siemens capital-vstar CVE-2021-31890 vulnerability in Siemens Products
Published on November 9, 2021

A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), SIMOTICS CONNECT 400 (All versions < V1.0.0.0). The total length of an TCP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on the network buffer organization in memory. (FSMD-2021-0017)

NVD

Weakness Type

Improper Handling of Inconsistent Structural Elements

The software does not handle or incorrectly handles when two or more structural elements should be consistent, but are not.


Products Associated with CVE-2021-31890

Want to know whenever a new CVE is published for Siemens products? stack.watch will email you.

 
 
 
 
 

Affected Versions

Siemens Capital Embedded AR Classic 431-422: Siemens Capital Embedded AR Classic R20-11: Siemens PLUSCONTROL 1st Gen: Siemens SIMOTICS CONNECT 400: Siemens SIMOTICS CONNECT 400:

Exploit Probability

EPSS
2.50%
Percentile
85.08%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.