8.6

CVE-2022-31766

A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V7.1.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V7.1.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V7.1.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V7.1.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V7.1.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V7.1.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V7.1.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V7.1.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V7.1.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V7.1.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V7.1.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V7.1.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V7.1.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V7.1.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V7.1.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V7.1.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V7.1.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V7.1.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V7.1.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V7.1.2), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions >= V1.1.0 < V3.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (All versions >= V1.1.0 < V3.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions >= V1.1.0 < V3.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (All versions >= V1.1.0 < V3.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions >= V1.1.0 < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions >= V1.1.0 < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions >= V1.1.0 < V3.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (All versions >= V1.1.0 < V3.0.0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) (All versions >= V1.1.0 < V3.0.0). Affected devices with TCP Event service enabled do not properly handle malformed packets.
This could allow an unauthenticated remote attacker to cause a denial of service condition and reboot the device thus possibly affecting other network resources.

Data is provided by the National Vulnerability Database (NVD)
SiemensRuggedcom Rm1224 Firmware Version < 7.1.2
   SiemensRuggedcom Rm1224 Version-
SiemensScalance M804pb Firmware Version < 7.1.2
   SiemensScalance M804pb Version-
SiemensScalance M812-1 Firmware Version < 7.1.2
   SiemensScalance M812-1 Version-
SiemensScalance M816-1 Firmware Version < 7.1.2
   SiemensScalance M816-1 Version-
SiemensScalance M826-2 Firmware Version < 7.1.2
   SiemensScalance M826-2 Version-
SiemensScalance M874-2 Firmware Version < 7.1.2
   SiemensScalance M874-2 Version-
SiemensScalance M874-3 Firmware Version < 7.1.2
   SiemensScalance M874-3 Version-
SiemensScalance M876-3 Firmware Version < 7.1.2
   SiemensScalance M876-3 Version-
SiemensScalance M876-4 Firmware Version < 7.1.2
   SiemensScalance M876-4 Version-
SiemensScalance Mum853-1 Firmware Version < 7.1.2
   SiemensScalance Mum853-1 Version-
SiemensScalance Mum856-1 Firmware Version < 7.1.2
   SiemensScalance Mum856-1 Version-
SiemensScalance S615 Firmware Version < 7.1.2
   SiemensScalance S615 Version-
SiemensScalance Wam763-1 Firmware Version >= 1.1.0
   SiemensScalance Wam763-1 Version-
SiemensScalance Wam766-1 Firmware Version >= 1.1.0
   SiemensScalance Wam766-1 Version-
SiemensScalance Wum763-1 Firmware Version >= 1.1.0
   SiemensScalance Wum763-1 Version-
SiemensScalance Wum766-1 Firmware Version >= 1.1.0
   SiemensScalance Wum766-1 Version-
SiemensScalance Wam766-1 Firmware HwPlatformecc Version >= 1.1.0
   SiemensScalance Wam766-1 Version- HwPlatformecc
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.33% 0.555
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.6 3.9 4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
productcert@siemens.com 8.6 3.9 4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.