CVE-2022-34821
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (All versions < V7.2), RUGGEDCOM RM1224 LTE(4G) NAM (All versions < V7.2), SCALANCE M804PB (All versions < V7.2), SCALANCE M812-1 ADSL-Router (Annex A) (All versions < V7.2), SCALANCE M812-1 ADSL-Router (Annex B) (All versions < V7.2), SCALANCE M816-1 ADSL-Router (Annex A) (All versions < V7.2), SCALANCE M816-1 ADSL-Router (Annex B) (All versions < V7.2), SCALANCE M826-2 SHDSL-Router (All versions < V7.2), SCALANCE M874-2 (All versions < V7.2), SCALANCE M874-3 (All versions < V7.2), SCALANCE M876-3 (EVDO) (All versions < V7.2), SCALANCE M876-3 (ROK) (All versions < V7.2), SCALANCE M876-4 (All versions < V7.2), SCALANCE M876-4 (EU) (All versions < V7.2), SCALANCE M876-4 (NAM) (All versions < V7.2), SCALANCE MUM853-1 (EU) (All versions < V7.2), SCALANCE MUM856-1 (EU) (All versions < V7.2), SCALANCE MUM856-1 (RoW) (All versions < V7.2), SCALANCE S615 (All versions < V7.2), SCALANCE S615 EEC (All versions < V7.2), SCALANCE SC622-2C (All versions < V2.3), SCALANCE SC622-2C (All versions >= V2.3 < V3.0), SCALANCE SC626-2C (All versions < V2.3), SCALANCE SC626-2C (All versions >= V2.3 < V3.0), SCALANCE SC632-2C (All versions < V2.3), SCALANCE SC632-2C (All versions >= V2.3 < V3.0), SCALANCE SC636-2C (All versions < V2.3), SCALANCE SC636-2C (All versions >= V2.3 < V3.0), SCALANCE SC642-2C (All versions < V2.3), SCALANCE SC642-2C (All versions >= V2.3 < V3.0), SCALANCE SC646-2C (All versions < V2.3), SCALANCE SC646-2C (All versions >= V2.3 < V3.0), SCALANCE WAM763-1 (All versions), SCALANCE WAM766-1 (EU) (All versions), SCALANCE WAM766-1 (US) (All versions), SCALANCE WAM766-1 EEC (EU) (All versions), SCALANCE WAM766-1 EEC (US) (All versions), SCALANCE WUM763-1 (All versions), SCALANCE WUM763-1 (All versions), SCALANCE WUM766-1 (EU) (All versions), SCALANCE WUM766-1 (US) (All versions), SIMATIC CP 1242-7 V2 (All versions < V3.3.46), SIMATIC CP 1243-1 (All versions < V3.3.46), SIMATIC CP 1243-7 LTE EU (All versions < V3.3.46), SIMATIC CP 1243-7 LTE US (All versions < V3.3.46), SIMATIC CP 1243-8 IRC (All versions < V3.3.46), SIMATIC CP 1542SP-1 IRC (All versions >= V2.0 < V2.2.28), SIMATIC CP 1543-1 (All versions < V3.0.22), SIMATIC CP 1543SP-1 (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1543SP-1 ISEC (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (All versions >= V2.0 < V2.2.28), SIPLUS NET CP 1242-7 V2 (All versions < V3.3.46), SIPLUS NET CP 1543-1 (All versions < V3.0.22), SIPLUS S7-1200 CP 1243-1 (All versions < V3.3.46), SIPLUS S7-1200 CP 1243-1 RAIL (All versions < V3.3.46). By injecting code to specific configuration options for OpenVPN, an attacker could execute arbitrary code with elevated privileges.
