A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), SIMOTICS CONNECT 400 (All versions < V1.0.0.0). The total length of an TCP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on the network buffer organization in memory. (FSMD-2021-0017)
https://www.tenable.com/cyber-exposure/2021-threat-landscape-retrospective
https://www.tenable.com/blog/nucleus13-13-vulnerabilities-found-in-siemens-nucleus-tcpip-stack
https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-223353.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf
https://cert-portal.siemens.com/productcert/html/ssa-845392.html
https://cert-portal.siemens.com/productcert/html/ssa-620288.html
https://cert-portal.siemens.com/productcert/html/ssa-223353.html
https://cert-portal.siemens.com/productcert/html/ssa-114589.html
https://cert-portal.siemens.com/productcert/html/ssa-044112.html