{"document":{"acknowledgments":[{"urls":["https://kb.cert.org/vuls/id/608209#acknowledgements"]}],"category":"CERT/CC Vulnerability Note","csaf_version":"2.0","notes":[{"category":"summary","text":"### Overview\r\nHCC Embedded's software called InterNiche stack (NicheStack) and NicheLite, which provides TCP/IP networking capability to embedded systems, is impacted by multiple vulnerabilities. The Forescout and JFrog researchers who discovered this set of vulnerabilities have identified these as \"INFRA:HALT\" \r\n\r\n### Description\r\nHCC Embedded acquired NicheStack from Interniche in order to provide TCP/IP protocol capabilities to lightweight devices such as IoT.  NicheStack has been made available since late 1990's to a widely varied customer base in multiple forms to support various implementations.  This has made NicheStack to be part of a complex supply chain into major industries including devices in [ critical infrastructure](https://us-cert.cisa.gov/ics/advisories/icsa-21-217-01).  \r\n\r\nForescout and JFrog researchers have identified [14 vulnerabilities](https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/) related to network packet processing errors in NicheStack and NicheLite versions 4.3 released before 2021-05-28.  Most of these vulnerabilities stem from improper [memory management ](https://wiki.sei.cmu.edu/confluence/pages/viewpage.action?pageId=87152142) commonly seen in lightweight operating systems.  Of these 14 vulnerabilities, five involve processing of TCP and ICMP ([OSI](https://en.wikipedia.org/wiki/OSI_model) Layer-4 protocols) and the rest involve common application protocols such as HTTP and DNS (OSI Layer-7).  The processing of these OSI layers involve a number of boundary checks and some specific \"application\" processing capabilities (such as randomization) commonly overlooked in development of lightweight networking software.  \r\n\r\nVarious stakeholders, including HCC Embedded, have made attempts to reach  impacted vendors to provide software fixes that address these issues. A lack of formalization of software OEM relationships and a lack of Software Bill of Materials (SBOM) has complicated this outreach and the much-needed identification of impacted devices. \r\n\r\n### Impact\r\nThe impact of exploiting these vulnerabilities will vary widely, depending on the implementation options used while developing embedded systems that use NicheStack or NicheLite. As these vulnerabilities involve processing of network packets, attackers can generally abuse these errors via remote network access. In summary, a remote, unauthenticated attacker may be able to use specially-crafted network packets to cause a denial of service, disclose information, or in some cases be able to execute arbitrary code on the target device. \r\n\r\n\r\n### Solution\r\n#### Apply updates\r\nThe most reliable way to address these vulnerabilities is to update to the latest stable version of NicheStack software mentioned in HCC Embedded mentioned in their [Security Advisories](https://www.hcc-embedded.com/support/security-advisories). If you are unsure or have discovered NicheStack using [open-source tools](https://github.com/Forescout/project-memoria-detector) provided by Forescout, reach out to HCC Embedded via their [PSIRT](https://www.hcc-embedded.com/support/security-advisories/product-security-policy) security team or to your upstream vendor in your supply chain to obtain the software fixes.  HCC has also provided a [register to be notified](https://www.hcc-embedded.com/support/security-advisories/security-advisories-notification)  web page for sustaining this outreach for their long-standing customers.\r\n\r\n#### Block anomalous IP traffic\r\nCERT/CC recognizes that many implementations of NicheStack involve longer lifecycles for patching.  In the meantime, if feasible, organizations can consider isolating impacted devices and blocking network attacks using network inspection, as detailed below, when network isolation is not feasible.  It is recommended that security features available to you in devices such as router, firewalls for blocking anomalous network packets are enabled and properly configured. Below is a list of possible mitigations that address some specific network attacks that attempt to exploit these vulnerabilities.\r\n\r\n* Provide DNS recursion services to the embedded devices using recursive DNS servers that are securely configured, and well-maintained with patches and updates.