Se ha identificado una vulnerabilidad en SIMATIC CP 1242-7 V2 (Todas las versiones anteriores a V3.3.46), SIMATIC CP 1243-1 (Todas las versiones anteriores a V3.3.46), SIMATIC CP 1243-7 LTE EU (Todas las versiones anteriores a V3.3.46), SIMATIC CP 1243-7 LTE US (Todas las versiones anteriores a V3. 3.46), SIMATIC CP 1243-8 IRC (Todas las versiones anteriores a V3.3.46), SIMATIC CP 1542SP-1 IRC (Todas las versiones posteriores o iguales a V2.0), SIMATIC CP 1543-1 (Todas las versiones anteriores a V3.0.22), SIMATIC CP 1543SP-1 (Todas las versiones posteriores o iguales a V2. 0), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (Todas las versiones posteriores o iguales a V2.0), SIPLUS ET 200SP CP 1543SP-1 ISEC (Todas las versiones posteriores o iguales a V2.0), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (Todas las versiones posteriores o iguales a V2. 0), SIPLUS NET CP 1242-7 V2 (Todas las versiones anteriores a V3.3.46), SIPLUS NET CP 1543-1 (Todas las versiones anteriores a V3.0.22), SIPLUS S7-1200 CP 1243-1 (Todas las versiones anteriores a V3.3.46), SIPLUS S7-1200 CP 1243-1 RAIL (Todas las versiones anteriores a V3.3.46). Al inyectar código a opciones de configuración específicas para OpenVPN, un atacante podría ejecutar código arbitrario con privilegios elevados
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2), SCALANCE M804PB (6GK5804-0AP00-2AA2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2), SCALANCE M874-2 (6GK5874-2AA00-2AA2), SCALANCE M874-3 (6GK5874-3AA00-2AA2), SCALANCE M876-3 (6GK5876-3AA02-2BA2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2), SCALANCE M876-4 (6GK5876-4AA10-2BA2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2), SCALANCE SC622-2C (6GK5622-2GS00-2AC2), SCALANCE SC622-2C (6GK5622-2GS00-2AC2), SCALANCE SC626-2C (6GK5626-2GS00-2AC2), SCALANCE SC626-2C (6GK5626-2GS00-2AC2), SCALANCE SC632-2C (6GK5632-2GS00-2AC2), SCALANCE SC632-2C (6GK5632-2GS00-2AC2), SCALANCE SC636-2C (6GK5636-2GS00-2AC2), SCALANCE SC636-2C (6GK5636-2GS00-2AC2), SCALANCE SC642-2C (6GK5642-2GS00-2AC2), SCALANCE SC642-2C (6GK5642-2GS00-2AC2), SCALANCE SC646-2C (6GK5646-2GS00-2AC2), SCALANCE SC646-2C (6GK5646-2GS00-2AC2), SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0), SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0), SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0), SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0), SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0), SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0), SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0), SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0), SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0), SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0), SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0), SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0), SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0), SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0), SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0). By injecting code to specific configuration options for OpenVPN, an attacker could execute arbitrary code with elevated privileges.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-06-29 CVE Reserved
- 2022-07-12 CVE Published
- 2025-01-14 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (4)
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-517377.pdf | 2023-10-10 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Siemens Search vendor "Siemens" | Simatic Cp 1242-7 V2 Firmware Search vendor "Siemens" for product "Simatic Cp 1242-7 V2 Firmware" | * | - |
Affected
| in | Siemens Search vendor "Siemens" | Simatic Cp 1242-7 V2 Search vendor "Siemens" for product "Simatic Cp 1242-7 V2" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Simatic Cp 1243-1 Firmware Search vendor "Siemens" for product "Simatic Cp 1243-1 Firmware" | * | - |
Affected
| in | Siemens Search vendor "Siemens" | Simatic Cp 1243-1 Search vendor "Siemens" for product "Simatic Cp 1243-1" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Simatic Cp 1243-7 Lte Eu Firmware Search vendor "Siemens" for product "Simatic Cp 1243-7 Lte Eu Firmware" | * | - |
Affected
| in | Siemens Search vendor "Siemens" | Simatic Cp 1243-7 Lte Eu Search vendor "Siemens" for product "Simatic Cp 1243-7 Lte Eu" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Simatic Cp 1243-7 Lte Us Firmware Search vendor "Siemens" for product "Simatic Cp 1243-7 Lte Us Firmware" | * | - |
