A vulnerability has been identified in LOGO! 12/24RCE (All versions), LOGO! 12/24RCEo (All versions), LOGO! 230RCE (All versions), LOGO! 230RCEo (All versions), LOGO! 24CE (All versions), LOGO! 24CEo (All versions), LOGO! 24RCE (All versions), LOGO! 24RCEo (All versions), SIPLUS LOGO! 12/24RCE (All versions), SIPLUS LOGO! 12/24RCEo (All versions), SIPLUS LOGO! 230RCE (All versions), SIPLUS LOGO! 230RCEo (All versions), SIPLUS LOGO! 24CE (All versions), SIPLUS LOGO! 24CEo (All versions), SIPLUS LOGO! 24RCE (All versions), SIPLUS LOGO! 24RCEo (All versions). Affected devices do not properly validate the structure of TCP packets in several methods. This could allow an attacker to cause buffer overflows, get control over the instruction counter and run custom code.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-955858.pdf | Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: siemens
Published: 2022-10-11T00:00:00
Updated: 2023-12-12T11:25:20.312Z
Reserved: 2022-07-21T00:00:00
Link: CVE-2022-36361
JSON object: View
NVD Information
Status : Modified
Published: 2022-10-11T11:15:10.037
Modified: 2023-12-12T12:15:09.510
Link: CVE-2022-36361
JSON object: View
Redhat Information
No data.
CWE