A vulnerability has been identified in SiPass integrated (All versions < V2.90.3.8). Affected server applications improperly check the size of data packets received for the configuration client login, causing a stack-based buffer overflow.
This could allow an unauthenticated remote attacker to crash the server application, creating a denial of service condition.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-924149.pdf | Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-924149.pdf | Vendor Advisory |
Configurations
History
21 Nov 2024, 07:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-924149.pdf - Vendor Advisory |
19 Jul 2023, 14:41
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CWE | CWE-787 | |
First Time |
Siemens sipass Integrated
Siemens |
|
References | (MISC) https://cert-portal.siemens.com/productcert/pdf/ssa-924149.pdf - Vendor Advisory | |
CPE | cpe:2.3:a:siemens:sipass_integrated:*:*:*:*:*:*:*:* |
11 Jul 2023, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-11 10:15
Updated : 2024-11-21 07:05
NVD link : CVE-2022-31810
Mitre link : CVE-2022-31810
CVE.ORG link : CVE-2022-31810
JSON object : View
Products Affected
siemens
- sipass_integrated