{"uuid": "e90ddb37-924b-4352-b35c-fc6ec9e882f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34821", "type": "seen", "source": "https://t.me/cibsecurity/45981", "content": "\u203c CVE-2022-34821 \u203c\n\nA vulnerability has been identified in SIMATIC CP 1242-7 V2 (All versions), SIMATIC CP 1243-1 (All versions), SIMATIC CP 1243-7 LTE EU (All versions), SIMATIC CP 1243-7 LTE US (All versions), SIMATIC CP 1243-8 IRC (All versions), SIMATIC CP 1542SP-1 IRC (All versions &gt;= V2.0), SIMATIC CP 1543-1 (All versions &lt; V3.0.22), SIMATIC CP 1543SP-1 (All versions &gt;= V2.0), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (All versions &gt;= V2.0), SIPLUS ET 200SP CP 1543SP-1 ISEC (All versions &gt;= V2.0), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (All versions &gt;= V2.0), SIPLUS NET CP 1242-7 V2 (All versions), SIPLUS NET CP 1543-1 (All versions &lt; V3.0.22), SIPLUS S7-1200 CP 1243-1 (All versions), SIPLUS S7-1200 CP 1243-1 RAIL (All versions). By injecting code to specific configuration options for OpenVPN, an attacker could execute arbitrary code with elevated privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-12T14:26:03.000000Z"}