TCP Payload Length Vulnerability in Capital Embedded AR Classic and SIMOTICS Products
CVE-2021-31890

7.5HIGH

Key Information:

Summary

A vulnerability has been discovered in various Siemens products, including Capital Embedded AR Classic and SIMOTICS CONNECT 400, where the total length of a TCP payload is not properly checked. This oversight can result in severe side effects, such as information leaks or denial-of-service conditions, which may compromise system integrity depending on how the network buffer is structured in memory. Organizations utilizing these systems should be aware of this vulnerability and take necessary precautions to mitigate potential risks.

Affected Version(s)

Capital Embedded AR Classic 431-422 0

Capital Embedded AR Classic R20-11 0

PLUSCONTROL 1st Gen All versions

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.