{"containers":{"cna":{"providerMetadata":{"orgId":"cec7a2ec-15b4-4faf-bd53-b40f371f3a77","shortName":"siemens","dateUpdated":"2025-03-11T09:47:36.591Z"},"descriptions":[{"lang":"en","value":"A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), SIMOTICS CONNECT 400 (All versions < V1.0.0.0). ICMP echo packets with fake IP options allow sending ICMP echo reply messages to arbitrary hosts on the network. (FSMD-2021-0004)"}],"affected":[{"vendor":"Siemens","product":"Capital Embedded AR Classic 431-422","versions":[{"status":"affected","version":"0","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"Capital Embedded AR Classic R20-11","versions":[{"status":"affected","version":"0","lessThan":"V2303","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"PLUSCONTROL 1st Gen","versions":[{"status":"affected","version":"All versions"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIMOTICS CONNECT 400","versions":[{"status":"affected","version":"All versions < V0.5.0.0"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIMOTICS CONNECT 400","versions":[{"status":"affected","version":"All versions < V1.0.0.0"}],"defaultStatus":"unknown"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM"}},{"cvssV4_0":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N","baseScore":6.9,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-843","description":"CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')","type":"CWE"}]}],"references":[{"tags":["x_refsource_MISC"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf"},{"tags":["x_refsource_MISC"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf"},{"tags":["x_refsource_MISC"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf"},{"tags":["x_refsource_MISC"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf"},{"tags":["x_refsource_MISC"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-223353.pdf"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-114589.html"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-044112.html"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-620288.html"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-845392.html"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-223353.html"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T22:55:53.529Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-223353.pdf"}]}]},"cveMetadata":{"assignerOrgId":"cec7a2ec-15b4-4faf-bd53-b40f371f3a77","assignerShortName":"siemens","cveId":"CVE-2021-31344","datePublished":"2021-11-09T11:31:51.000Z","dateReserved":"2021-04-15T00:00:00.000Z","dateUpdated":"2025-03-11T09:47:36.591Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}