\r\n* Provide HTTP access to embedded devices that are in an isolated network via securely configured HTTP reverse proxy or using HTTP deep packet inspection firewalls.\r\n* Filter ICMP and TFTP access to embedded devices from the wider Internet and use stateful inspection of these protocols when accessible to wider Internet to avoid abuse.\r\n* Enforce TCP stateful inspection for embedded device and reject malformed TCP packets using router, firewall features as available to the operational environment.\r\n\r\nWhen blocking or isolating is not an option, perform passive inspection using IDS that can alert on anomalous attempts to exploit these vulnerabilities. See also our recommendations and IDS rules that were made available for Treck TCP/IP stack related vulnerabilities [VU#257161](https://kb.cert.org/vuls/id/257161) for [examples](https://github.com/CERTCC/PoC-Exploits/tree/master/vu-257161).\r\n\r\n### Acknowledgements\r\nThanks to Amine Amri, Stanislav Dashevskyi, and Daniel dos Santos from Forescout, and Asaf Karas and Shachar Menashe from JFrog who reported these vulnerabilities and supported coordinated disclosure.  HCC Embedded, the primary OEM vendor, also supported our efforts to coordinate and develop security fixes to address these issues.\r\n\r\nThis document was written by Vijay Sarvepalli.","title":"Summary"},{"category":"legal_disclaimer","text":"THIS DOCUMENT IS PROVIDED ON AN 'AS IS' BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. ","title":"Legal Disclaimer"},{"category":"other","text":"CERT/CC Vulnerability Note is a limited advisory. It primarily identifies vendors impacted by the advisory and not specific products. We only support \"known_affected\" and \"known_not_affected\" status. Please consult the vendor's statements and advisory URL if provided by the vendor for more details ","title":"Limitations of Advisory"},{"category":"other","text":"Fujitsu is aware of the security vulnerabilities in HCC Embedded / InterNiche NicheStack, also known as \"INFRA:HALT\". \r\n\r\nFujitsu commenced an analysis, together with Fujitsu company PFU (EMEA) LIMITED. Despite initial findings by FORESCOUT, the NicheStack TCP/IP stack is not employed in PFU (EMEA) LIMITED or Fujitsu products. \r\n\r\nTherefore, there are no currently known affected Fujitsu products. Researchers from FORESCOUT were asked to remove a false-positive detection of certain Fujitsu company PFU (EMEA) LIMITED products. However, products by 3rd parties, based on PFU (EMEA) LIMITED products, may contain modifications and employ the HCC Embedded / InterNiche NicheStack. \r\n\r\nThe Fujitsu PSIRT provides a status for Fujitsu PSS-IS-2021-051916 on https://security.ts.fujitsu.com (Security Notices) accordingly. Due to the non-affection, the issue is therefore considered resolved. \r\n\r\nIn case of questions regarding this Fujitsu PSIRT Security Notice, please contact the Fujitsu PSIRT (Fujitsu-PSIRT@ts.fujitsu.com).","title":"Vendor statment from Fujitsu"},{"category":"other","text":"Siemens is aware of the security vulnerabilities in the InterNiche TCP/IP stack, also named “INFRA:HALT” and disclosed on 2021-08-04. The impact to Siemens products is described in the Security Advisory SSA-789208, published on 2021-08-04 on the Siemens ProductCERT page (https://www.siemens.com/cert/advisories).","title":"Vendor statment from Siemens"},{"category":"other","text":"We do not use nor ship with any of the NicheStack DNS capabilities.","title":"Vendor statment from Intel"}],"publisher":{"category":"coordinator","contact_details":"Email: cert@cert.org, Phone: +1412 268 5800","issuing_authority":"CERT/CC under DHS/CISA https://www.cisa.gov/cybersecurity also see https://kb.cert.org/ ","name":"CERT/CC","namespace":"https://kb.cert.org/"},"references":[{"url":"https://certcc.github.io/certcc_disclosure_policy","summary":"CERT/CC vulnerability disclosure policy"},{"summary":"CERT/CC document released","category":"self","url":"https://kb.cert.org/vuls/id/608209"},{"url":"https://www.hcc-embedded.com/support/security-advisories","summary":"https://www.hcc-embedded.com/support/security-advisories"},{"url":"https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/","summary":"https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/"},{"url":"https://jfrog.com/blog/infrahalt-14-new-security-vulnerabilities-found-in-nichestack/","summary":"https://jfrog.com/blog/infrahalt-14-new-security-vulnerabilities-found-in-nichestack/"},{"url":"https://us-cert.cisa.gov/ics/advisories/icsa-21-217-01","summary":"https://us-cert.cisa.gov/ics/advisories/icsa-21-217-01"},{"url":"https://cert.vde.com/de-de/advisories/vde-2021-032","summary":"https://cert.vde.com/de-de/advisories/vde-2021-032"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-789208.pdf","summary":"Reference(s) from