{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-40227","assignerOrgId":"cec7a2ec-15b4-4faf-bd53-b40f371f3a77","assignerShortName":"siemens","dateUpdated":"2024-08-03T12:14:39.944Z","dateReserved":"2022-09-08T00:00:00.000Z","datePublished":"2022-10-11T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"cec7a2ec-15b4-4faf-bd53-b40f371f3a77","shortName":"siemens","dateUpdated":"2022-10-11T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"A vulnerability has been identified in SIMATIC HMI Comfort Panels (incl. SIPLUS variants) (All versions < V17 Update 4), SIMATIC HMI KTP Mobile Panels (All versions < V17 Update 4), SIMATIC HMI KTP1200 Basic (All versions < V17 Update 5), SIMATIC HMI KTP400 Basic (All versions < V17 Update 5), SIMATIC HMI KTP700 Basic (All versions < V17 Update 5), SIMATIC HMI KTP900 Basic (All versions < V17 Update 5), SIPLUS HMI KTP1200 BASIC (All versions < V17 Update 5), SIPLUS HMI KTP400 BASIC (All versions < V17 Update 5), SIPLUS HMI KTP700 BASIC (All versions < V17 Update 5), SIPLUS HMI KTP900 BASIC (All versions < V17 Update 5). Affected devices do not properly validate input sent to certain services over TCP. This could allow an unauthenticated remote attacker to cause a permanent denial of service condition (requiring a device reboot) by sending specially crafted TCP packets."}],"affected":[{"vendor":"Siemens","product":"SIMATIC HMI Comfort Panels (incl. SIPLUS variants)","versions":[{"version":"All versions < V17 Update 4","status":"affected"}]},{"vendor":"Siemens","product":"SIMATIC HMI KTP Mobile Panels","versions":[{"version":"All versions < V17 Update 4","status":"affected"}]},{"vendor":"Siemens","product":"SIMATIC HMI KTP1200 Basic","versions":[{"version":"All versions < V17 Update 5","status":"affected"}]},{"vendor":"Siemens","product":"SIMATIC HMI KTP400 Basic","versions":[{"version":"All versions < V17 Update 5","status":"affected"}]},{"vendor":"Siemens","product":"SIMATIC HMI KTP700 Basic","versions":[{"version":"All versions < V17 Update 5","status":"affected"}]},{"vendor":"Siemens","product":"SIMATIC HMI KTP900 Basic","versions":[{"version":"All versions < V17 Update 5","status":"affected"}]},{"vendor":"Siemens","product":"SIPLUS HMI KTP1200 BASIC","versions":[{"version":"All versions < V17 Update 5","status":"affected"}]},{"vendor":"Siemens","product":"SIPLUS HMI KTP400 BASIC","versions":[{"version":"All versions < V17 Update 5","status":"affected"}]},{"vendor":"Siemens","product":"SIPLUS HMI KTP700 BASIC","versions":[{"version":"All versions < V17 Update 5","status":"affected"}]},{"vendor":"Siemens","product":"SIPLUS HMI KTP900 BASIC","versions":[{"version":"All versions < V17 Update 5","status":"affected"}]}],"references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-384224.pdf"}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-20: Improper Input Validation","cweId":"CWE-20"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T12:14:39.944Z"},"title":"CVE Program Container","references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-384224.pdf","tags":["x_transferred"]}]}]}}