Affected
| in | Siemens Search vendor "Siemens" | Simatic Cp 1243-7 Lte Us Search vendor "Siemens" for product "Simatic Cp 1243-7 Lte Us" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Simatic Cp 1243-8 Irc Firmware Search vendor "Siemens" for product "Simatic Cp 1243-8 Irc Firmware" | * | - |
Affected
| in | Siemens Search vendor "Siemens" | Simatic Cp 1243-8 Irc Search vendor "Siemens" for product "Simatic Cp 1243-8 Irc" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Simatic Cp 1542sp-1 Irc Firmware Search vendor "Siemens" for product "Simatic Cp 1542sp-1 Irc Firmware" | >= 2.0 Search vendor "Siemens" for product "Simatic Cp 1542sp-1 Irc Firmware" and version " >= 2.0" | - |
Affected
| in | Siemens Search vendor "Siemens" | Simatic Cp 1542sp-1 Irc Search vendor "Siemens" for product "Simatic Cp 1542sp-1 Irc" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Simatic Cp 1543-1 Firmware Search vendor "Siemens" for product "Simatic Cp 1543-1 Firmware" | < 3.0.22 Search vendor "Siemens" for product "Simatic Cp 1543-1 Firmware" and version " < 3.0.22" | - |
Affected
| in | Siemens Search vendor "Siemens" | Simatic Cp 1543-1 Search vendor "Siemens" for product "Simatic Cp 1543-1" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Simatic Cp 1543sp-1 Firmware Search vendor "Siemens" for product "Simatic Cp 1543sp-1 Firmware" | >= 2.0 Search vendor "Siemens" for product "Simatic Cp 1543sp-1 Firmware" and version " >= 2.0" | - |
Affected
| in | Siemens Search vendor "Siemens" | Simatic Cp 1543sp-1 Search vendor "Siemens" for product "Simatic Cp 1543sp-1" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Siplus Et 200sp Cp 1542sp-1 Irc Tx Rail Firmware Search vendor "Siemens" for product "Siplus Et 200sp Cp 1542sp-1 Irc Tx Rail Firmware" | >= 2.0 Search vendor "Siemens" for product "Siplus Et 200sp Cp 1542sp-1 Irc Tx Rail Firmware" and version " >= 2.0" | - |
Affected
| in | Siemens Search vendor "Siemens" | Siplus Et 200sp Cp 1542sp-1 Irc Tx Rail Search vendor "Siemens" for product "Siplus Et 200sp Cp 1542sp-1 Irc Tx Rail" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Siplus Et 200sp Cp 1543sp-1 Isec Firmware Search vendor "Siemens" for product "Siplus Et 200sp Cp 1543sp-1 Isec Firmware" | >= 2.0 Search vendor "Siemens" for product "Siplus Et 200sp Cp 1543sp-1 Isec Firmware" and version " >= 2.0" | - |
Affected
| in | Siemens Search vendor "Siemens" | Siplus Et 200sp Cp 1543sp-1 Isec Search vendor "Siemens" for product "Siplus Et 200sp Cp 1543sp-1 Isec" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Siplus Et 200sp Cp 1543sp-1 Isec Tx Rail Firmware Search vendor "Siemens" for product "Siplus Et 200sp Cp 1543sp-1 Isec Tx Rail Firmware" | >= 2.0 Search vendor "Siemens" for product "Siplus Et 200sp Cp 1543sp-1 Isec Tx Rail Firmware" and version " >= 2.0" | - |
Affected
| in | Siemens Search vendor "Siemens" | Siplus Et 200sp Cp 1543sp-1 Isec Tx Rail Search vendor "Siemens" for product "Siplus Et 200sp Cp 1543sp-1 Isec Tx Rail" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Siplus Net Cp 1242-7 V2 Firmware Search vendor "Siemens" for product "Siplus Net Cp 1242-7 V2 Firmware" | * | - |
Affected
| in | Siemens Search vendor "Siemens" | Siplus Net Cp 1242-7 V2 Search vendor "Siemens" for product "Siplus Net Cp 1242-7 V2" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Siplus Net Cp 1543-1 Firmware Search vendor "Siemens" for product "Siplus Net Cp 1543-1 Firmware" | < 3.0.22 Search vendor "Siemens" for product "Siplus Net Cp 1543-1 Firmware" and version " < 3.0.22" | - |
Affected
| in | Siemens Search vendor "Siemens" | Siplus Net Cp 1543-1 Search vendor "Siemens" for product "Siplus Net Cp 1543-1" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Siplus S7-1200 Cp 1243-1 Firmware Search vendor "Siemens" for product "Siplus S7-1200 Cp 1243-1 Firmware" | * | - |
Affected
| in | Siemens Search vendor "Siemens" | Siplus S7-1200 Cp 1243-1 Search vendor "Siemens" for product "Siplus S7-1200 Cp 1243-1" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Siplus S7-1200 Cp 1243-1 Rail Firmware Search vendor "Siemens" for product "Siplus S7-1200 Cp 1243-1 Rail Firmware" | * | - |
Affected
| in | Siemens Search vendor "Siemens" | Siplus S7-1200 Cp 1243-1 Rail Search vendor "Siemens" for product "Siplus S7-1200 Cp 1243-1 Rail" | - | - |
Safe
|