siemens capital-vstar CVE-2021-31344 vulnerability in Siemens Products
Published on November 9, 2021

A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), SIMOTICS CONNECT 400 (All versions < V1.0.0.0). ICMP echo packets with fake IP options allow sending ICMP echo reply messages to arbitrary hosts on the network. (FSMD-2021-0004)

NVD

Weakness Type

What is an Object Type Confusion Vulnerability?

The program allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.

CVE-2021-31344 has been classified to as an Object Type Confusion vulnerability or weakness.


Products Associated with CVE-2021-31344

Want to know whenever a new CVE is published for Siemens products? stack.watch will email you.

 
 
 
 
 

Affected Versions

Siemens Capital Embedded AR Classic 431-422: Siemens Capital Embedded AR Classic R20-11: Siemens PLUSCONTROL 1st Gen: Siemens SIMOTICS CONNECT 400: Siemens SIMOTICS CONNECT 400:

Exploit Probability

EPSS
0.91%
Percentile
75.51%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.