// For flags

CVE-2022-34821

 

Severity Score

7.6
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (All versions < V7.2), RUGGEDCOM RM1224 LTE(4G) NAM (All versions < V7.2), SCALANCE M804PB (All versions < V7.2), SCALANCE M812-1 ADSL-Router (Annex A) (All versions < V7.2), SCALANCE M812-1 ADSL-Router (Annex B) (All versions < V7.2), SCALANCE M816-1 ADSL-Router (Annex A) (All versions < V7.2), SCALANCE M816-1 ADSL-Router (Annex B) (All versions < V7.2), SCALANCE M826-2 SHDSL-Router (All versions < V7.2), SCALANCE M874-2 (All versions < V7.2), SCALANCE M874-3 (All versions < V7.2), SCALANCE M876-3 (EVDO) (All versions < V7.2), SCALANCE M876-3 (ROK) (All versions < V7.2), SCALANCE M876-4 (All versions < V7.2), SCALANCE M876-4 (EU) (All versions < V7.2), SCALANCE M876-4 (NAM) (All versions < V7.2), SCALANCE MUM853-1 (EU) (All versions < V7.2), SCALANCE MUM856-1 (EU) (All versions < V7.2), SCALANCE MUM856-1 (RoW) (All versions < V7.2), SCALANCE S615 (All versions < V7.2), SCALANCE S615 EEC (All versions < V7.2), SCALANCE SC622-2C (All versions < V2.3), SCALANCE SC622-2C (All versions >= V2.3 < V3.0), SCALANCE SC626-2C (All versions < V2.3), SCALANCE SC626-2C (All versions >= V2.3 < V3.0), SCALANCE SC632-2C (All versions < V2.3), SCALANCE SC632-2C (All versions >= V2.3 < V3.0), SCALANCE SC636-2C (All versions < V2.3), SCALANCE SC636-2C (All versions >= V2.3 < V3.0), SCALANCE SC642-2C (All versions < V2.3), SCALANCE SC642-2C (All versions >= V2.3 < V3.0), SCALANCE SC646-2C (All versions < V2.3), SCALANCE SC646-2C (All versions >= V2.3 < V3.0), SCALANCE WAM763-1 (All versions), SCALANCE WAM766-1 (EU) (All versions), SCALANCE WAM766-1 (US) (All versions), SCALANCE WAM766-1 EEC (EU) (All versions), SCALANCE WAM766-1 EEC (US) (All versions), SCALANCE WUM763-1 (All versions), SCALANCE WUM763-1 (All versions), SCALANCE WUM766-1 (EU) (All versions), SCALANCE WUM766-1 (US) (All versions), SIMATIC CP 1242-7 V2 (All versions < V3.3.46), SIMATIC CP 1243-1 (All versions < V3.3.46), SIMATIC CP 1243-7 LTE EU (All versions < V3.3.46), SIMATIC CP 1243-7 LTE US (All versions < V3.3.46), SIMATIC CP 1243-8 IRC (All versions < V3.3.46), SIMATIC CP 1542SP-1 IRC (All versions >= V2.0 < V2.2.28), SIMATIC CP 1543-1 (All versions < V3.0.22), SIMATIC CP 1543SP-1 (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1543SP-1 ISEC (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (All versions >= V2.0 < V2.2.28), SIPLUS NET CP 1242-7 V2 (All versions < V3.3.46), SIPLUS NET CP 1543-1 (All versions < V3.0.22), SIPLUS S7-1200 CP 1243-1 (All versions < V3.3.46), SIPLUS S7-1200 CP 1243-1 RAIL (All versions < V3.3.46). By injecting code to specific configuration options for OpenVPN, an attacker could execute arbitrary code with elevated privileges.

