A vulnerability has been identified in LOGO! 12/24RCE (6ED1052-1MD08-0BA1) (All versions >= V8.3), LOGO! 12/24RCEo (6ED1052-2MD08-0BA1) (All versions >= V8.3), LOGO! 230RCE (6ED1052-1FB08-0BA1) (All versions >= V8.3), LOGO! 230RCEo (6ED1052-2FB08-0BA1) (All versions >= V8.3), LOGO! 24CE (6ED1052-1CC08-0BA1) (All versions >= V8.3), LOGO! 24CEo (6ED1052-2CC08-0BA1) (All versions >= V8.3), LOGO! 24RCE (6ED1052-1HB08-0BA1) (All versions >= V8.3), LOGO! 24RCEo (6ED1052-2HB08-0BA1) (All versions >= V8.3), SIPLUS LOGO! 12/24RCE (6AG1052-1MD08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 12/24RCEo (6AG1052-2MD08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 230RCE (6AG1052-1FB08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 230RCEo (6AG1052-2FB08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 24CE (6AG1052-1CC08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 24CEo (6AG1052-2CC08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 24RCE (6AG1052-1HB08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 24RCEo (6AG1052-2HB08-7BA1) (All versions >= V8.3). Affected devices are vulnerable to an electromagnetic fault injection. This could allow an attacker to dump and debug the firmware, including the manipulation of memory. Further actions could allow to inject public keys of custom created key pairs which are then signed by the product CA. The generation of a custom certificate allows communication with, and impersonation of, any device of the same version.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/html/ssa-844582.html | |
https://cert-portal.siemens.com/productcert/pdf/ssa-844582.pdf | Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-844582.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
Configuration 15 (hide)
AND |
|
Configuration 16 (hide)
AND |
|
History
21 Nov 2024, 07:25
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.6 |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-844582.pdf - Vendor Advisory |
10 Sep 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) A vulnerability has been identified in LOGO! 12/24RCE (6ED1052-1MD08-0BA1) (All versions >= V8.3), LOGO! 12/24RCEo (6ED1052-2MD08-0BA1) (All versions >= V8.3), LOGO! 230RCE (6ED1052-1FB08-0BA1) (All versions >= V8.3), LOGO! 230RCEo (6ED1052-2FB08-0BA1) (All versions >= V8.3), LOGO! 24CE (6ED1052-1CC08-0BA1) (All versions >= V8.3), LOGO! 24CEo (6ED1052-2CC08-0BA1) (All versions >= V8.3), LOGO! 24RCE (6ED1052-1HB08-0BA1) (All versions >= V8.3), LOGO! 24RCEo (6ED1052-2HB08-0BA1) (All versions >= V8.3), SIPLUS LOGO! 12/24RCE (6AG1052-1MD08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 12/24RCEo (6AG1052-2MD08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 230RCE (6AG1052-1FB08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 230RCEo (6AG1052-2FB08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 24CE (6AG1052-1CC08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 24CEo (6AG1052-2CC08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 24RCE (6AG1052-1HB08-7BA1) (All versions >= V8.3), SIPLUS LOGO! 24RCEo (6AG1052-2HB08-7BA1) (All versions >= V8.3). Affected devices are vulnerable to an electromagnetic fault injection. This could allow an attacker to dump and debug the firmware, including the manipulation of memory. Further actions could allow to inject public keys of custom created key pairs which are then signed by the product CA. The generation of a custom certificate allows communication with, and impersonation of, any device of the same version. | |
References |
|
18 Dec 2023, 14:51
