Lucene search

K
nvd[email protected]NVD:CVE-2022-34821
HistoryJul 12, 2022 - 10:15 a.m.

CVE-2022-34821

2022-07-1210:15:12
CWE-94
web.nvd.nist.gov
1

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.6 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

12.8%

A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (All versions < V7.2), RUGGEDCOM RM1224 LTE(4G) NAM (All versions < V7.2), SCALANCE M804PB (All versions < V7.2), SCALANCE M812-1 ADSL-Router (Annex A) (All versions < V7.2), SCALANCE M812-1 ADSL-Router (Annex B) (All versions < V7.2), SCALANCE M816-1 ADSL-Router (Annex A) (All versions < V7.2), SCALANCE M816-1 ADSL-Router (Annex B) (All versions < V7.2), SCALANCE M826-2 SHDSL-Router (All versions < V7.2), SCALANCE M874-2 (All versions < V7.2), SCALANCE M874-3 (All versions < V7.2), SCALANCE M876-3 (EVDO) (All versions < V7.2), SCALANCE M876-3 (ROK) (All versions < V7.2), SCALANCE M876-4 (All versions < V7.2), SCALANCE M876-4 (EU) (All versions < V7.2), SCALANCE M876-4 (NAM) (All versions < V7.2), SCALANCE MUM853-1 (EU) (All versions < V7.2), SCALANCE MUM856-1 (EU) (All versions < V7.2), SCALANCE MUM856-1 (RoW) (All versions < V7.2), SCALANCE S615 (All versions < V7.2), SCALANCE S615 EEC (All versions < V7.2), SCALANCE SC622-2C (All versions < V2.3), SCALANCE SC622-2C (All versions >= V2.3 < V3.0), SCALANCE SC626-2C (All versions < V2.3), SCALANCE SC626-2C (All versions >= V2.3 < V3.0), SCALANCE SC632-2C (All versions < V2.3), SCALANCE SC632-2C (All versions >= V2.3 < V3.0), SCALANCE SC636-2C (All versions < V2.3), SCALANCE SC636-2C (All versions >= V2.3 < V3.0), SCALANCE SC642-2C (All versions < V2.3), SCALANCE SC642-2C (All versions >= V2.3 < V3.0), SCALANCE SC646-2C (All versions < V2.3), SCALANCE SC646-2C (All versions >= V2.3 < V3.0), SCALANCE WAM763-1 (All versions), SCALANCE WAM766-1 (EU) (All versions), SCALANCE WAM766-1 (US) (All versions), SCALANCE WAM766-1 EEC (EU) (All versions), SCALANCE WAM766-1 EEC (US) (All versions), SCALANCE WUM763-1 (All versions), SCALANCE WUM763-1 (All versions), SCALANCE WUM766-1 (EU) (All versions), SCALANCE WUM766-1 (US) (All versions), SIMATIC CP 1242-7 V2 (All versions < V3.3.46), SIMATIC CP 1243-1 (All versions < V3.3.46), SIMATIC CP 1243-7 LTE EU (All versions < V3.3.46), SIMATIC CP 1243-7 LTE US (All versions < V3.3.46), SIMATIC CP 1243-8 IRC (All versions < V3.3.46), SIMATIC CP 1542SP-1 IRC (All versions >= V2.0 < V2.2.28), SIMATIC CP 1543-1 (All versions < V3.0.22), SIMATIC CP 1543SP-1 (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1543SP-1 ISEC (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (All versions >= V2.0 < V2.2.28), SIPLUS NET CP 1242-7 V2 (All versions < V3.3.46), SIPLUS NET CP 1543-1 (All versions < V3.0.22), SIPLUS S7-1200 CP 1243-1 (All versions < V3.3.46), SIPLUS S7-1200 CP 1243-1 RAIL (All versions < V3.3.46). By injecting code to specific configuration options for OpenVPN, an attacker could execute arbitrary code with elevated privileges.

Affected configurations

NVD
Node
siemenssimatic_cp_1242-7_v2_firmware
AND
siemenssimatic_cp_1242-7_v2Match-
Node
siemenssimatic_cp_1243-1_firmware
AND
siemenssimatic_cp_1243-1Match-
Node
siemenssimatic_cp_1243-7_lte_eu_firmware
AND
siemenssimatic_cp_1243-7_lte_euMatch-
Node
siemenssimatic_cp_1243-7_lte_us_firmware
AND
siemenssimatic_cp_1243-7_lte_usMatch-
Node
siemenssimatic_cp_1243-8_irc_firmware
AND
siemenssimatic_cp_1243-8_ircMatch-
Node
siemenssimatic_cp_1542sp-1_ircMatch-
AND
siemenssimatic_cp_1542sp-1_irc_firmwareRange2.0
Node
siemenssimatic_cp_1543-1_firmwareRange<3.0.22
AND
siemenssimatic_cp_1543-1Match-
Node
siemenssimatic_cp_1543sp-1_firmwareRange2.0
AND
siemenssimatic_cp_1543sp-1Match-
Node
siemenssiplus_et_200sp_cp_1542sp-1_irc_tx_rail_firmwareRange2.0
AND
siemenssiplus_et_200sp_cp_1542sp-1_irc_tx_railMatch-
Node
siemenssiplus_et_200sp_cp_1543sp-1_isec_firmwareRange2.0
AND
siemenssiplus_et_200sp_cp_1543sp-1_isecMatch-
Node
siemenssiplus_et_200sp_cp_1543sp-1_isec_tx_rail_firmwareRange2.0
AND
siemenssiplus_et_200sp_cp_1543sp-1_isec_tx_railMatch-
Node
siemenssiplus_net_cp_1242-7_v2_firmware
AND
siemenssiplus_net_cp_1242-7_v2Match-
Node
siemenssiplus_net_cp_1543-1_firmwareRange<3.0.22
AND
siemenssiplus_net_cp_1543-1Match-
Node
siemenssiplus_s7-1200_cp_1243-1_firmware
AND
siemenssiplus_s7-1200_cp_1243-1Match-
Node
siemenssiplus_s7-1200_cp_1243-1_rail_firmware
AND
siemenssiplus_s7-1200_cp_1243-1_railMatch-

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.6 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

12.8%

Related for NVD:CVE-2022-34821