Se ha identificado una vulnerabilidad en SIMATIC CP 1242-7 V2 (Todas las versiones anteriores a V3.3.46), SIMATIC CP 1243-1 (Todas las versiones anteriores a V3.3.46), SIMATIC CP 1243-7 LTE EU (Todas las versiones anteriores a V3.3.46), SIMATIC CP 1243-7 LTE US (Todas las versiones anteriores a V3. 3.46), SIMATIC CP 1243-8 IRC (Todas las versiones anteriores a V3.3.46), SIMATIC CP 1542SP-1 IRC (Todas las versiones posteriores o iguales a V2.0), SIMATIC CP 1543-1 (Todas las versiones anteriores a V3.0.22), SIMATIC CP 1543SP-1 (Todas las versiones posteriores o iguales a V2. 0), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (Todas las versiones posteriores o iguales a V2.0), SIPLUS ET 200SP CP 1543SP-1 ISEC (Todas las versiones posteriores o iguales a V2.0), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (Todas las versiones posteriores o iguales a V2. 0), SIPLUS NET CP 1242-7 V2 (Todas las versiones anteriores a V3.3.46), SIPLUS NET CP 1543-1 (Todas las versiones anteriores a V3.0.22), SIPLUS S7-1200 CP 1243-1 (Todas las versiones anteriores a V3.3.46), SIPLUS S7-1200 CP 1243-1 RAIL (Todas las versiones anteriores a V3.3.46). Al inyectar código a opciones de configuración específicas para OpenVPN, un atacante podría ejecutar código arbitrario con privilegios elevados

