{"containers":{"cna":{"providerMetadata":{"orgId":"cec7a2ec-15b4-4faf-bd53-b40f371f3a77","shortName":"siemens","dateUpdated":"2025-03-11T09:47:39.488Z"},"descriptions":[{"lang":"en","value":"A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), SIMOTICS CONNECT 400 (All versions < V1.0.0.0). The total length of an ICMP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on the network buffer organization in memory. (FSMD-2021-0007)"}],"affected":[{"vendor":"Siemens","product":"Capital Embedded AR Classic 431-422","versions":[{"status":"affected","version":"0","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"Capital Embedded AR Classic R20-11","versions":[{"status":"affected","version":"0","lessThan":"V2303","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"PLUSCONTROL 1st Gen","versions":[{"status":"affected","version":"All versions"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIMOTICS CONNECT 400","versions":[{"status":"affected","version":"All versions < V0.5.0.0"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIMOTICS CONNECT 400","versions":[{"status":"affected","version":"All versions < V1.0.0.0"}],"defaultStatus":"unknown"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H","baseScore":8.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-1284","description":"CWE-1284: Improper Validation of Specified Quantity in Input","type":"CWE"}]}],"references":[{"tags":["x_refsource_MISC"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf"},{"tags":["x_refsource_MISC"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf"},{"tags":["x_refsource_MISC"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf"},{"tags":["x_refsource_MISC"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf"},{"tags":["x_refsource_MISC"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-223353.pdf"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-114589.html"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-044112.html"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-620288.html"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-845392.html"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-223353.html"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T22:55:53.543Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-223353.pdf"}]}]},"cveMetadata":{"assignerOrgId":"cec7a2ec-15b4-4faf-bd53-b40f371f3a77","assignerShortName":"siemens","cveId":"CVE-2021-31346","datePublished":"2021-11-09T11:31:53.000Z","dateReserved":"2021-04-15T00:00:00.000Z","dateUpdated":"2025-03-11T09:47:39.488Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}