First published: Tue Apr 12 2022(Updated: )
A vulnerability has been identified in SCALANCE W1788-1 M12 (All versions < V3.0.0), SCALANCE W1788-2 EEC M12 (All versions < V3.0.0), SCALANCE W1788-2 M12 (All versions < V3.0.0), SCALANCE W1788-2IA M12 (All versions < V3.0.0). Affected devices do not properly handle malformed TCP packets received over the RemoteCapture feature. This could allow an attacker to lead to a denial of service condition which only affects the port used by the RemoteCapture feature.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Scalance W1788-2IA M12 | <3.0.0 | |
Siemens Scalance W1788-2IA Firmware | ||
Siemens Scalance W1788-2 Firmware | <3.0.0 | |
Siemens Scalance W1788-2 Firmware | ||
Siemens Scalance W1788-2 EEC M12 | <3.0.0 | |
Siemens Scalance W1788-2 | ||
Siemens SCALANCE W1788-1 M12 Firmware | <3.0.0 | |
Siemens SCALANCE W1788-1 M12 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-28329.
The severity rating of CVE-2022-28329 is 6.5 (Medium).
SCALANCE W1788-1 M12 (All versions < V3.0.0), SCALANCE W1788-2 EEC M12 (All versions < V3.0.0), SCALANCE W1788-2 M12 (All versions < V3.0.0), SCALANCE W1788-2IA M12 (All versions < V3.0.0) are affected by CVE-2022-28329.
Apply the latest firmware version (V3.0.0) to the affected SCALANCE W1788 devices.
You can find more information about CVE-2022-28329 at the following link: https://cert-portal.siemens.com/productcert/pdf/ssa-392912.pdf.