PatchSiren cyber security CVE debrief
CVE-2021-21707 Festo Didactic SE CVE debrief
CVE-2021-21707 describes a PHP filename-handling flaw in certain XML parsing functions, including simplexml_load_file(). When a filename is URL-decoded and contains a URL-encoded NUL byte, PHP may treat the NUL as the end of the filename and open a different file than the caller intended. In the Festo Didactic SE MES PC advisory context, the vendor directs operators to a replacement Factory Control Panel release for affected MES PCs.
- Vendor
- Festo Didactic SE
- Product
- MES PC
- CVSS
- MEDIUM 5.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2024-02-27
- Original CVE updated
- 2026-01-27
- Advisory published
- 2024-02-27
- Advisory updated
- 2026-01-27
Who should care
Festo Didactic MES PC operators, OT/ICS defenders, and administrators running PHP 7.3.x below 7.3.33, 7.4.x below 7.4.26, or 8.0.x below 8.0.13 in any workflow that passes filenames into XML parsing functions.
Technical summary
The supplied advisory data says certain PHP XML parsing functions URL-decode the filename parameter before use. If an attacker can supply a URL-encoded NUL character, the effective path may be truncated at the NUL and a different file may be read. The advisory maps the issue to CWE-159 and gives a CVSS 3.1 vector of AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N.
Defensive priority
Medium. Prioritize patching or replacement where the affected PHP runtime is present on exposed or user-influenced systems, especially MES PC deployments that process filenames through XML parsers.
Recommended defensive actions
- Obtain and deploy Festo's current Factory Control Panel replacement for MES PCs, as directed in the advisory, through Festo technical support.
- Ensure any affected PHP deployment is updated to at least 7.3.33, 7.4.26, or 8.0.13, depending on the installed branch.
- Audit code and integrations that call XML parsing functions such as simplexml_load_file() so untrusted input cannot influence filenames.
- Reject URL-encoded NUL bytes and other unexpected encodings before any filename is passed to the parser.
- Reduce exposure of any service that processes external input into file paths until remediation is complete.
Evidence notes
The CISA CSAF source item for ICSA-26-027-02 and its references state the affected PHP versions, describe the URL-decoded NUL filename issue, and provide the vendor remediation path for Festo MES PC. The advisory metadata also supplies the CVSS vector and score. The supplied data shows no KEV listing.
Official resources
-
CVE-2021-21707 CVE record
CVE.org
-
CVE-2021-21707 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
The supplied timeline shows public publication on 2024-02-27 and a later CISA republication/metadata update on 2026-01-27. No KEV date is listed in the supplied data.