A vulnerability has been identified in SIMATIC CP 1242-7 V2 (All versions < V3.3.46), SIMATIC CP 1243-1 (All versions < V3.3.46), SIMATIC CP 1243-7 LTE EU (All versions < V3.3.46), SIMATIC CP 1243-7 LTE US (All versions < V3.3.46), SIMATIC CP 1243-8 IRC (All versions < V3.3.46), SIMATIC CP 1542SP-1 IRC (All versions >= V2.0 < V2.2.28), SIMATIC CP 1543-1 (All versions < V3.0.22), SIMATIC CP 1543SP-1 (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1543SP-1 ISEC (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (All versions >= V2.0 < V2.2.28), SIPLUS NET CP 1242-7 V2 (All versions < V3.3.46), SIPLUS NET CP 1543-1 (All versions < V3.0.22), SIPLUS S7-1200 CP 1243-1 (All versions < V3.3.46), SIPLUS S7-1200 CP 1243-1 RAIL (All versions < V3.3.46). The application lacks proper validation of user-supplied data when parsing specific messages. This could result in a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of device.

Project Subscriptions

Vendors Products
Siemens Subscribe
Simatic Cp 1242-7 V2 Subscribe
Simatic Cp 1242-7 V2 Firmware Subscribe
Simatic Cp 1243-1 Subscribe
Simatic Cp 1243-1 Firmware Subscribe
Simatic Cp 1243-7 Lte Eu Subscribe
Simatic Cp 1243-7 Lte Eu Firmware Subscribe
Simatic Cp 1243-7 Lte Us Subscribe
Simatic Cp 1243-7 Lte Us Firmware Subscribe
Simatic Cp 1243-8 Irc Subscribe
Simatic Cp 1243-8 Irc Firmware Subscribe
Simatic Cp 1542sp-1 Irc Subscribe
Simatic Cp 1542sp-1 Irc Firmware Subscribe
Simatic Cp 1543-1 Subscribe
Simatic Cp 1543-1 Firmware Subscribe
Simatic Cp 1543sp-1 Subscribe
Simatic Cp 1543sp-1 Firmware Subscribe
Siplus Et 200sp Cp 1542sp-1 Irc Tx Rail Subscribe
Siplus Et 200sp Cp 1542sp-1 Irc Tx Rail Firmware Subscribe
Siplus Et 200sp Cp 1543sp-1 Isec Subscribe
Siplus Et 200sp Cp 1543sp-1 Isec Firmware Subscribe
Siplus Et 200sp Cp 1543sp-1 Isec Tx Rail Subscribe
Siplus Et 200sp Cp 1543sp-1 Isec Tx Rail Firmware Subscribe
Siplus Net Cp 1242-7 V2 Subscribe
Siplus Net Cp 1242-7 V2 Firmware Subscribe
Siplus Net Cp 1543-1 Subscribe
Siplus Net Cp 1543-1 Firmware Subscribe
Siplus S7-1200 Cp 1243-1 Subscribe
Siplus S7-1200 Cp 1243-1 Firmware Subscribe
Siplus S7-1200 Cp 1243-1 Rail Subscribe
Siplus S7-1200 Cp 1243-1 Rail Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-37725 A vulnerability has been identified in SIMATIC CP 1242-7 V2 (All versions < V3.3.46), SIMATIC CP 1243-1 (All versions < V3.3.46), SIMATIC CP 1243-7 LTE EU (All versions < V3.3.46), SIMATIC CP 1243-7 LTE US (All versions < V3.3.46), SIMATIC CP 1243-8 IRC (All versions < V3.3.46), SIMATIC CP 1542SP-1 IRC (All versions >= V2.0 < V2.2.28), SIMATIC CP 1543-1 (All versions < V3.0.22), SIMATIC CP 1543SP-1 (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1543SP-1 ISEC (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (All versions >= V2.0 < V2.2.28), SIPLUS NET CP 1242-7 V2 (All versions < V3.3.46), SIPLUS NET CP 1543-1 (All versions < V3.0.22), SIPLUS S7-1200 CP 1243-1 (All versions < V3.3.46), SIPLUS S7-1200 CP 1243-1 RAIL (All versions < V3.3.46). The application lacks proper validation of user-supplied data when parsing specific messages. This could result in a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of device.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 21 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2025-04-21T13:51:38.353Z

Reserved: 2022-06-29T00:00:00.000Z

Link: CVE-2022-34819

cve-icon Vulnrichment

Updated: 2024-08-03T09:22:10.546Z

cve-icon NVD

Status : Modified

Published: 2022-07-12T10:15:12.293

Modified: 2024-11-21T07:10:14.917

Link: CVE-2022-34819

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses