A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), SIMOTICS CONNECT 400 (All versions < V1.0.0.0). The total length of an TCP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on the network buffer organization in memory. (FSMD-2021-0017)
2021-11-09T12:15:09.743
2024-11-21T06:06:26.557
Modified
CVSSv3.1: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:N/A:P
10.0
4.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | siemens | capital_vstar | * | Yes |
Application | siemens | nucleus_net | * | Yes |
Application | siemens | nucleus_readystart_v3 | < 2017.02.4 | Yes |
Application | siemens | nucleus_readystart_v4 | < 4.1.1 | Yes |
Application | siemens | nucleus_source_code | * | Yes |
Operating System | siemens | apogee_modular_building_controller_firmware | * | Yes |
Hardware | siemens | apogee_modular_building_controller | - | No |
Operating System | siemens | apogee_modular_equiment_controller_firmware | * | Yes |
Hardware | siemens | apogee_modular_equiment_controller | - | No |
Operating System | siemens | apogee_pxc_compact_firmware | * | Yes |
Hardware | siemens | apogee_pxc_compact | - | No |
Operating System | siemens | apogee_pxc_modular_firmware | * | Yes |
Hardware | siemens | apogee_pxc_modular | - | No |
Operating System | siemens | talon_tc_compact_firmware | * | Yes |
Hardware | siemens | talon_tc_compact | - | No |
Operating System | siemens | talon_tc_modular_firmware | * | Yes |
Hardware | siemens | talon_tc_modular | - | No |