Description
A vulnerability has been identified in SIMATIC CP 1242-7 V2 (All versions < V3.3.46), SIMATIC CP 1243-1 (All versions < V3.3.46), SIMATIC CP 1243-7 LTE EU (All versions < V3.3.46), SIMATIC CP 1243-7 LTE US (All versions < V3.3.46), SIMATIC CP 1243-8 IRC (All versions < V3.3.46), SIMATIC CP 1542SP-1 IRC (All versions >= V2.0 < V2.2.28), SIMATIC CP 1543-1 (All versions < V3.0.22), SIMATIC CP 1543SP-1 (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1543SP-1 ISEC (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (All versions >= V2.0 < V2.2.28), SIPLUS NET CP 1242-7 V2 (All versions < V3.3.46), SIPLUS NET CP 1543-1 (All versions < V3.0.22), SIPLUS S7-1200 CP 1243-1 (All versions < V3.3.46), SIPLUS S7-1200 CP 1243-1 RAIL (All versions < V3.3.46). The application lacks proper validation of user-supplied data when parsing specific messages. This could result in a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of device.
Published: 2022-07-12
Score: 10 Critical
EPSS: 1.5% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-37725 A vulnerability has been identified in SIMATIC CP 1242-7 V2 (All versions < V3.3.46), SIMATIC CP 1243-1 (All versions < V3.3.46), SIMATIC CP 1243-7 LTE EU (All versions < V3.3.46), SIMATIC CP 1243-7 LTE US (All versions < V3.3.46), SIMATIC CP 1243-8 IRC (All versions < V3.3.46), SIMATIC CP 1542SP-1 IRC (All versions >= V2.0 < V2.2.28), SIMATIC CP 1543-1 (All versions < V3.0.22), SIMATIC CP 1543SP-1 (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1543SP-1 ISEC (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (All versions >= V2.0 < V2.2.28), SIPLUS NET CP 1242-7 V2 (All versions < V3.3.46), SIPLUS NET CP 1543-1 (All versions < V3.0.22), SIPLUS S7-1200 CP 1243-1 (All versions < V3.3.46), SIPLUS S7-1200 CP 1243-1 RAIL (All versions < V3.3.46). The application lacks proper validation of user-supplied data when parsing specific messages. This could result in a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of device.
History

Mon, 21 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Siemens Simatic Cp 1242-7 V2 Simatic Cp 1242-7 V2 Firmware Simatic Cp 1243-1 Simatic Cp 1243-1 Firmware Simatic Cp 1243-7 Lte Eu Simatic Cp 1243-7 Lte Eu Firmware Simatic Cp 1243-7 Lte Us Simatic Cp 1243-7 Lte Us Firmware Simatic Cp 1243-8 Irc Simatic Cp 1243-8 Irc Firmware Simatic Cp 1542sp-1 Irc Simatic Cp 1542sp-1 Irc Firmware Simatic Cp 1543-1 Simatic Cp 1543-1 Firmware Simatic Cp 1543sp-1 Simatic Cp 1543sp-1 Firmware Siplus Et 200sp Cp 1542sp-1 Irc Tx Rail Siplus Et 200sp Cp 1542sp-1 Irc Tx Rail Firmware Siplus Et 200sp Cp 1543sp-1 Isec Siplus Et 200sp Cp 1543sp-1 Isec Firmware Siplus Et 200sp Cp 1543sp-1 Isec Tx Rail Siplus Et 200sp Cp 1543sp-1 Isec Tx Rail Firmware Siplus Net Cp 1242-7 V2 Siplus Net Cp 1242-7 V2 Firmware Siplus Net Cp 1543-1 Siplus Net Cp 1543-1 Firmware Siplus S7-1200 Cp 1243-1 Siplus S7-1200 Cp 1243-1 Firmware Siplus S7-1200 Cp 1243-1 Rail Siplus S7-1200 Cp 1243-1 Rail Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2025-04-21T13:51:38.353Z

Reserved: 2022-06-29T00:00:00.000Z

Link: CVE-2022-34819

cve-icon Vulnrichment

Updated: 2024-08-03T09:22:10.546Z

cve-icon NVD

Status : Modified

Published: 2022-07-12T10:15:12.293

Modified: 2024-11-21T07:10:14.917

Link: CVE-2022-34819

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses