A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), SIMOTICS CONNECT 400 (All versions < V1.0.0.0). The total length of an TCP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on the network buffer organization in memory. (FSMD-2021-0017)
The product does not handle or incorrectly handles when two or more structural elements should be consistent, but are not.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Capital_vstar | Siemens | * | * |
Nucleus_net | Siemens | * | * |
Nucleus_readystart_v3 | Siemens | * | 2017.02.4 (excluding) |
Nucleus_readystart_v4 | Siemens | * | 4.1.1 (excluding) |
Nucleus_source_code | Siemens | * | * |