vendor \"Siemens\""},{"url":"https://dam-mdc.phoenixcontact.com/asset/156443151564/fd2c482c84c16546afd992cf1786995e/Security_Advisory_Niche-Stack_20210804.pdf","summary":"Reference(s) from vendor \"Phoenix Contact\""},{"url":"https://cert.vde.com/de-de/advisories/vde-2021-032","summary":"Reference(s) from vendor \"Phoenix Contact\""}],"title":"NicheStack embedded TCP/IP has vulnerabilities","tracking":{"current_release_date":"2022-09-23T20:27:41+00:00","generator":{"engine":{"name":"VINCE","version":"3.0.35"}},"id":"VU#608209","initial_release_date":"2021-08-10 00:00:00+00:00","revision_history":[{"date":"2022-09-23T20:27:41+00:00","number":"1.20220923202741.2","summary":"Released on 2022-09-23T20:27:41+00:00"}],"status":"final","version":"1.20220923202741.2"}},"vulnerabilities":[{"title":"FSCT-2020-0055 - InterNiche stack versions 4.","notes":[{"category":"summary","text":"FSCT-2020-0055 - InterNiche stack versions 4.3 and earlier are susceptible to memory leak triggered by a \"Read out of bounds\" vulnerability in in_tftp routine. The TFTP packet processing function doesn’t ensure that a filename is null-terminated, therefore a subsequent call to strlen() upon the file name might read out of bounds of the protocol packet buffer."}],"cve":"CVE-2021-36762","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#608209"}],"product_status":{"known_not_affected":["CSAFPID-68144ad2-39da-11f1-8422-122e2785dc9f","CSAFPID-6814ec12-39da-11f1-8422-122e2785dc9f","CSAFPID-6815202e-39da-11f1-8422-122e2785dc9f","CSAFPID-681560ac-39da-11f1-8422-122e2785dc9f","CSAFPID-6815a26a-39da-11f1-8422-122e2785dc9f"]}},{"title":"FSCT-2020-0035 NicheStack 4.","notes":[{"category":"summary","text":"FSCT-2020-0035 NicheStack 4.0.1's code that processes DNS responses does not check whether the number of queries/responses specified in the DNS packet header corresponds to the query/response data available in the DNS packet, leading to Out-of-bounds read, and Denial-of-Service as a consequence.  Researcher has provided a CVSS V3 score of 8.2, AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"cve":"CVE-2020-25927","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#608209"}],"product_status":{"known_affected":["CSAFPID-6816241a-39da-11f1-8422-122e2785dc9f","CSAFPID-68165ca0-39da-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-6816a6ba-39da-11f1-8422-122e2785dc9f","CSAFPID-6816cf6e-39da-11f1-8422-122e2785dc9f","CSAFPID-681701be-39da-11f1-8422-122e2785dc9f","CSAFPID-68172a0e-39da-11f1-8422-122e2785dc9f","CSAFPID-68175146-39da-11f1-8422-122e2785dc9f"]}},{"title":"VD-2133 - Interniche is vulnerable to heap-buffer overflow exists in the code that parses the HTTP POST request due to an incorrect signed integer comparison.","notes":[{"category":"summary","text":"VD-2133 - Interniche is vulnerable to heap-buffer overflow exists in the code that parses the HTTP POST request due to an incorrect signed integer comparison.\r\nThis vulnerability requires the attacker to send a malformed HTTP packet with a negative “Content- Length” which bypasses the size checks and results in a large heap overflow in the wbs_multidata buffer copy."}],"cve":"CVE-2021-31227","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#608209"}],"product_status":{"known_affected":["CSAFPID-6817f3f8-39da-11f1-8422-122e2785dc9f","CSAFPID-6818f1f4-39da-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-68181cac-39da-11f1-8422-122e2785dc9f","CSAFPID-68185492-39da-11f1-8422-122e2785dc9f","CSAFPID-68188fb6-39da-11f1-8422-122e2785dc9f","CSAFPID-6818c36e-39da-11f1-8422-122e2785dc9f"]}},{"title":"VD-2132 - Interniche is vulnerable to a heap-buffer overflow exists in the code that parses the HTTP POST request due to lack of size validation.","notes":[{"category":"summary","text":"VD-2132 - Interniche is vulnerable to a heap-buffer overflow exists in the code that parses the HTTP POST request due to lack of size validation. This vulnerability requires the attacker to send a specially crafted HTTP POST request with a URI longer than 50 bytes."