We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Zendesk (Helpdesk and Chat)
Ok

THREATINT
PUBLISHED

CVE-2022-25622

Reserved:2022-02-21
Published:2022-04-12
Updated:2024-05-15

Description

A vulnerability has been identified in SIMATIC CFU DIQ (6ES7655-5PX31-1XX0), SIMATIC CFU PA (6ES7655-5PX11-0XX0), SIMATIC ET 200pro IM154-8 PN/DP CPU (6ES7154-8AB01-0AB0), SIMATIC ET 200pro IM154-8F PN/DP CPU (6ES7154-8FB01-0AB0), SIMATIC ET 200pro IM154-8FX PN/DP CPU (6ES7154-8FX00-0AB0), SIMATIC ET 200S IM151-8 PN/DP CPU (6ES7151-8AB01-0AB0), SIMATIC ET 200S IM151-8F PN/DP CPU (6ES7151-8FB01-0AB0), SIMATIC ET200AL IM157-1 PN, SIMATIC ET200ecoPN, AI 8xRTD/TC, M12-L (6ES7144-6JF00-0BB0), SIMATIC ET200ecoPN, CM 4x IO-Link, M12-L (6ES7148-6JE00-0BB0), SIMATIC ET200ecoPN, CM 8x IO-Link, M12-L (6ES7148-6JG00-0BB0), SIMATIC ET200ecoPN, CM 8x IO-Link, M12-L (6ES7148-6JJ00-0BB0), SIMATIC ET200ecoPN, DI 16x24VDC, M12-L (6ES7141-6BH00-0BB0), SIMATIC ET200ecoPN, DI 8x24VDC, M12-L (6ES7141-6BG00-0BB0), SIMATIC ET200ecoPN, DIQ 16x24VDC/2A, M12-L (6ES7143-6BH00-0BB0), SIMATIC ET200ecoPN, DQ 8x24VDC/0,5A, M12-L (6ES7142-6BG00-0BB0), SIMATIC ET200ecoPN, DQ 8x24VDC/2A, M12-L (6ES7142-6BR00-0BB0), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 MF HF, SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants), SIMATIC PN/MF Coupler (6ES7158-3MU10-0XA0), SIMATIC PN/PN Coupler (6ES7158-3AD10-0XA0), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants), SIMATIC S7-300 CPU 314C-2 PN/DP (6ES7314-6EH04-0AB0), SIMATIC S7-300 CPU 315-2 PN/DP (6ES7315-2EH14-0AB0), SIMATIC S7-300 CPU 315F-2 PN/DP (6ES7315-2FJ14-0AB0), SIMATIC S7-300 CPU 315T-3 PN/DP (6ES7315-7TJ10-0AB0), SIMATIC S7-300 CPU 317-2 PN/DP (6ES7317-2EK14-0AB0), SIMATIC S7-300 CPU 317F-2 PN/DP (6ES7317-2FK14-0AB0), SIMATIC S7-300 CPU 317T-3 PN/DP (6ES7317-7TK10-0AB0), SIMATIC S7-300 CPU 317TF-3 PN/DP (6ES7317-7UL10-0AB0), SIMATIC S7-300 CPU 319-3 PN/DP (6ES7318-3EL01-0AB0), SIMATIC S7-300 CPU 319F-3 PN/DP (6ES7318-3FL01-0AB0), SIMATIC S7-400 CPU 412-2 PN V7 (6ES7412-2EK07-0AB0), SIMATIC S7-400 CPU 414-3 PN/DP V7 (6ES7414-3EM07-0AB0), SIMATIC S7-400 CPU 414F-3 PN/DP V7 (6ES7414-3FM07-0AB0), SIMATIC S7-400 CPU 416-3 PN/DP V7 (6ES7416-3ES07-0AB0), SIMATIC S7-400 CPU 416F-3 PN/DP V7 (6ES7416-3FS07-0AB0), SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants), SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants), SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants), SIMATIC TDC CP51M1, SIMATIC TDC CPU555, SIMATIC WinAC RTX 2010 (6ES7671-0RC08-0YA0), SIMATIC WinAC RTX F 2010 (6ES7671-1RC08-0YA0), SINAMICS DCM, SINAMICS G110M, SINAMICS G115D, SINAMICS G120 (incl. SIPLUS variants), SINAMICS G130, SINAMICS G150, SINAMICS S110, SINAMICS S120 (incl. SIPLUS variants), SINAMICS S150, SINAMICS S210 (6SL5...), SINAMICS V90, SIPLUS ET 200S IM151-8 PN/DP CPU (6AG1151-8AB01-7AB0), SIPLUS ET 200S IM151-8F PN/DP CPU (6AG1151-8FB01-2AB0), SIPLUS HCS4200 CIM4210 (6BK1942-1AA00-0AA0), SIPLUS HCS4200 CIM4210C (6BK1942-1AA00-0AA1), SIPLUS HCS4300 CIM4310 (6BK1943-1AA00-0AA0), SIPLUS NET PN/PN Coupler (6AG2158-3AD10-4XA0), SIPLUS S7-300 CPU 314C-2 PN/DP (6AG1314-6EH04-7AB0), SIPLUS S7-300 CPU 315-2 PN/DP (6AG1315-2EH14-7AB0), SIPLUS S7-300 CPU 315F-2 PN/DP (6AG1315-2FJ14-2AB0), SIPLUS S7-300 CPU 317-2 PN/DP (6AG1317-2EK14-7AB0), SIPLUS S7-300 CPU 317F-2 PN/DP (6AG1317-2FK14-2AB0), SIPLUS S7-400 CPU 414-3 PN/DP V7 (6AG1414-3EM07-7AB0), SIPLUS S7-400 CPU 416-3 PN/DP V7 (6AG1416-3ES07-7AB0). The PROFINET (PNIO) stack, when integrated with the Interniche IP stack, improperly handles internal resources for TCP segments where the minimum TCP-Header length is less than defined. This could allow an attacker to create a denial of service condition for TCP services on affected devices by sending specially crafted TCP segments.



MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C

Problem types

CWE-400: Uncontrolled Resource Consumption

Product status

Default status
unknown

All versions
affected

Default status
unknown

All versions
affected

Default status
unknown

All versions < V3.2.19
affected

Default status
unknown

All versions < V3.2.19
affected

Default status
unknown

All versions < V3.2.19
affected

Default status
unknown

All versions < V3.2.19
affected

Default status
unknown

All versions < V3.2.19
affected

Default status
unknown

All versions
affected

Default status
unknown

V5.1.1 before V5.1.2
affected

Default status
unknown

All versions >= V5.1.1
affected

Default status
unknown

All versions >= V5.1.1
affected

Default status
unknown

All versions >= V5.1.1
affected

Default status
unknown

V5.1.1 before V5.1.2
affected

Default status
unknown

V5.1.1 before V5.1.2
affected

Default status
unknown

V5.1.1 before V5.1.3
affected

Default status
unknown

V5.1.1 before V5.1.2
affected

Default status
unknown

V5.1.1 before V5.1.2
affected

Default status
unknown

All versions >= V4.2
affected

Default status
unknown

All versions
affected

Default status
unknown

All versions
affected

Default status
unknown

All versions >= V4.2
affected

Default status
unknown

All versions >= V4.2
affected

Default status
unknown

All versions >= V4.2
affected

Default status
unknown

All versions
affected

Default status
unknown

All versions >= 4.2
affected

Default status
unknown

All versions < V2.0.0
affected

Default status
unknown

All versions < V3.3.19
affected

Default status
unknown

All versions < V3.2.19
affected

Default status
unknown

All versions < V3.2.19
affected

Default status
unknown

All versions < V3.2.19
affected

Default status
unknown

All versions < V3.2.19
affected

Default status
unknown

All versions < V3.2.19
affected

Default status
unknown

All versions < V3.2.19
affected

Default status
unknown

All versions < V3.2.19
affected

Default status
unknown

All versions < V3.2.19
affected

Default status
unknown

All versions < V3.2.19
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before V6.0.10
affected

Default status
unknown

All versions < V10.1.1
affected

Default status
unknown

Any version before V8.2.3
affected

Default status
unknown

Any version before V1.1.10
affected

Default status
unknown

Any version before V1.2.1
affected

Default status
unknown

All versions
affected

Default status
unknown

All versions
affected

Default status
unknown

All versions with Ethernet interface
affected

Default status
unknown

Any version before V4.7.14
affected

Default status
unknown

Any version before V4.7.14
affected

Default status
unknown

Any version before V4.7 SP14
affected

Default status
unknown

Any version before V5.2.3.13
affected

Default status
unknown

Any version before V5.2.3.13
affected

Default status
unknown

All versions with Ethernet interface
affected

Default status
unknown

Any version before V5.2 SP3 HF13
affected

Default status
unknown

Any version before V5.2.3.13
affected

Default status
unknown

Any version before *
affected

Default status
unknown

All versions with Ethernet interface
affected

Default status
unknown

All versions < V3.2.19
affected

Default status
unknown

All versions < V3.2.19
affected

Default status
unknown

All versions
affected

Default status
unknown

All versions
affected

Default status
unknown

All versions
affected

Default status
unknown

All versions >= 4.2
affected

Default status
unknown

All versions < V3.3.19
affected

Default status
unknown

All versions < V3.2.19
affected

Default status
unknown

All versions < V3.2.19
affected

Default status
unknown

All versions < V3.2.19
affected

Default status
unknown

All versions < V3.2.19
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before *
affected

References

https://cert-portal.siemens.com/productcert/pdf/ssa-446448.pdf

https://cert-portal.siemens.com/productcert/html/ssa-446448.html

cve.org CVE-2022-25622

nvd.nist.gov CVE-2022-25622

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2022-25622