Impact
The vulnerability resides in the EaetherNet/IP stack of certain Hirschmann HiOS devices. Improper validation of packet length fields allows a remote attacker to craft a UDP EtherNet/IP packet that declares a larger size than the actual payload, leading the stack to crash or hang. This results in a denial of service and leaves the device inoperable. The weakness is classified as CWE-20, input validation error.
Affected Systems
Devices running Belden Hirschmann HiOS firmware versions earlier than 08.1.00 and 07.1.01 are impacted. These versions are found on network gateways and industrial controllers that deploy the HiOS operating system.
Risk and Exploitability
The flaw carries a CVSS score of 8.7, indicating high severity. EPSS data is not available, but the vulnerability can be triggered over the network without authentication by sending crafted UDP packets on the standard EtherNet/IP port. Because the exploit requires no user interaction, exposed devices face a realistic risk of interruption, and the issue is not currently listed in CISA’s KEV catalog.
OpenCVE Enrichment