5.7
CVE-2022-27481
- EPSS 0.2%
- Published 12.04.2022 09:15:15
- Last modified 21.11.2024 06:55:48
- Source productcert@siemens.com
- Teams watchlist Login
- Open Login
A vulnerability has been identified in SCALANCE W1788-1 M12 (All versions < V3.0.0), SCALANCE W1788-2 EEC M12 (All versions < V3.0.0), SCALANCE W1788-2 M12 (All versions < V3.0.0), SCALANCE W1788-2IA M12 (All versions < V3.0.0). Affected devices do not properly handle resources of ARP requests. This could allow an attacker to cause a race condition that leads to a crash of the entire device.
Data is provided by the National Vulnerability Database (NVD)
Siemens ≫ Scalance W1788-2ia M12 Firmware Version < 3.0.0
Siemens ≫ Scalance W1788-2 M12 Firmware Version < 3.0.0
Siemens ≫ Scalance W1788-2 Eec M12 Firmware Version < 3.0.0
Siemens ≫ Scalance W1788-1 M12 Firmware Version < 3.0.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.2% | 0.42 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5.3 | 1.6 | 3.6 |
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
|
nvd@nist.gov | 5.7 | 5.5 | 6.9 |
AV:A/AC:M/Au:N/C:N/I:N/A:C
|
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.