}],"cve":"CVE-2021-31226","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#608209"}],"product_status":{"known_affected":["CSAFPID-6819ee2e-39da-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-68198862-39da-11f1-8422-122e2785dc9f","CSAFPID-681a2dc6-39da-11f1-8422-122e2785dc9f","CSAFPID-681a597c-39da-11f1-8422-122e2785dc9f","CSAFPID-681a9554-39da-11f1-8422-122e2785dc9f","CSAFPID-681ad140-39da-11f1-8422-122e2785dc9f"]}},{"title":"FSCT-2021-0001: Whenever the web server receives an HTTP request that it cannot handle, it invokes a debugger hook, which is an infinite loop that does nothing, thus the underlying TCP/IP stack will stop interacting via network.","notes":[{"category":"summary","text":"FSCT-2021-0001: Whenever the web server receives an HTTP request that it cannot handle, it invokes a debugger hook, which is an infinite loop that does nothing, thus the underlying TCP/IP stack will stop interacting via network."}],"cve":"CVE-2021-27565","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#608209"}],"product_status":{"known_affected":["CSAFPID-681b4e4a-39da-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-681b8374-39da-11f1-8422-122e2785dc9f","CSAFPID-681bea58-39da-11f1-8422-122e2785dc9f","CSAFPID-681c1c44-39da-11f1-8422-122e2785dc9f","CSAFPID-681c601e-39da-11f1-8422-122e2785dc9f","CSAFPID-681c9c1e-39da-11f1-8422-122e2785dc9f"]}},{"title":"FSCT-2020-0054 ; Integer overflow in TCP header processing function.","notes":[{"category":"summary","text":"FSCT-2020-0054 ; Integer overflow in TCP header processing function.  Researcher has provided a CVSS score as 7.5, AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"cve":"CVE-2021-31401","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#608209"}],"product_status":{"known_affected":["CSAFPID-681d5e38-39da-11f1-8422-122e2785dc9f","CSAFPID-681e8592-39da-11f1-8422-122e2785dc9f","CSAFPID-681ebd46-39da-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-681dafb4-39da-11f1-8422-122e2785dc9f","CSAFPID-681df9ec-39da-11f1-8422-122e2785dc9f","CSAFPID-681e4794-39da-11f1-8422-122e2785dc9f"]}},{"title":"FSCT-2020-0050 : Predictbale TCP Initial Sequence Number (ISN) generation can be abused for TCP Connection Hijacking/Spoofing.","notes":[{"category":"summary","text":"FSCT-2020-0050 : Predictbale TCP Initial Sequence Number (ISN) generation can be abused for TCP Connection Hijacking/Spoofing.  Researcher has provided a CVSS score as 7.5, AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"cve":"CVE-2020-35685","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#608209"}],"product_status":{"known_affected":["CSAFPID-681f7894-39da-11f1-8422-122e2785dc9f","CSAFPID-68205610-39da-11f1-8422-122e2785dc9f","CSAFPID-68208644-39da-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-681fa792-39da-11f1-8422-122e2785dc9f","CSAFPID-681fe50e-39da-11f1-8422-122e2785dc9f","CSAFPID-68200d54-39da-11f1-8422-122e2785dc9f"]}},{"title":"VD-2135 - Interniche is vulnerability DNS cache poisoning due to easy predictability of DNS queries’ source port, that can be used by a remote attacker to send forged DNS response packets that will be accepted as valid answers to the DNS client’s requests.","notes":[{"category":"summary","text":"VD-2135 - Interniche is vulnerability DNS cache poisoning due to easy predictability of DNS queries’ source port, that can be used by a remote attacker to send forged DNS response packets that will be accepted as valid answers to the DNS client’s requests. The researcher has provided a CVSS score of 4, AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N"}],"cve":"CVE-2021-31228","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#608209"}],"product_status":{"known_affected":["CSAFPID-6821214e-39da-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-68215efc-39da-11f1-8422-122e2785dc9f","CSAFPID-6821a1a0-39da-11f1-8422-122e2785dc9f","CSAFPID-6821f6fa-39da-11f1-8422-122e2785dc9f","CSAFPID-68223fc0-39da-11f1-8422-122e2785dc9f","CSAFPID-682285e8-39da-11f1-8422-122e2785dc9f"]}},{"title":"FSCT-2020-0053 : Infinite loop in TCP urgent data processing function.","notes":[{"category":"summary","text":"FSCT-2020-0053 : Infinite loop in TCP urgent data processing function. The researcher has provided a CVSS score of 7.5, AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"cve":"CVE-2021-31400","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#608209"}],"product_status":{"known_affected":["CSAFPID-682345aa-39da-11f1-8422-122e2785dc9f","CSAFPID-682382b8-39da-11f1-8422-122e2785dc9f","CSAFPID-68251448-39da-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-6823ccb4-39da-11f1-8422-122e2785dc9f","CSAFPID-68240c6a-39da-11f1-8422-122e2785dc9f","CSAFPID-68247af6-39da-11f1-8422-122e2785dc9f","CSAFPID-6824cea2-39da-11f1-8422-122e2785dc9f"]}},{"title":"VD-2131, VD-2136 - NicheStack 4.","notes":[{"category":"summary","text":"VD-2131, VD-2136 - NicheStack 4.0.1's  routine for parsing DNS response packets does not check the \"response data length\" field of individual DNS answers which may cause Out-of-bounds read/write, leading to Information leak, Denial-or-Service, or Remote Code Execution, depending on the context."