支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2022-31766 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V7.1.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V7.1.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V7.1.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V7.1.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V7.1.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V7.1.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V7.1.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V7.1.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V7.1.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V7.1.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V7.1.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V7.1.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V7.1.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V7.1.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V7.1.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V7.1.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V7.1.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V7.1.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V7.1.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V7.1.2), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions >= V1.1.0 < V3.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (All versions >= V1.1.0 < V3.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions >= V1.1.0 < V3.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (All versions >= V1.1.0 < V3.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions >= V1.1.0 < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions >= V1.1.0 < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions >= V1.1.0 < V3.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (All versions >= V1.1.0 < V3.0.0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) (All versions >= V1.1.0 < V3.0.0). Affected devices with TCP Event service enabled do not properly handle malformed packets. This could allow an unauthenticated remote attacker to cause a denial of service condition and reboot the device thus possibly affecting other network resources.
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
输入验证不恰当
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Siemens RUGGEDCOM RM1224 输入验证错误漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Siemens RUGGEDCOM RM1224是德国西门子(Siemens)公司的一个无线路由器。提供往返远程位置的数据通信,可提供4G LTE连接并自动回退到3G UMTS或EVDO蜂窝网络。 Siemens RUGGEDCOM RM1224 产品存在输入验证错误漏洞,该漏洞源于无法正确处理格式错误的数据包。以下产品及版本受到影响:RUGGEDCOM RM1224 LTE(4G)EU V7.1.2 之前版本、RUGGEDMOM RM1224LTE(2G)NAM V7.1.2之前版本、SCALANCE
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
SiemensRUGGEDCOM RM1224 LTE(4G) EU 0 ~ V7.1.2 -
SiemensRUGGEDCOM RM1224 LTE(4G) NAM 0 ~ V7.1.2 -
SiemensSCALANCE M804PB 0 ~ V7.1.2 -
SiemensSCALANCE M812-1 ADSL-Router 0 ~ V7.1.2 -
SiemensSCALANCE M812-1 ADSL-Router 0 ~ V7.1.2 -
SiemensSCALANCE M816-1 ADSL-Router 0 ~ V7.1.2 -
SiemensSCALANCE M816-1 ADSL-Router 0 ~ V7.1.2 -
SiemensSCALANCE M826-2 SHDSL-Router 0 ~ V7.1.2 -
SiemensSCALANCE M874-2 0 ~ V7.1.2 -
SiemensSCALANCE M874-3 0 ~ V7.1.2 -
SiemensSCALANCE M876-3 0 ~ V7.1.2 -
SiemensSCALANCE M876-3 (ROK) 0 ~ V7.1.2 -
SiemensSCALANCE M876-4 0 ~ V7.1.2 -
SiemensSCALANCE M876-4 (EU) 0 ~ V7.1.2 -
SiemensSCALANCE M876-4 (NAM) 0 ~ V7.1.2 -
SiemensSCALANCE MUM853-1 (EU) 0 ~ V7.1.2 -
SiemensSCALANCE MUM856-1 (EU) 0 ~ V7.1.2 -
SiemensSCALANCE MUM856-1 (RoW) 0 ~ V7.1.2 -
SiemensSCALANCE S615 EEC LAN-Router 0 ~ V7.1.2 -
SiemensSCALANCE S615 LAN-Router 0 ~ V7.1.2 -
SiemensSCALANCE WAM763-1 V1.1.0 ~ V3.0.0 -
SiemensSCALANCE WAM766-1 V1.1.0 ~ V3.0.0 -
SiemensSCALANCE WAM766-1 (US) V1.1.0 ~ V3.0.0 -
SiemensSCALANCE WAM766-1 EEC V1.1.0 ~ V3.0.0 -
SiemensSCALANCE WAM766-1 EEC (US) V1.1.0 ~ V3.0.0 -
SiemensSCALANCE WUM763-1 V1.1.0 ~ V3.0.0 -
SiemensSCALANCE WUM763-1 V1.1.0 ~ V3.0.0 -
SiemensSCALANCE WUM766-1 V1.1.0 ~ V3.0.0 -
SiemensSCALANCE WUM766-1 (USA) V1.1.0 ~ V3.0.0 -
二、漏洞 CVE-2022-31766 的公开POC
#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2022-31766 的情报信息
Please 登录 to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2022-31766

暂无评论


发表评论