CVE-2022-42784

A vulnerability has been identified in LOGO! 12/24RCE (6ED1052-1MD08-0BA1) (All versions >= V8.3), LOGO! 12/24RCEo (6ED1052-2MD08-0BA1) (All versions >= V8.3), LOGO! 230RCE (6ED1052-1FB08-0BA1) (All versions >= V8.3), LOGO! 230RCEo (6ED1052-2FB08-0BA1) (All versions >= V8.3), LOGO! 24CE (6ED1052-1CC08-0BA1) (All versions >= V8.3), LOGO! 24CEo (6ED1052-2CC08-0BA1) (All versions >= V8.3), LOGO! 24RCE (6ED1052-1HB08-0BA1) (All versions >= V8.3), LOGO! 24RCEo (6ED1052-2HB08-0BA1) (All versions >= V8.3), SIPLUS LOGO! 12/24RCE (6AG1052-1MD08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 12/24RCEo (6AG1052-2MD08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 230RCE (6AG1052-1FB08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 230RCEo (6AG1052-2FB08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 24CE (6AG1052-1CC08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 24CEo (6AG1052-2CC08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 24RCE (6AG1052-1HB08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 24RCEo (6AG1052-2HB08-7BA1) (All versions >= V8.3). Affected devices are vulnerable to an electromagnetic fault injection. This could allow an attacker to dump and debug the firmware, including the manipulation of memory. Further actions could allow to inject public keys of custom created key pairs which are then signed by the product CA. The generation of a custom certificate allows communication with, and impersonation of, any device of the same version.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:siemens:6ed1052-1md08-0ba1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6ed1052-1md08-0ba1:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:siemens:6ed1052-2md08-0ba1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6ed1052-2md08-0ba1:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:siemens:6ed1052-1cc08-0ba1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6ed1052-1cc08-0ba1:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:siemens:6ed1052-2cc08-0ba1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6ed1052-2cc08-0ba1:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:siemens:6ed1052-1hb08-0ba1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6ed1052-1hb08-0ba1:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:siemens:6ed1052-2hb08-0ba1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6ed1052-2hb08-0ba1:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:siemens:6ed1052-1fb08-0ba1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6ed1052-1fb08-0ba1:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:siemens:6ed1052-2fb08-0ba1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6ed1052-2fb08-0ba1:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:siemens:6ag1052-1md08-7ba1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6ag1052-1md08-7ba1:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:siemens:6ag1052-2md08-7ba1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6ag1052-2md08-7ba1:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:siemens:6ag1052-1cc08-7ba1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6ag1052-1cc08-7ba1:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:siemens:6ag1052-2cc08-7ba1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6ag1052-2cc08-7ba1:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:siemens:6ag1052-1hb08-7ba1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6ag1052-1hb08-7ba1:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:siemens:6ag1052-2hb08-7ba1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6ag1052-2hb08-7ba1:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:siemens:6ag1052-1fb08-7ba1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6ag1052-1fb08-7ba1:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:siemens:6ag1052-2fb08-7ba1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6ag1052-2fb08-7ba1:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:25

Type Values Removed Values Added
References () https://cert-portal.siemens.com/productcert/pdf/ssa-844582.pdf - Vendor Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-844582.pdf - Vendor Advisory
CVSS v2 : unknown
v3 : 6.8
v2 : unknown
v3 : 7.6