}],"cve":"CVE-2020-25928","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#608209"}],"product_status":{"known_affected":["CSAFPID-68257a8c-39da-11f1-8422-122e2785dc9f","CSAFPID-6825b0ba-39da-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-6825fe44-39da-11f1-8422-122e2785dc9f","CSAFPID-6826275c-39da-11f1-8422-122e2785dc9f","CSAFPID-682661a4-39da-11f1-8422-122e2785dc9f","CSAFPID-68268efe-39da-11f1-8422-122e2785dc9f","CSAFPID-6826c8ce-39da-11f1-8422-122e2785dc9f"]}},{"title":"FSCT-2020-0033-a - NicheStack 4.","notes":[{"category":"summary","text":"FSCT-2020-0033-a - NicheStack 4.0.1's routine that parses DNS domain names has no checks on whether a domain name compression pointer is pointing within the bounds of the packet (e.g., forward compression pointer jumps are allowed), which leads to OOB-R and Denial-of-Service as a consequence."}],"cve":"CVE-2020-25767","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#608209"}],"product_status":{"known_affected":["CSAFPID-682728c8-39da-11f1-8422-122e2785dc9f","CSAFPID-6827ae88-39da-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-68275e24-39da-11f1-8422-122e2785dc9f","CSAFPID-6827e3b2-39da-11f1-8422-122e2785dc9f","CSAFPID-682838bc-39da-11f1-8422-122e2785dc9f","CSAFPID-68287264-39da-11f1-8422-122e2785dc9f","CSAFPID-6828a37e-39da-11f1-8422-122e2785dc9f"]}},{"title":"FSCT-2020-0036 and VD-2134 - NicheStack 4.","notes":[{"category":"summary","text":"FSCT-2020-0036 and VD-2134 - NicheStack 4.0.1's DNS client in NicheStacks does not set sufficiently random transaction IDs, facilitating DNS cache poisoning attacks.  Researcher has provided a CVSS v3 score of 4, AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N"}],"cve":"CVE-2020-25926","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#608209"}],"product_status":{"known_affected":["CSAFPID-68293b22-39da-11f1-8422-122e2785dc9f","CSAFPID-68297b82-39da-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-6829d5fa-39da-11f1-8422-122e2785dc9f","CSAFPID-682a1736-39da-11f1-8422-122e2785dc9f","CSAFPID-682a49cc-39da-11f1-8422-122e2785dc9f","CSAFPID-682a8982-39da-11f1-8422-122e2785dc9f","CSAFPID-682acad2-39da-11f1-8422-122e2785dc9f"]}},{"title":"FSCT-2020-0049 : Integer overflow in TCP checksum calculation function.","notes":[{"category":"summary","text":"FSCT-2020-0049 : Integer overflow in TCP checksum calculation function. Researcher has provided a CVSS score as 7.5, AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"cve":"CVE-2020-35684","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#608209"}],"product_status":{"known_affected":["CSAFPID-682b91ba-39da-11f1-8422-122e2785dc9f","CSAFPID-682c9b46-39da-11f1-8422-122e2785dc9f","CSAFPID-682cd994-39da-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-682bd792-39da-11f1-8422-122e2785dc9f","CSAFPID-682c07bc-39da-11f1-8422-122e2785dc9f","CSAFPID-682c5366-39da-11f1-8422-122e2785dc9f"]}},{"title":"FSCT-2020-0048 : Integer overflow in ICMP packet demultiplexing function.","notes":[{"category":"summary","text":"FSCT-2020-0048 : Integer overflow in ICMP packet demultiplexing function.  Researcher has provided a CVSS score as 7.5, AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"cve":"CVE-2020-35683","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#608209"}],"product_status":{"known_affected":["CSAFPID-682d7b60-39da-11f1-8422-122e2785dc9f","CSAFPID-682e48e2-39da-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-682db10c-39da-11f1-8422-122e2785dc9f","CSAFPID-682ddb78-39da-11f1-8422-122e2785dc9f","CSAFPID-682e1124-39da-11f1-8422-122e2785dc9f"]}}],"product_tree":{"branches":[{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-68144ad2-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-681483a8-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HCC Embedded","product":{"name":"HCC Embedded