Summary
Critical vulnerabilities have been discovered in the utilized component TRECK TCP/IP Stack by Digi International Inc.
For more information see advisory by Digi International Inc.:
Digi International Security Notice - TRECK TCP/IP Stack "RIPPLE20" VU#257161 ICS-VU-035787 | Digi International
Impact
Pepperl+Fuchs analyzed and identified affected devices.
The impact on the affected device is that it can
- no longer perform acyclic requests
- may drop all established cyclic connections may
- disappear completely from the network
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
243598 | VDM100-150-EIP/G2 | Firmware <=2.00 |
256831 | VDM100-300-EIP/G2 | Firmware <=2.00 |
256830 | VDM100-50-EIP/G2 | Firmware <=2.00 |
Vulnerabilities
Expand / Collapse allThe Treck TCP/IP stack before 5.0.1.35 has an Out-of-Bounds Write via multiple malformed IPv6 packets.
The Treck TCP/IP stack before 6.0.1.66 allows Remote Code Execution, related to IPv4 tunneling.
The Treck TCP/IP stack before 6.0.1.66 improperly handles an IPv4/ICMPv4 Length Parameter Inconsistency, which might allow remote attackers to trigger an information leak.
The Treck TCP/IP stack before 6.0.1.66 allows Remote Code execution via a single invalid DNS response.
The Treck TCP/IP stack before 6.0.1.41 has an IPv4 tunneling Double Free.
The Treck TCP/IP stack before 6.0.1.66 has an Integer Overflow during Memory Allocation that causes an Out-of-Bounds Write.
The Treck TCP/IP stack before 6.0.1.66 has an IPv6OverIPv4 tunneling Out-of-bounds Read.
The Treck TCP/IP stack before 6.0.1.28 has a DHCP Out-of-bounds Read.
The Treck TCP/IP stack before 6.0.1.66 has a DHCPv6 Out-of-bounds Read.
The Treck TCP/IP stack before 6.0.1.66 allows Remote Code Execution, related to IPv4 tunneling.
The Treck TCP/IP stack before 6.0.1.66 has an Ethernet Link Layer Integer Underflow.
The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read.
The Treck TCP/IP stack before 6.0.1.66 has Improper ICMPv4 Access Control.
The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read.
The Treck TCP/IP stack before 6.0.1.66 has a TCP Out-of-bounds Read.
The Treck TCP/IP stack before 6.0.1.66 has an IPv4 Integer Underflow.
The Treck TCP/IP stack before 6.0.1.66 has an ICMPv4 Out-of-bounds Read.
The Treck TCP/IP stack before 6.0.1.66 has an ARP Out-of-bounds Read.
The Treck TCP/IP stack before 4.7.1.27 mishandles '\0' termination in DHCP.
Mitigation
An external protective measure is required.
- Minimize network exposure for affected products and ensure that they are not accessible via the Internet.
- Isolate affected products from the corporate network.
- If remote access is required, use secure methods such as virtual private networks (VPNs).
Revision History
Version | Date | Summary |
---|---|---|
1 | 08/16/2021 14:01 | Initial revision. |
2 | 05/14/2025 15:00 | Fix: added distribution |