A vulnerability has been identified in LOGO! 12/24RCE (6ED1052-1MD08-0BA1) (All versions), LOGO! 12/24RCEo (6ED1052-2MD08-0BA1) (All versions), LOGO! 230RCE (6ED1052-1FB08-0BA1) (All versions), LOGO! 230RCEo (6ED1052-2FB08-0BA1) (All versions), LOGO! 24CE (6ED1052-1CC08-0BA1) (All versions), LOGO! 24CEo (6ED1052-2CC08-0BA1) (All versions), LOGO! 24RCE (6ED1052-1HB08-0BA1) (All versions), LOGO! 24RCEo (6ED1052-2HB08-0BA1) (All versions), SIPLUS LOGO! 12/24RCE (6AG1052-1MD08-7BA1) (All versions), SIPLUS LOGO! 12/24RCEo (6AG1052-2MD08-7BA1) (All versions), SIPLUS LOGO! 230RCE (6AG1052-1FB08-7BA1) (All versions), SIPLUS LOGO! 230RCEo (6AG1052-2FB08-7BA1) (All versions), SIPLUS LOGO! 24CE (6AG1052-1CC08-7BA1) (All versions), SIPLUS LOGO! 24CEo (6AG1052-2CC08-7BA1) (All versions), SIPLUS LOGO! 24RCE (6AG1052-1HB08-7BA1) (All versions), SIPLUS LOGO! 24RCEo (6AG1052-2HB08-7BA1) (All versions). Affected devices do not properly validate an offset value which can be defined in TCP packets when calling a method. This could allow an attacker to retrieve parts of the content of the memory.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/html/ssa-955858.html | |
https://cert-portal.siemens.com/productcert/pdf/ssa-955858.pdf | Patch Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-955858.pdf | Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2022-10-11 11:15
Updated : 2024-11-21 07:12
NVD link : CVE-2022-36363
Mitre link : CVE-2022-36363
CVE.ORG link : CVE-2022-36363
JSON object : View
Products Affected
siemens
- logo\!8_bm
- logo\!8_bm_fs-05_firmware
- logo\!8_bm_fs-05
- logo\!_8_bm_firmware