Products","product_id":"CSAFPID-6814bb16-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-6814ec12-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-6815202e-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Siemens","product":{"name":"Siemens Products","product_id":"CSAFPID-681560ac-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Contact","product":{"name":"Phoenix Contact Products","product_id":"CSAFPID-6815a26a-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-6816241a-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HCC Embedded","product":{"name":"HCC Embedded Products","product_id":"CSAFPID-68165ca0-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-6816a6ba-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-6816cf6e-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-681701be-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Siemens","product":{"name":"Siemens Products","product_id":"CSAFPID-68172a0e-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Contact","product":{"name":"Phoenix Contact Products","product_id":"CSAFPID-68175146-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-6817c130-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HCC Embedded","product":{"name":"HCC Embedded Products","product_id":"CSAFPID-6817f3f8-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-68181cac-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-68185492-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-68188fb6-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Siemens","product":{"name":"Siemens Products","product_id":"CSAFPID-6818c36e-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Contact","product":{"name":"Phoenix Contact Products","product_id":"CSAFPID-6818f1f4-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-68198862-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-6819bd5a-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HCC Embedded","product":{"name":"HCC Embedded Products","product_id":"CSAFPID-6819ee2e-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-681a2dc6-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-681a597c-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Siemens","product":{"name":"Siemens Products","product_id":"CSAFPID-681a9554-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Contact","product":{"name":"Phoenix Contact Products","product_id":"CSAFPID-681ad140-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HCC Embedded","product":{"name":"HCC Embedded Products","product_id":"CSAFPID-681b4e4a-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-681b8374-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-681bb506-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-681bea58-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-681c1c44-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Siemens","product":{"name":"Siemens Products","product_id":"CSAFPID-681c601e-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Contact","product":{"name":"Phoenix Contact Products","product_id":"CSAFPID-681c9c1e-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-681d1428-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HCC Embedded","product":{"name":"HCC Embedded Products","product_id":"CSAFPID-681d5e38-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-681dafb4-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-681df9ec-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-681e4794-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Siemens","product":{"name":"Siemens Products","product_id":"CSAFPID-681e8592-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Contact","product":{"name":"Phoenix Contact Products","product_id":"CSAFPID-681ebd46-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-681f3f00-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HCC Embedded","product":{"name":"HCC Embedded Products","product_id":"CSAFPID-681f7894-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-681fa792-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-681fe50e-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-68200d54-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Siemens","product":{"name":"Siemens Products","product_id":"CSAFPID-68205610-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Contact","product":{"name":"Phoenix Contact Products","product_id":"CSAFPID-68208644-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-6820edb4-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HCC Embedded","product":{"name":"HCC Embedded