### [CVE-2021-21005](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21005) ![](https://img.shields.io/static/v1?label=Product&message=FL%20NAT&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=FL%20SWITCH&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=SMCS%2014TX%2F2FX%20(2700997)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=SMCS%2014TX%2F2FX-SM%20(2701466)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=SMCS%2016TX%20(2700996)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=SMCS%204TX-PN%20(2989093)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=SMCS%206GT%2F2SFP%20(2891479)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=SMCS%206TX%2F2SFP%20(2989323)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=SMCS%208GT%20(2891123)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=SMCS%208TX%20(2989226)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=SMCS%208TX-PN%20(2989103)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=SMN%206TX%2F2FX%20(2989543)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=SMN%206TX%2F2FX%20SM%20(2989556)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=SMN%206TX%2F2POF-PN%20(2700290)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=SMN%208TX%20(2989365)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=SMN%208TX-M%20(2702443)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=SMN%208TX-PN%20(2989501)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-362%20Race%20Condition%20(Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization)&color=brightgreen) ### Description In Phoenix Contact FL SWITCH SMCS series products in multiple versions if an attacker sends a hand-crafted TCP-Packet with the Urgent-Flag set and the Urgent-Pointer set to 0, the network stack will crash. The device needs to be rebooted afterwards. ### POC #### Reference - https://cert.vde.com/en-us/advisories/vde-2021-023 #### Github No PoCs found on GitHub currently.