Vulnerability Description
A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), SIMOTICS CONNECT 400 (All versions < V1.0.0.0). The total length of an ICMP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on the network buffer organization in memory. (FSMD-2021-0007)
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Siemens | Capital Vstar | All versions |
| Siemens | Nucleus Net | All versions |
| Siemens | Nucleus Readystart V3 | < 2017.02.1 |
| Siemens | Nucleus Readystart V4 | < 4.1.1 |
| Siemens | Nucleus Source Code | All versions |
| Siemens | Apogee Modular Building Controller Firmware | All versions |
| Siemens | Apogee Modular Building Controller | - |
| Siemens | Apogee Modular Equiment Controller Firmware | All versions |
| Siemens | Apogee Modular Equiment Controller | - |
| Siemens | Apogee Pxc Compact Firmware | All versions |
| Siemens | Apogee Pxc Compact | - |
| Siemens | Apogee Pxc Modular Firmware | All versions |
| Siemens | Apogee Pxc Modular | - |
| Siemens | Talon Tc Compact Firmware | All versions |
| Siemens | Talon Tc Compact | - |
| Siemens | Talon Tc Modular Firmware | All versions |
| Siemens | Talon Tc Modular | - |
Related Weaknesses (CWE)
References
- https://cert-portal.siemens.com/productcert/html/ssa-044112.html
- https://cert-portal.siemens.com/productcert/html/ssa-114589.html
- https://cert-portal.siemens.com/productcert/html/ssa-223353.html
- https://cert-portal.siemens.com/productcert/html/ssa-620288.html
- https://cert-portal.siemens.com/productcert/html/ssa-845392.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdfVendor Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdfVendor Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-223353.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdfVendor Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdfVendor Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-223353.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf
FAQ
What is CVE-2021-31346?
CVE-2021-31346 is a vulnerability with a CVSS score of 8.2 (HIGH). A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNE...
How severe is CVE-2021-31346?
CVE-2021-31346 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-31346?
Check the references section above for vendor advisories and patch information. Affected products include: Siemens Capital Vstar, Siemens Nucleus Net, Siemens Nucleus Readystart V3, Siemens Nucleus Readystart V4, Siemens Nucleus Source Code.