Products","product_id":"CSAFPID-6821214e-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-68215efc-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-6821a1a0-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-6821f6fa-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Siemens","product":{"name":"Siemens Products","product_id":"CSAFPID-68223fc0-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Contact","product":{"name":"Phoenix Contact Products","product_id":"CSAFPID-682285e8-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-682345aa-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HCC Embedded","product":{"name":"HCC Embedded Products","product_id":"CSAFPID-682382b8-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-6823ccb4-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-68240c6a-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-68247af6-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Siemens","product":{"name":"Siemens Products","product_id":"CSAFPID-6824cea2-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Contact","product":{"name":"Phoenix Contact Products","product_id":"CSAFPID-68251448-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-68257a8c-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HCC Embedded","product":{"name":"HCC Embedded Products","product_id":"CSAFPID-6825b0ba-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-6825fe44-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-6826275c-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-682661a4-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Siemens","product":{"name":"Siemens Products","product_id":"CSAFPID-68268efe-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Contact","product":{"name":"Phoenix Contact Products","product_id":"CSAFPID-6826c8ce-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HCC Embedded","product":{"name":"HCC Embedded Products","product_id":"CSAFPID-682728c8-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-68275e24-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-6827ae88-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-6827e3b2-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-682838bc-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Siemens","product":{"name":"Siemens Products","product_id":"CSAFPID-68287264-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Contact","product":{"name":"Phoenix Contact Products","product_id":"CSAFPID-6828a37e-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-68293b22-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HCC Embedded","product":{"name":"HCC Embedded Products","product_id":"CSAFPID-68297b82-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-6829d5fa-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-682a1736-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-682a49cc-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Siemens","product":{"name":"Siemens Products","product_id":"CSAFPID-682a8982-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Contact","product":{"name":"Phoenix Contact Products","product_id":"CSAFPID-682acad2-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-682b575e-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HCC Embedded","product":{"name":"HCC Embedded Products","product_id":"CSAFPID-682b91ba-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-682bd792-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-682c07bc-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-682c5366-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Siemens","product":{"name":"Siemens Products","product_id":"CSAFPID-682c9b46-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Contact","product":{"name":"Phoenix Contact Products","product_id":"CSAFPID-682cd994-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-682d54aa-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"HCC Embedded","product":{"name":"HCC Embedded Products","product_id":"CSAFPID-682d7b60-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-682db10c-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AVM GmbH","product":{"name":"AVM GmbH Products","product_id":"CSAFPID-682ddb78-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-682e1124-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Siemens","product":{"name":"Siemens Products","product_id":"CSAFPID-682e48e2-39da-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Contact","product":{"name":"Phoenix Contact Products","product_id":"CSAFPID-682e7718-39da-11f1-8422-122e2785dc9f"}}]}}