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:siemens:6ag1052-1fb08-7ba1:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:6ed1052-2md08-0ba1:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:6ed1052-1md08-0ba1_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:6ed1052-2hb08-0ba1:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:6ed1052-1cc08-0ba1:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:6ag1052-2hb08-7ba1:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:6ag1052-2cc08-7ba1_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:6ed1052-1hb08-0ba1:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:6ed1052-1md08-0ba1:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:6ag1052-2hb08-7ba1_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:6ed1052-2fb08-0ba1:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:6ag1052-2cc08-7ba1:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:6ag1052-1md08-7ba1_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:6ag1052-2md08-7ba1_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:6ed1052-2fb08-0ba1_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:6ag1052-1hb08-7ba1:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:6ed1052-2md08-0ba1_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:6ag1052-1cc08-7ba1:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:6ag1052-2fb08-7ba1_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:6ag1052-1fb08-7ba1_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:6ed1052-1cc08-0ba1_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:6ed1052-1hb08-0ba1_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:6ed1052-2cc08-0ba1_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:6ed1052-1fb08-0ba1_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:6ed1052-2hb08-0ba1_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:6ag1052-2md08-7ba1:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:6ag1052-2fb08-7ba1:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:6ed1052-1fb08-0ba1:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:6ag1052-1cc08-7ba1_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:6ag1052-1hb08-7ba1_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:6ag1052-1md08-7ba1:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:6ed1052-2cc08-0ba1:-:*:*:*:*:*:*:* |
|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-844582.pdf - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.8 |
CWE | NVD-CWE-Other |
12 Dec 2023, 12:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A vulnerability has been identified in LOGO! 12/24RCE (All versions >= V8.3), LOGO! 12/24RCEo (All versions >= V8.3), LOGO! 230RCE (All versions >= V8.3), LOGO! 230RCEo (All versions >= V8.3), LOGO! 24CE (All versions >= V8.3), LOGO! 24CEo (All versions >= V8.3), LOGO! 24RCE (All versions >= V8.3), LOGO! 24RCEo (All versions >= V8.3), SIPLUS LOGO! 12/24RCE (All versions >= V8.3), SIPLUS LOGO! 12/24RCEo (All versions >= V8.3), SIPLUS LOGO! 230RCE (All versions >= V8.3), SIPLUS LOGO! 230RCEo (All versions >= V8.3), SIPLUS LOGO! 24CE (All versions >= V8.3), SIPLUS LOGO! 24CEo (All versions >= V8.3), SIPLUS LOGO! 24RCE (All versions >= V8.3), SIPLUS LOGO! 24RCEo (All versions >= V8.3). Affected devices are vulnerable to an electromagnetic fault injection. This could allow an attacker to dump and debug the firmware, including the manipulation of memory. Further actions could allow to inject public keys of custom created key pairs which are then signed by the product CA. The generation of a custom certificate allows communication with, and impersonation of, any device of the same version. |
12 Dec 2023, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-12 10:15
Updated : 2024-11-21 07:25
NVD link : CVE-2022-42784
Mitre link : CVE-2022-42784
CVE.ORG link : CVE-2022-42784
JSON object : View
Products Affected
siemens
- 6ag1052-1fb08-7ba1
- 6ed1052-2fb08-0ba1_firmware
- 6ag1052-2fb08-7ba1
- 6ag1052-1md08-7ba1_firmware
- 6ag1052-2fb08-7ba1_firmware
- 6ag1052-2md08-7ba1
- 6ag1052-1hb08-7ba1
- 6ag1052-2hb08-7ba1_firmware
- 6ed1052-1md08-0ba1
- 6ed1052-2hb08-0ba1
- 6ed1052-2cc08-0ba1
- 6ed1052-2md08-0ba1_firmware
- 6ed1052-2cc08-0ba1_firmware
- 6ed1052-1cc08-0ba1_firmware
- 6ag1052-2cc08-7ba1_firmware
- 6ed1052-1fb08-0ba1_firmware
- 6ag1052-1cc08-7ba1
- 6ed1052-1cc08-0ba1
- 6ed1052-2hb08-0ba1_firmware
- 6ag1052-1md08-7ba1
- 6ed1052-2md08-0ba1
- 6ed1052-1hb08-0ba1_firmware
- 6ag1052-1cc08-7ba1_firmware
- 6ag1052-2cc08-7ba1
- 6ag1052-2hb08-7ba1
- 6ag1052-1fb08-7ba1_firmware
- 6ed1052-1hb08-0ba1
- 6ed1052-1fb08-0ba1
- 6ed1052-1md08-0ba1_firmware
- 6ag1052-2md08-7ba1_firmware
- 6ag1052-1hb08-7ba1_firmware
- 6ed1052-2fb08-0ba1
CWE