#VU65274 Code Injection in Siemens products - CVE-2022-34821
Published: July 13, 2022 / Updated: July 14, 2022
Vulnerability identifier: #VU65274
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2022-34821
CWE-ID: CWE-94
Exploitation vector: Adjecent network
Exploit availability:
No public exploit available
Vulnerable software:
SIMATIC CP 1242-7 V2
SIMATIC CP 1243-1
SIMATIC CP 1243-7 LTE EU
SIMATIC CP 1243-7 LTE US
SIMATIC CP 1243-8 IRC
SIMATIC CP 1542SP-1 IRC
SIMATIC CP 1543SP-1
SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL
SIPLUS ET 200SP CP 1543SP-1 ISEC
SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL
SIPLUS NET CP 1242-7 V2
SIPLUS S7-1200 CP 1243-1
SIPLUS S7-1200 CP 1243-1 RAIL
SIMATIC CP 1543-1
SIPLUS NET CP 1543-1
SIMATIC CP 1242-7 V2
SIMATIC CP 1243-1
SIMATIC CP 1243-7 LTE EU
SIMATIC CP 1243-7 LTE US
SIMATIC CP 1243-8 IRC
SIMATIC CP 1542SP-1 IRC
SIMATIC CP 1543SP-1
SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL
SIPLUS ET 200SP CP 1543SP-1 ISEC
SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL
SIPLUS NET CP 1242-7 V2
SIPLUS S7-1200 CP 1243-1
SIPLUS S7-1200 CP 1243-1 RAIL
SIMATIC CP 1543-1
SIPLUS NET CP 1543-1
Software vendor:
Siemens
Siemens
Description
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation within the specific configuration options for OpenVPN. A remote administrator on the local network can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.