Vulnerabilities > CVE-2021-31889 - Unspecified vulnerability in Siemens products
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
NONE Availability impact
HIGH Summary
A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions < V0.5.0.0). Malformed TCP packets with a corrupted SACK option leads to Information Leaks and Denial-of-Service conditions. (FSMD-2021-0015)
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 4 | |
OS | 6 | |
Hardware | 6 |
References
- https://cert-portal.siemens.com/productcert/html/ssa-044112.html
- https://cert-portal.siemens.com/productcert/html/ssa-114589.html
- https://cert-portal.siemens.com/productcert/html/ssa-223353.html
- https://cert-portal.siemens.com/productcert/html/ssa-620288.html
- https://cert-portal.siemens.com/productcert/html/ssa-845392.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-223353.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-223353.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf