A vulnerability has been identified in LOGO! 12/24RCE (All versions), LOGO! 12/24RCEo (All versions), LOGO! 230RCE (All versions), LOGO! 230RCEo (All versions), LOGO! 24CE (All versions), LOGO! 24CEo (All versions), LOGO! 24RCE (All versions), LOGO! 24RCEo (All versions), SIPLUS LOGO! 12/24RCE (All versions), SIPLUS LOGO! 12/24RCEo (All versions), SIPLUS LOGO! 230RCE (All versions), SIPLUS LOGO! 230RCEo (All versions), SIPLUS LOGO! 24CE (All versions), SIPLUS LOGO! 24CEo (All versions), SIPLUS LOGO! 24RCE (All versions), SIPLUS LOGO! 24RCEo (All versions). Affected devices do not properly validate the structure of TCP packets in several methods. This could allow an attacker to cause buffer overflows, get control over the instruction counter and run custom code.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-955858.pdf | Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2022-10-11 11:15
Updated : 2023-12-12 12:15
NVD link : CVE-2022-36361
Mitre link : CVE-2022-36361
CVE.ORG link : CVE-2022-36361
JSON object : View
Products Affected
siemens
- logo\!8_bm
- logo\!8_bm_fs-05
- logo\!_8_bm_firmware
- logo\!8_bm_fs-05_firmware
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')