ID

VAR-202210-0467


CVE

CVE-2022-40227


TITLE

Input validation vulnerability in multiple Siemens products

Trust: 0.8

sources: JVNDB: JVNDB-2022-018713

DESCRIPTION

A vulnerability has been identified in SIMATIC HMI Comfort Panels (incl. SIPLUS variants) (All versions < V17 Update 4), SIMATIC HMI KTP Mobile Panels (All versions < V17 Update 4), SIMATIC HMI KTP1200 Basic (All versions < V17 Update 5), SIMATIC HMI KTP400 Basic (All versions < V17 Update 5), SIMATIC HMI KTP700 Basic (All versions < V17 Update 5), SIMATIC HMI KTP900 Basic (All versions < V17 Update 5), SIPLUS HMI KTP1200 BASIC (All versions < V17 Update 5), SIPLUS HMI KTP400 BASIC (All versions < V17 Update 5), SIPLUS HMI KTP700 BASIC (All versions < V17 Update 5), SIPLUS HMI KTP900 BASIC (All versions < V17 Update 5). Affected devices do not properly validate input sent to certain services over TCP. This could allow an unauthenticated remote attacker to cause a permanent denial of service condition (requiring a device reboot) by sending specially crafted TCP packets. simatic hmi comfort panels firmware, simatic hmi ktp400 basic firmware, simatic hmi ktp700 basic Multiple Siemens products, including firmware, contain vulnerabilities related to input validation.Service operation interruption (DoS) It may be in a state. Siemens SIMATIC HMI Comfort Panels is a touch panel device from Siemens, Germany. Several Siemens products have an input validation error vulnerability

Trust: 2.16

sources: NVD: CVE-2022-40227 // JVNDB: JVNDB-2022-018713 // CNVD: CNVD-2022-91619

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2022-91619

AFFECTED PRODUCTS

vendor:siemensmodel:simatic hmi ktp mobile panelsscope:eqversion:17.0

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp900 basicscope:eqversion:17.0

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp400 basicscope:ltversion:17.0

Trust: 1.0

vendor:siemensmodel:siplus hmi ktp700 basicscope:ltversion:17.0

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort panelsscope:eqversion:17.0

Trust: 1.0

vendor:siemensmodel:siplus hmi ktp1200 basicscope:eqversion:17.0

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp700 basicscope:ltversion:17.0

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp400 basicscope:eqversion:17.0

Trust: 1.0

vendor:siemensmodel:siplus hmi ktp700 basicscope:eqversion:17.0

Trust: 1.0

vendor:siemensmodel:simatic hmi comfort panelsscope:ltversion:17.0

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp700 basicscope:eqversion:17.0

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp1200 basicscope:ltversion:17.0

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp mobile panelsscope:ltversion:17.0

Trust: 1.0

vendor:siemensmodel:siplus hmi ktp1200 basicscope:ltversion:17.0

Trust: 1.0

vendor:siemensmodel:siplus hmi ktp400 basicscope:eqversion:17.0

Trust: 1.0

vendor:siemensmodel:siplus hmi ktp900 basicscope:ltversion:17.0

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp1200 basicscope:eqversion:17.0

