CVE-2021-47894

7.5 HIGH

📋 TL;DR

Managed Switch Port Mapping Tool 2.85.2 contains a buffer overflow vulnerability that allows attackers to crash the application by inputting oversized data into IP Address and SNMP Community Name fields. This creates a denial of service condition affecting users of this specific software version. The vulnerability requires local or network access to the application interface.

💻 Affected Systems

Products:
  • Managed Switch Port Mapping Tool
Versions: 2.85.2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the default configuration when using the IP Address and SNMP Community Name input fields.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application crash requiring manual restart, disrupting network mapping operations and potentially causing service downtime for dependent processes.

🟠

Likely Case

Application becomes unresponsive and crashes, requiring user intervention to restart and losing any unsaved configuration or mapping data.

🟢

If Mitigated

Application remains functional with proper input validation or network segmentation preventing exploitation attempts.

🌐 Internet-Facing: MEDIUM - While the application itself may be internet-facing, exploitation requires specific access to the vulnerable interface fields.
🏢 Internal Only: MEDIUM - Internal attackers with access to the application interface can cause service disruption affecting network management operations.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires access to the application interface to input malicious data into specific fields. Proof of concept code is publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No vendor advisory found

Restart Required: No

Instructions:

No official patch available. Check vendor website for updates: https://switchportmapper.com/

🔧 Temporary Workarounds

Input Validation Enforcement

all

Implement strict input validation to limit field lengths to reasonable values

Network Segmentation

all

Restrict network access to the application to trusted users only

🧯 If You Can't Patch

  • Monitor application logs for crash events or unusual input patterns
  • Implement application whitelisting to prevent unauthorized modifications

🔍 How to Verify

Check if Vulnerable:

Test by inputting 10,000+ characters into IP Address or SNMP Community Name fields and observe if application crashes

Check Version:

Check Help > About in application interface

Verify Fix Applied:

Verify updated version no longer crashes with oversized input

📡 Detection & Monitoring

Log Indicators:

  • Application crash events
  • Unusually long input strings in application logs

Network Indicators:

  • Sudden cessation of application network traffic

SIEM Query:

EventID: 1000 OR EventID: 1001 AND Source: 'Managed Switch Port Mapping Tool'

🔗 References

📤 Share & Export