cve/2022/CVE-2022-36363.md

33 lines
2.7 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-36363](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36363)
![](https://img.shields.io/static/v1?label=Product&message=LOGO!%2012%2F24RCE&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=LOGO!%2012%2F24RCEo&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=LOGO!%20230RCE&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=LOGO!%20230RCEo&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=LOGO!%2024CE&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=LOGO!%2024CEo&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=LOGO!%2024RCE&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=LOGO!%2024RCEo&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIPLUS%20LOGO!%2012%2F24RCE&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIPLUS%20LOGO!%2012%2F24RCEo&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIPLUS%20LOGO!%20230RCE&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIPLUS%20LOGO!%20230RCEo&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIPLUS%20LOGO!%2024CE&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIPLUS%20LOGO!%2024CEo&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIPLUS%20LOGO!%2024RCE&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIPLUS%20LOGO!%2024RCEo&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20All%20versions%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1285%3A%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input&color=brighgreen)
### Description
A vulnerability has been identified in LOGO! 12/24RCE (All versions), LOGO! 12/24RCEo (All versions), LOGO! 230RCE (All versions), LOGO! 230RCEo (All versions), LOGO! 24CE (All versions), LOGO! 24CEo (All versions), LOGO! 24RCE (All versions), LOGO! 24RCEo (All versions), SIPLUS LOGO! 12/24RCE (All versions), SIPLUS LOGO! 12/24RCEo (All versions), SIPLUS LOGO! 230RCE (All versions), SIPLUS LOGO! 230RCEo (All versions), SIPLUS LOGO! 24CE (All versions), SIPLUS LOGO! 24CEo (All versions), SIPLUS LOGO! 24RCE (All versions), SIPLUS LOGO! 24RCEo (All versions). Affected devices do not properly validate an offset value which can be defined in TCP packets when calling a method. This could allow an attacker to retrieve parts of the content of the memory.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds