siemens simatic_cp_1242-7_v2_firmware 对生成代码的控制不恰当(代码注入)
CVE编号
CVE-2022-34821利用情况
暂无补丁情况
N/A披露时间
2022-07-12漏洞描述
A vulnerability has been identified in SIMATIC CP 1242-7 V2 (All versions), SIMATIC CP 1243-1 (All versions), SIMATIC CP 1243-7 LTE EU (All versions), SIMATIC CP 1243-7 LTE US (All versions), SIMATIC CP 1243-8 IRC (All versions), SIMATIC CP 1542SP-1 IRC (All versions >= V2.0), SIMATIC CP 1543-1 (All versions < V3.0.22), SIMATIC CP 1543SP-1 (All versions >= V2.0), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (All versions >= V2.0), SIPLUS ET 200SP CP 1543SP-1 ISEC (All versions >= V2.0), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (All versions >= V2.0), SIPLUS NET CP 1242-7 V2 (All versions), SIPLUS NET CP 1543-1 (All versions < V3.0.22), SIPLUS S7-1200 CP 1243-1 (All versions), SIPLUS S7-1200 CP 1243-1 RAIL (All versions). By injecting code to specific configuration options for OpenVPN, an attacker could execute arbitrary code with elevated privileges.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-413565.pdf | |
https://cert-portal.siemens.com/productcert/pdf/ssa-517377.pdf |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | siemens | simatic_cp_1242-7_v2_firmware | * | - | |||||
运行在以下环境 | |||||||||
系统 | siemens | simatic_cp_1243-1_firmware | * | - | |||||
运行在以下环境 | |||||||||
系统 | siemens | simatic_cp_1243-7_lte_eu_firmware | * | - | |||||
运行在以下环境 | |||||||||
系统 | siemens | simatic_cp_1243-7_lte_us_firmware | * | - | |||||
运行在以下环境 | |||||||||
系统 | siemens | simatic_cp_1243-8_irc_firmware | * | - | |||||
运行在以下环境 | |||||||||
系统 | siemens | simatic_cp_1542sp-1_irc_firmware | * | From (including) 2.0 | |||||
运行在以下环境 | |||||||||
系统 | siemens | simatic_cp_1543-1_firmware | * | Up to (excluding) 3.0.22 | |||||
运行在以下环境 | |||||||||
系统 | siemens | simatic_cp_1543sp-1_firmware | * | From (including) 2.0 | |||||
运行在以下环境 | |||||||||
系统 | siemens | siplus_et_200sp_cp_1542sp-1_irc_tx_rail_firmware | * | From (including) 2.0 | |||||
运行在以下环境 | |||||||||
系统 | siemens | siplus_et_200sp_cp_1543sp-1_isec_firmware | * | From (including) 2.0 | |||||
运行在以下环境 | |||||||||
系统 | siemens | siplus_et_200sp_cp_1543sp-1_isec_tx_rail_firmware | * | From (including) 2.0 | |||||
运行在以下环境 | |||||||||
系统 | siemens | siplus_net_cp_1242-7_v2_firmware | * | - | |||||
运行在以下环境 | |||||||||
系统 | siemens | siplus_net_cp_1543-1_firmware | * | Up to (excluding) 3.0.22 | |||||
运行在以下环境 | |||||||||
系统 | siemens | siplus_s7-1200_cp_1243-1_firmware | * | - | |||||
运行在以下环境 | |||||||||
系统 | siemens | siplus_s7-1200_cp_1243-1_rail_firmware | * | - | |||||
运行在以下环境 | |||||||||
硬件 | siemens | simatic_cp_1242-7_v2 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | siemens | simatic_cp_1243-1 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | siemens | simatic_cp_1243-7_lte_eu | - | - | |||||
运行在以下环境 | |||||||||
硬件 | siemens | simatic_cp_1243-7_lte_us | - | - | |||||
运行在以下环境 | |||||||||
硬件 | siemens | simatic_cp_1243-8_irc | - | - | |||||
运行在以下环境 | |||||||||
硬件 | siemens | simatic_cp_1542sp-1_irc | - | - | |||||
运行在以下环境 | |||||||||
硬件 | siemens | simatic_cp_1543-1 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | siemens | simatic_cp_1543sp-1 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | siemens | siplus_et_200sp_cp_1542sp-1_irc_tx_rail | - | - | |||||
运行在以下环境 | |||||||||
硬件 | siemens | siplus_et_200sp_cp_1543sp-1_isec | - | - | |||||
运行在以下环境 | |||||||||
硬件 | siemens | siplus_et_200sp_cp_1543sp-1_isec_tx_rail | - | - | |||||
运行在以下环境 | |||||||||
硬件 | siemens | siplus_net_cp_1242-7_v2 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | siemens | siplus_net_cp_1543-1 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | siemens | siplus_s7-1200_cp_1243-1 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | siemens | siplus_s7-1200_cp_1243-1_rail | - | - | |||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 高
- 完整性 高
CWE-ID | 漏洞类型 |
CWE-94 | 对生成代码的控制不恰当(代码注入) |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论