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-06-29 CVE Reserved
  • 2022-07-12 CVE Published
  • 2024-02-02 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Siemens
Search vendor "Siemens"
Simatic Cp 1242-7 V2 Firmware
Search vendor "Siemens" for product "Simatic Cp 1242-7 V2 Firmware"
*-
Affected
in Siemens
Search vendor "Siemens"
Simatic Cp 1242-7 V2
Search vendor "Siemens" for product "Simatic Cp 1242-7 V2"
--
Safe
Siemens
Search vendor "Siemens"
Simatic Cp 1243-1 Firmware
Search vendor "Siemens" for product "Simatic Cp 1243-1 Firmware"
*-
Affected
in Siemens
Search vendor "Siemens"
Simatic Cp 1243-1
Search vendor "Siemens" for product "Simatic Cp 1243-1"
--
Safe
Siemens
Search vendor "Siemens"
Simatic Cp 1243-7 Lte Eu Firmware
Search vendor "Siemens" for product "Simatic Cp 1243-7 Lte Eu Firmware"
*-
Affected
in Siemens
Search vendor "Siemens"
Simatic Cp 1243-7 Lte Eu
Search vendor "Siemens" for product "Simatic Cp 1243-7 Lte Eu"
--
Safe
Siemens
Search vendor "Siemens"
Simatic Cp 1243-7 Lte Us Firmware
Search vendor "Siemens" for product "Simatic Cp 1243-7 Lte Us Firmware"
*-
Affected
in Siemens
Search vendor "Siemens"
Simatic Cp 1243-7 Lte Us
Search vendor "Siemens" for product "Simatic Cp 1243-7 Lte Us"
--
Safe
Siemens
Search vendor "Siemens"
Simatic Cp 1243-8 Irc Firmware
Search vendor "Siemens" for product "Simatic Cp 1243-8 Irc Firmware"
*-
Affected
in Siemens
Search vendor "Siemens"
Simatic Cp 1243-8 Irc
Search vendor "Siemens" for product "Simatic Cp 1243-8 Irc"
--
Safe
Siemens
Search vendor "Siemens"
Simatic Cp 1542sp-1 Irc Firmware
Search vendor "Siemens" for product "Simatic Cp 1542sp-1 Irc Firmware"
>= 2.0
Search vendor "Siemens" for product "Simatic Cp 1542sp-1 Irc Firmware" and version " >= 2.0"
-
Affected
in Siemens
Search vendor "Siemens"
Simatic Cp 1542sp-1 Irc
Search vendor "Siemens" for product "Simatic Cp 1542sp-1 Irc"
--
Safe
Siemens
Search vendor "Siemens"
Simatic Cp 1543-1 Firmware
Search vendor "Siemens" for product "Simatic Cp 1543-1 Firmware"
< 3.0.22
Search vendor "Siemens" for product "Simatic Cp 1543-1 Firmware" and version " < 3.0.22"
-
Affected
in Siemens
Search vendor "Siemens"
Simatic Cp 1543-1
Search vendor "Siemens" for product "Simatic Cp 1543-1"
--
Safe
Siemens
Search vendor "Siemens"
Simatic Cp 1543sp-1 Firmware
Search vendor "Siemens" for product "Simatic Cp 1543sp-1 Firmware"
>= 2.0
Search vendor "Siemens" for product "Simatic Cp 1543sp-1 Firmware" and version " >= 2.0"
-
Affected
in Siemens
Search vendor "Siemens"
Simatic Cp 1543sp-1
Search vendor "Siemens" for product "Simatic Cp 1543sp-1"
--
Safe
Siemens
Search vendor "Siemens"
Siplus Et 200sp Cp 1542sp-1 Irc Tx Rail Firmware
Search vendor "Siemens" for product "Siplus Et 200sp Cp 1542sp-1 Irc Tx Rail Firmware"
>= 2.0
Search vendor "Siemens" for product "Siplus Et 200sp Cp 1542sp-1 Irc Tx Rail Firmware" and version " >= 2.0"
-
Affected
in Siemens
Search vendor "Siemens"
Siplus Et 200sp Cp 1542sp-1 Irc Tx Rail
Search vendor "Siemens" for product "Siplus Et 200sp Cp 1542sp-1 Irc Tx Rail"
--
Safe
Siemens
Search vendor "Siemens"
Siplus Et 200sp Cp 1543sp-1 Isec Firmware
Search vendor "Siemens" for product "Siplus Et 200sp Cp 1543sp-1 Isec Firmware"
>= 2.0
Search vendor "Siemens" for product "Siplus Et 200sp Cp 1543sp-1 Isec Firmware" and version " >= 2.0"
-
Affected
in Siemens
Search vendor "Siemens"
Siplus Et 200sp Cp 1543sp-1 Isec
Search vendor "Siemens" for product "Siplus Et 200sp Cp 1543sp-1 Isec"
--
Safe
Siemens
Search vendor "Siemens"
Siplus Et 200sp Cp 1543sp-1 Isec Tx Rail Firmware
Search vendor "Siemens" for product "Siplus Et 200sp Cp 1543sp-1 Isec Tx Rail Firmware"
>= 2.0
Search vendor "Siemens" for product "Siplus Et 200sp Cp 1543sp-1 Isec Tx Rail Firmware" and version " >= 2.0"
-
Affected
in Siemens
Search vendor "Siemens"
Siplus Et 200sp Cp 1543sp-1 Isec Tx Rail
Search vendor "Siemens" for product "Siplus Et 200sp Cp 1543sp-1 Isec Tx Rail"
--
Safe
Siemens
Search vendor "Siemens"
Siplus Net Cp 1242-7 V2 Firmware
Search vendor "Siemens" for product "Siplus Net Cp 1242-7 V2 Firmware"
*-
Affected
in Siemens
Search vendor "Siemens"
Siplus Net Cp 1242-7 V2
Search vendor "Siemens" for product "Siplus Net Cp 1242-7 V2"
--
Safe
Siemens
Search vendor "Siemens"
Siplus Net Cp 1543-1 Firmware
Search vendor "Siemens" for product "Siplus Net Cp 1543-1 Firmware"
< 3.0.22
Search vendor "Siemens" for product "Siplus Net Cp 1543-1 Firmware" and version " < 3.0.22"
-
Affected
in Siemens
Search vendor "Siemens"
Siplus Net Cp 1543-1
Search vendor "Siemens" for product "Siplus Net Cp 1543-1"
--
Safe
Siemens
Search vendor "Siemens"
Siplus S7-1200 Cp 1243-1 Firmware
Search vendor "Siemens" for product "Siplus S7-1200 Cp 1243-1 Firmware"
*-
Affected
in Siemens
Search vendor "Siemens"
Siplus S7-1200 Cp 1243-1
Search vendor "Siemens" for product "Siplus S7-1200 Cp 1243-1"
--
Safe
Siemens
Search vendor "Siemens"
Siplus S7-1200 Cp 1243-1 Rail Firmware
Search vendor "Siemens" for product "Siplus S7-1200 Cp 1243-1 Rail Firmware"
*-
Affected
in Siemens
Search vendor "Siemens"
Siplus S7-1200 Cp 1243-1 Rail
Search vendor "Siemens" for product "Siplus S7-1200 Cp 1243-1 Rail"
--
Safe