{"id":"CVE-2021-31889","details":"A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions \u003c V2303), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions \u003c V0.5.0.0). Malformed TCP packets with a corrupted SACK option leads to Information Leaks and Denial-of-Service conditions. (FSMD-2021-0015)","aliases":["A-207646334","A-207646335","A-207646336","ASB-A-207646334","ASB-A-207646335","ASB-A-207646336","CVE-2021-31346","CVE-2021-31890","M-MOLY00756840"],"modified":"2026-03-15T22:40:37.686308Z","published":"2021-11-09T12:15:09.693Z","references":[{"type":"WEB","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-845392.pdf"},{"type":"WEB","url":"https://cert-portal.siemens.com/productcert/html/ssa-044112.html"},{"type":"WEB","url":"https://cert-portal.siemens.com/productcert/html/ssa-114589.html"},{"type":"WEB","url":"https://cert-portal.siemens.com/productcert/html/ssa-620288.html"},{"type":"WEB","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf"},{"type":"WEB","url":"https://cert-portal.siemens.com/productcert/html/ssa-223353.html"},{"type":"WEB","url":"https://cert-portal.siemens.com/productcert/html/ssa-845392.html"},{"type":"WEB","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-223353.pdf"},{"type":"ADVISORY","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf"},{"type":"ADVISORY","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"2017.02.3"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-31889.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}]}