A vulnerability has been identified in SiPass integrated (All versions < V2.90.3.8). Affected server applications improperly check the size of data packets received for the configuration client login, causing a stack-based buffer overflow.
This could allow an unauthenticated remote attacker to crash the server application, creating a denial of service condition.
References
| Link | Resource |
|---|---|
| https://cert-portal.siemens.com/productcert/pdf/ssa-924149.pdf | Vendor Advisory |
| https://cert-portal.siemens.com/productcert/pdf/ssa-924149.pdf | Vendor Advisory |
Configurations
History
21 Nov 2024, 07:05
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://cert-portal.siemens.com/productcert/pdf/ssa-924149.pdf - Vendor Advisory |
19 Jul 2023, 14:41
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MISC) https://cert-portal.siemens.com/productcert/pdf/ssa-924149.pdf - Vendor Advisory | |
| First Time |
Siemens
Siemens sipass Integrated |
|
| CPE | cpe:2.3:a:siemens:sipass_integrated:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| CWE | CWE-787 |
11 Jul 2023, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-07-11 10:15
Updated : 2024-11-21 07:05
NVD link : CVE-2022-31810
Mitre link : CVE-2022-31810
CVE.ORG link : CVE-2022-31810
JSON object : View
Products Affected
siemens
- sipass_integrated
