siemens capital-vstar CVE-2021-31889 vulnerability in Siemens Products
Published on November 9, 2021

A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions < V0.5.0.0). Malformed TCP packets with a corrupted SACK option leads to Information Leaks and Denial-of-Service conditions. (FSMD-2021-0015)

NVD

Weakness Type

What is an Integer underflow Vulnerability?

The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result. This can happen in signed and unsigned cases.

CVE-2021-31889 has been classified to as an Integer underflow vulnerability or weakness.


Products Associated with CVE-2021-31889

Want to know whenever a new CVE is published for Siemens products? stack.watch will email you.

 
 
 
 

Affected Versions

Siemens Capital Embedded AR Classic 431-422: Siemens Capital Embedded AR Classic R20-11: Siemens PLUSCONTROL 1st Gen: Siemens SIMOTICS CONNECT 400:

Exploit Probability

EPSS
1.58%
Percentile
81.36%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.