10 Sep 2024, 10:15

Type Values Removed Values Added
References
  • () https://cert-portal.siemens.com/productcert/html/ssa-844582.html -
Summary (en) A vulnerability has been identified in LOGO! 12/24RCE (All versions >= V8.3), LOGO! 12/24RCEo (All versions >= V8.3), LOGO! 230RCE (All versions >= V8.3), LOGO! 230RCEo (All versions >= V8.3), LOGO! 24CE (All versions >= V8.3), LOGO! 24CEo (All versions >= V8.3), LOGO! 24RCE (All versions >= V8.3), LOGO! 24RCEo (All versions >= V8.3), SIPLUS LOGO! 12/24RCE (All versions >= V8.3), SIPLUS LOGO! 12/24RCEo (All versions >= V8.3), SIPLUS LOGO! 230RCE (All versions >= V8.3), SIPLUS LOGO! 230RCEo (All versions >= V8.3), SIPLUS LOGO! 24CE (All versions >= V8.3), SIPLUS LOGO! 24CEo (All versions >= V8.3), SIPLUS LOGO! 24RCE (All versions >= V8.3), SIPLUS LOGO! 24RCEo (All versions >= V8.3). Affected devices are vulnerable to an electromagnetic fault injection. This could allow an attacker to dump and debug the firmware, including the manipulation of memory. Further actions could allow to inject public keys of custom created key pairs which are then signed by the product CA. The generation of a custom certificate allows communication with, and impersonation of, any device of the same version. (en) A vulnerability has been identified in LOGO! 12/24RCE (6ED1052-1MD08-0BA1) (All versions >= V8.3), LOGO! 12/24RCEo (6ED1052-2MD08-0BA1) (All versions >= V8.3), LOGO! 230RCE (6ED1052-1FB08-0BA1) (All versions >= V8.3), LOGO! 230RCEo (6ED1052-2FB08-0BA1) (All versions >= V8.3), LOGO! 24CE (6ED1052-1CC08-0BA1) (All versions >= V8.3), LOGO! 24CEo (6ED1052-2CC08-0BA1) (All versions >= V8.3), LOGO! 24RCE (6ED1052-1HB08-0BA1) (All versions >= V8.3), LOGO! 24RCEo (6ED1052-2HB08-0BA1) (All versions >= V8.3), SIPLUS LOGO! 12/24RCE (6AG1052-1MD08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 12/24RCEo (6AG1052-2MD08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 230RCE (6AG1052-1FB08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 230RCEo (6AG1052-2FB08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 24CE (6AG1052-1CC08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 24CEo (6AG1052-2CC08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 24RCE (6AG1052-1HB08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 24RCEo (6AG1052-2HB08-7BA1) (All versions >= V8.3). Affected devices are vulnerable to an electromagnetic fault injection. This could allow an attacker to dump and debug the firmware, including the manipulation of memory. Further actions could allow to inject public keys of custom created key pairs which are then signed by the product CA. The generation of a custom certificate allows communication with, and impersonation of, any device of the same version.

18 Dec 2023, 14:51

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-12 10:15

Updated : 2024-11-21 07:25


NVD link : CVE-2022-42784

Mitre link : CVE-2022-42784

CVE.ORG link : CVE-2022-42784


JSON object : View

Products Affected

siemens

  • 6ed1052-1hb08-0ba1_firmware
  • 6ed1052-2md08-0ba1_firmware
  • 6ag1052-2md08-7ba1
  • 6ed1052-2fb08-0ba1_firmware
  • 6ed1052-1md08-0ba1
  • 6ed1052-2hb08-0ba1_firmware
  • 6ag1052-2md08-7ba1_firmware
  • 6ed1052-2cc08-0ba1_firmware
  • 6ed1052-1md08-0ba1_firmware
  • 6ed1052-1cc08-0ba1_firmware
  • 6ag1052-1md08-7ba1_firmware
  • 6ag1052-2fb08-7ba1_firmware
  • 6ag1052-1md08-7ba1
  • 6ag1052-1cc08-7ba1
  • 6ed1052-2fb08-0ba1
  • 6ag1052-2cc08-7ba1
  • 6ag1052-1fb08-7ba1_firmware
  • 6ed1052-1hb08-0ba1
  • 6ag1052-2hb08-7ba1_firmware
  • 6ag1052-2cc08-7ba1_firmware
  • 6ed1052-2hb08-0ba1
  • 6ag1052-1fb08-7ba1
  • 6ag1052-1hb08-7ba1
  • 6ag1052-1cc08-7ba1_firmware
  • 6ed1052-2cc08-0ba1
  • 6ag1052-1hb08-7ba1_firmware
  • 6ag1052-2hb08-7ba1
  • 6ed1052-2md08-0ba1
  • 6ed1052-1fb08-0ba1_firmware
  • 6ed1052-1fb08-0ba1
  • 6ed1052-1cc08-0ba1
  • 6ag1052-2fb08-7ba1
CWE
CWE-1319

Improper Protection against Electromagnetic Fault Injection (EM-FI)

NVD-CWE-Other