Trust: 1.0

vendor:siemensmodel:siplus hmi ktp400 basicscope:ltversion:17.0

Trust: 1.0

vendor:siemensmodel:siplus hmi ktp900 basicscope:eqversion:17.0

Trust: 1.0

vendor:siemensmodel:simatic hmi ktp900 basicscope:ltversion:17.0

Trust: 1.0

vendor:シーメンスmodel:simatic hmi ktp1200 basicscope: - version: -

Trust: 0.8

vendor:シーメンスmodel:simatic hmi ktp900 basicscope: - version: -

Trust: 0.8

vendor:シーメンスmodel:simatic hmi comfort panelsscope: - version: -

Trust: 0.8

vendor:シーメンスmodel:siplus hmi ktp400 basicscope: - version: -

Trust: 0.8

vendor:シーメンスmodel:siplus hmi ktp700 basicscope: - version: -

Trust: 0.8

vendor:シーメンスmodel:simatic hmi ktp mobile panelsscope: - version: -

Trust: 0.8

vendor:シーメンスmodel:siplus hmi ktp1200 basicscope: - version: -

Trust: 0.8

vendor:シーメンスmodel:siplus hmi ktp900 basicscope: - version: -

Trust: 0.8

vendor:シーメンスmodel:simatic hmi ktp700 basicscope: - version: -

Trust: 0.8

vendor:シーメンスmodel:simatic hmi ktp400 basicscope: - version: -

Trust: 0.8

vendor:siemensmodel:simatic hmi comfort panels updatescope:eqversion:v174

Trust: 0.6

vendor:siemensmodel:simatic hmi ktp mobile panels updatescope:ltversion:v174

Trust: 0.6

vendor:siemensmodel:simatic hmi ktp1200 basic updatescope:ltversion:v175

Trust: 0.6

vendor:siemensmodel:simatic hmi ktp400 basic updatescope:ltversion:v175

Trust: 0.6

vendor:siemensmodel:simatic hmi ktp700 basic updatescope:ltversion:v175

Trust: 0.6

vendor:siemensmodel:simatic hmi ktp900 basic updatescope:ltversion:v175

Trust: 0.6

vendor:siemensmodel:siplus hmi ktp1200 basic updatescope:ltversion:v175

Trust: 0.6

vendor:siemensmodel:siplus hmi ktp400 basic updatescope:ltversion:v175

Trust: 0.6

vendor:siemensmodel:siplus hmi ktp700 basic updatescope:ltversion:v175

Trust: 0.6

vendor:siemensmodel:siplus hmi ktp900 basic updatescope:ltversion:v175

Trust: 0.6

sources: CNVD: CNVD-2022-91619 // JVNDB: JVNDB-2022-018713 // NVD: CVE-2022-40227

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-40227
value: HIGH

Trust: 1.0

NVD: CVE-2022-40227
value: HIGH

Trust: 0.8

CNVD: CNVD-2022-91619
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202210-446
value: HIGH

Trust: 0.6

CNVD: CNVD-2022-91619
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2022-40227
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2022-40227
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2022-91619 // JVNDB: JVNDB-2022-018713 // CNNVD: CNNVD-202210-446 // NVD: CVE-2022-40227

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.0

problemtype:Inappropriate input confirmation (CWE-20) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-018713 // NVD: CVE-2022-40227

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202210-446

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202210-446

PATCH

title:Patch for Various Siemens products input validation error vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/384516

Trust: 0.6

title:Siemens SIMATIC HMI Comfort Panels Enter the fix for the verification error vulnerabilityurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=210554

Trust: 0.6

sources: CNVD: CNVD-2022-91619 // CNNVD: CNNVD-202210-446

EXTERNAL IDS

db:NVDid:CVE-2022-40227

Trust: 3.8

db:SIEMENSid:SSA-384224

Trust: 3.0

db:ICS CERTid:ICSA-22-286-14

Trust: 1.4

db:JVNid:JVNVU92214181

Trust: 0.8

db:JVNDBid:JVNDB-2022-018713

Trust: 0.8

db:CNVDid:CNVD-2022-91619

Trust: 0.6

db:CNNVDid:CNNVD-202210-446

Trust: 0.6

sources: CNVD: CNVD-2022-91619 // JVNDB: JVNDB-2022-018713 // CNNVD: CNNVD-202210-446 // NVD: CVE-2022-40227

REFERENCES

url:https://cert-portal.siemens.com/productcert/pdf/ssa-384224.pdf

Trust: 3.0

url:https://jvn.jp/vu/jvnvu92214181/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-40227

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-14

Trust: 0.8

url:https://us-cert.cisa.gov/ics/advisories/icsa-22-286-14

Trust: 0.6

url:https://vigilance.fr/vulnerability/simatic-hmi-denial-of-service-via-tcp-packets-39514

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-40227/

Trust: 0.6

sources: CNVD: CNVD-2022-91619 // JVNDB: JVNDB-2022-018713 // CNNVD: CNNVD-202210-446 // NVD: CVE-2022-40227

CREDITS

Siemens reported this vulnerability to CISA.

Trust: 0.6

sources: CNNVD: CNNVD-202210-446

SOURCES

db:CNVDid:CNVD-2022-91619
db:JVNDBid:JVNDB-2022-018713
db:CNNVDid:CNNVD-202210-446
db:NVDid:CVE-2022-40227

LAST UPDATE DATE

2024-08-14T12:18:52.673000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2022-91619date:2022-12-29T00:00:00
db:JVNDBid:JVNDB-2022-018713date:2023-10-23T02:35:00
db:CNNVDid:CNNVD-202210-446date:2022-10-17T00:00:00
db:NVDid:CVE-2022-40227date:2022-10-14T17:07:23.703

SOURCES RELEASE DATE

db:CNVDid:CNVD-2022-91619date:2022-12-18T00:00:00
db:JVNDBid:JVNDB-2022-018713date:2023-10-23T00:00:00
db:CNNVDid:CNNVD-202210-446date:2022-10-11T00:00:00
db:NVDid:CVE-2022-40227date:2022-10-11T11:15:10.940