Description
A vulnerability has been identified in SIMATIC CP 1242-7 V2 (All versions < V3.3.46), SIMATIC CP 1243-1 (All versions < V3.3.46), SIMATIC CP 1243-7 LTE EU (All versions < V3.3.46), SIMATIC CP 1243-7 LTE US (All versions < V3.3.46), SIMATIC CP 1243-8 IRC (All versions < V3.3.46), SIMATIC CP 1542SP-1 IRC (All versions >= V2.0 < V2.2.28), SIMATIC CP 1543-1 (All versions < V3.0.22), SIMATIC CP 1543SP-1 (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1543SP-1 ISEC (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (All versions >= V2.0 < V2.2.28), SIPLUS NET CP 1242-7 V2 (All versions < V3.3.46), SIPLUS NET CP 1543-1 (All versions < V3.0.22), SIPLUS S7-1200 CP 1243-1 (All versions < V3.3.46), SIPLUS S7-1200 CP 1243-1 RAIL (All versions < V3.3.46). The application lacks proper validation of user-supplied data when parsing specific messages. This could result in a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of device.
Published: 2022-07-12
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-37725 A vulnerability has been identified in SIMATIC CP 1242-7 V2 (All versions < V3.3.46), SIMATIC CP 1243-1 (All versions < V3.3.46), SIMATIC CP 1243-7 LTE EU (All versions < V3.3.46), SIMATIC CP 1243-7 LTE US (All versions < V3.3.46), SIMATIC CP 1243-8 IRC (All versions < V3.3.46), SIMATIC CP 1542SP-1 IRC (All versions >= V2.0 < V2.2.28), SIMATIC CP 1543-1 (All versions < V3.0.22), SIMATIC CP 1543SP-1 (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1543SP-1 ISEC (All versions >= V2.0 < V2.2.28), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (All versions >= V2.0 < V2.2.28), SIPLUS NET CP 1242-7 V2 (All versions < V3.3.46), SIPLUS NET CP 1543-1 (All versions < V3.0.22), SIPLUS S7-1200 CP 1243-1 (All versions < V3.3.46), SIPLUS S7-1200 CP 1243-1 RAIL (All versions < V3.3.46). The application lacks proper validation of user-supplied data when parsing specific messages. This could result in a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of device.
History

Mon, 21 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Siemens Simatic Cp 1242-7 V2 Simatic Cp 1242-7 V2 Firmware Simatic Cp 1243-1 Simatic Cp 1243-1 Firmware Simatic Cp 1243-7 Lte Eu Simatic Cp 1243-7 Lte Eu Firmware Simatic Cp 1243-7 Lte Us Simatic Cp 1243-7 Lte Us Firmware Simatic Cp 1243-8 Irc Simatic Cp 1243-8 Irc Firmware Simatic Cp 1542sp-1 Irc Simatic Cp 1542sp-1 Irc Firmware Simatic Cp 1543-1 Simatic Cp 1543-1 Firmware Simatic Cp 1543sp-1 Simatic Cp 1543sp-1 Firmware Siplus Et 200sp Cp 1542sp-1 Irc Tx Rail Siplus Et 200sp Cp 1542sp-1 Irc Tx Rail Firmware Siplus Et 200sp Cp 1543sp-1 Isec Siplus Et 200sp Cp 1543sp-1 Isec Firmware Siplus Et 200sp Cp 1543sp-1 Isec Tx Rail Siplus Et 200sp Cp 1543sp-1 Isec Tx Rail Firmware Siplus Net Cp 1242-7 V2 Siplus Net Cp 1242-7 V2 Firmware Siplus Net Cp 1543-1 Siplus Net Cp 1543-1 Firmware Siplus S7-1200 Cp 1243-1 Siplus S7-1200 Cp 1243-1 Firmware Siplus S7-1200 Cp 1243-1 Rail Siplus S7-1200 Cp 1243-1 Rail Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2025-04-21T13:51:38.353Z

Reserved: 2022-06-29T00:00:00.000Z

Link: CVE-2022-34819

cve-icon Vulnrichment

Updated: 2024-08-03T09:22:10.546Z

cve-icon NVD

Status : Modified

Published: 2022-07-12T10:15:12.293

Modified: 2024-11-21T07:10:14.917

Link: CVE-2022-34819

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses