:57
Weakness
Out-of-bounds Read (CWE-125)
Summary

The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read.

References

Published
09/22/2025 14:57
Weakness
Out-of-bounds Read (CWE-125)
Summary

The Treck TCP/IP stack before 6.0.1.66 has a TCP Out-of-bounds Read.

References

Published
09/22/2025 14:57
Weakness
Integer Underflow (Wrap or Wraparound) (CWE-191)
Summary

The Treck TCP/IP stack before 6.0.1.66 has an IPv4 Integer Underflow.

References

Published
09/22/2025 14:57
Weakness
Out-of-bounds Read (CWE-125)
Summary

The Treck TCP/IP stack before 6.0.1.66 has an ICMPv4 Out-of-bounds Read.

References

Published
09/22/2025 14:57
Weakness
Out-of-bounds Read (CWE-125)
Summary

The Treck TCP/IP stack before 6.0.1.66 has an ARP Out-of-bounds Read.

References

Published
09/22/2025 14:57
Weakness
()
Summary

The Treck TCP/IP stack before 4.7.1.27 mishandles '\0' termination in DHCP.

References

Mitigation

An external protective measure is required.

  • Minimize network exposure for affected products and ensure that they are not accessible via the Internet.
  • Isolate affected products from the corporate network.
  • If remote access is required, use secure methods such as virtual private networks (VPNs).

Revision History

Version Date Summary
1 08/16/2021 14:01 Initial revision.
2 05/14/2025 15:00 Fix: added distribution