All the vulnerabilites related to Siemens - SCALANCE M874-2
var-202210-0430
Vulnerability from variot
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (All versions < V7.1.2), RUGGEDCOM RM1224 LTE(4G) NAM (All versions < V7.1.2), SCALANCE M804PB (All versions < V7.1.2), SCALANCE M812-1 ADSL-Router (Annex A) (All versions < V7.1.2), SCALANCE M812-1 ADSL-Router (Annex B) (All versions < V7.1.2), SCALANCE M816-1 ADSL-Router (Annex A) (All versions < V7.1.2), SCALANCE M816-1 ADSL-Router (Annex B) (All versions < V7.1.2), SCALANCE M826-2 SHDSL-Router (All versions < V7.1.2), SCALANCE M874-2 (All versions < V7.1.2), SCALANCE M874-3 (All versions < V7.1.2), SCALANCE M876-3 (EVDO) (All versions < V7.1.2), SCALANCE M876-3 (ROK) (All versions < V7.1.2), SCALANCE M876-4 (All versions < V7.1.2), SCALANCE M876-4 (EU) (All versions < V7.1.2), SCALANCE M876-4 (NAM) (All versions < V7.1.2), SCALANCE MUM853-1 (EU) (All versions < V7.1.2), SCALANCE MUM856-1 (EU) (All versions < V7.1.2), SCALANCE MUM856-1 (RoW) (All versions < V7.1.2), SCALANCE S615 (All versions < V7.1.2), SCALANCE S615 EEC (All versions < V7.1.2), SCALANCE WAM763-1 (All versions >= V1.1.0 < V2.0), SCALANCE WAM766-1 (EU) (All versions >= V1.1.0 < V2.0), SCALANCE WAM766-1 (US) (All versions >= V1.1.0 < V2.0), SCALANCE WAM766-1 EEC (EU) (All versions >= V1.1.0 < V2.0), SCALANCE WAM766-1 EEC (US) (All versions >= V1.1.0 < V2.0), SCALANCE WUM763-1 (All versions >= V1.1.0 < V2.0), SCALANCE WUM763-1 (All versions >= V1.1.0 < V2.0), SCALANCE WUM766-1 (EU) (All versions >= V1.1.0 < V2.0), SCALANCE WUM766-1 (US) (All versions >= V1.1.0 < V2.0). Affected devices with TCP Event service enabled do not properly handle malformed packets. This could allow an unauthenticated remote attacker to cause a denial of service condition and reboot the device thus possibly affecting other network resources.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0430", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance m874-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.1.2" }, { "model": "ruggedcom rm1224", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.1.2" }, { "model": "scalance wam766-1", "scope": "gte", "trust": 1.0, "vendor": "siemens", "version": "1.1.0" }, { "model": "scalance m804pb", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.1.2" }, { "model": "scalance mum856-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.1.2" }, { "model": "scalance wum763-1", "scope": "gte", "trust": 1.0, "vendor": "siemens", "version": "1.1.0" }, { "model": "scalance m874-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.1.2" }, { "model": "scalance m876-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.1.2" }, { "model": "scalance mum853-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.1.2" }, { "model": "scalance m826-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.1.2" }, { "model": "scalance m812-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.1.2" }, { "model": "scalance wam763-1", "scope": "gte", "trust": 1.0, "vendor": "siemens", "version": "1.1.0" }, { "model": "scalance s615", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.1.2" }, { "model": "scalance wum766-1", "scope": "gte", "trust": 1.0, "vendor": "siemens", "version": "1.1.0" }, { "model": "scalance m816-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.1.2" }, { "model": "scalance m876-4", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.1.2" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31766" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Martin Grubhofer and Michael Messner of Siemens Energy reported this vulnerability to Siemens.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-395" } ], "trust": 0.6 }, "cve": "CVE-2022-31766", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "productcert@siemens.com", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-31766", "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "productcert@siemens.com", "id": "CVE-2022-31766", "trust": 1.0, "value": "HIGH" }, { "author": "nvd@nist.gov", "id": "CVE-2022-31766", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-395", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-395" }, { "db": "NVD", "id": "CVE-2022-31766" }, { "db": "NVD", "id": "CVE-2022-31766" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (All versions \u003c V7.1.2), RUGGEDCOM RM1224 LTE(4G) NAM (All versions \u003c V7.1.2), SCALANCE M804PB (All versions \u003c V7.1.2), SCALANCE M812-1 ADSL-Router (Annex A) (All versions \u003c V7.1.2), SCALANCE M812-1 ADSL-Router (Annex B) (All versions \u003c V7.1.2), SCALANCE M816-1 ADSL-Router (Annex A) (All versions \u003c V7.1.2), SCALANCE M816-1 ADSL-Router (Annex B) (All versions \u003c V7.1.2), SCALANCE M826-2 SHDSL-Router (All versions \u003c V7.1.2), SCALANCE M874-2 (All versions \u003c V7.1.2), SCALANCE M874-3 (All versions \u003c V7.1.2), SCALANCE M876-3 (EVDO) (All versions \u003c V7.1.2), SCALANCE M876-3 (ROK) (All versions \u003c V7.1.2), SCALANCE M876-4 (All versions \u003c V7.1.2), SCALANCE M876-4 (EU) (All versions \u003c V7.1.2), SCALANCE M876-4 (NAM) (All versions \u003c V7.1.2), SCALANCE MUM853-1 (EU) (All versions \u003c V7.1.2), SCALANCE MUM856-1 (EU) (All versions \u003c V7.1.2), SCALANCE MUM856-1 (RoW) (All versions \u003c V7.1.2), SCALANCE S615 (All versions \u003c V7.1.2), SCALANCE S615 EEC (All versions \u003c V7.1.2), SCALANCE WAM763-1 (All versions \u003e= V1.1.0 \u003c V2.0), SCALANCE WAM766-1 (EU) (All versions \u003e= V1.1.0 \u003c V2.0), SCALANCE WAM766-1 (US) (All versions \u003e= V1.1.0 \u003c V2.0), SCALANCE WAM766-1 EEC (EU) (All versions \u003e= V1.1.0 \u003c V2.0), SCALANCE WAM766-1 EEC (US) (All versions \u003e= V1.1.0 \u003c V2.0), SCALANCE WUM763-1 (All versions \u003e= V1.1.0 \u003c V2.0), SCALANCE WUM763-1 (All versions \u003e= V1.1.0 \u003c V2.0), SCALANCE WUM766-1 (EU) (All versions \u003e= V1.1.0 \u003c V2.0), SCALANCE WUM766-1 (US) (All versions \u003e= V1.1.0 \u003c V2.0). Affected devices with TCP Event service enabled do not properly handle malformed packets.\r\nThis could allow an unauthenticated remote attacker to cause a denial of service condition and reboot the device thus possibly affecting other network resources.", "sources": [ { "db": "NVD", "id": "CVE-2022-31766" } ], "trust": 1.0 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31766", "trust": 1.6 }, { "db": "SIEMENS", "id": "SSA-697140", "trust": 1.6 }, { "db": "ICS CERT", "id": "ICSA-22-286-08", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.5100", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202210-395", "trust": 0.6 } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-395" }, { "db": "NVD", "id": "CVE-2022-31766" } ] }, "id": "VAR-202210-0430", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.39285713 }, "last_update_date": "2024-08-14T13:42:20.454000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Siemens RUGGEDCOM RM1224 Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=210522" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-395" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31766" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-697140.pdf" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-286-08" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.5100" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/ruggedcom-rm1224-denial-of-service-via-tcp-event-service-39512" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31766/" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-395" }, { "db": "NVD", "id": "CVE-2022-31766" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNNVD", "id": "CNNVD-202210-395" }, { "db": "NVD", "id": "CVE-2022-31766" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-395" }, { "date": "2022-10-11T11:15:09.810000", "db": "NVD", "id": "CVE-2022-31766" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-03-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-395" }, { "date": "2023-11-07T03:47:41.190000", "db": "NVD", "id": "CVE-2022-31766" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-395" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens RUGGEDCOM RM1224 Input validation error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-395" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-395" } ], "trust": 0.6 } }
var-202411-0490
Vulnerability from variot
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2). Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. ruggedcom rm1224 lte(4g) eu firmware, ruggedcom rm1224 lte(4g) nam firmware, scalance m804pb Multiple Siemens products such as firmware contain a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SCALANCE M-800, MUM-800 and S615 as well as RUGGEDCOM RM1224 are industrial routers
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202411-0490", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance mum856-1 \\", "scope": "lt", "trust": 5.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance mum853-1 \\", "scope": "lt", "trust": 3.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m876-4", "scope": null, "trust": 2.4, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance mum853-1", "scope": null, "trust": 2.4, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m812-1 \\", "scope": "lt", "trust": 2.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m816-1 \\", "scope": "lt", "trust": 2.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m876-4 \\", "scope": "lt", "trust": 2.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m874-3", "scope": null, "trust": 1.6, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m812-1", "scope": null, "trust": 1.6, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m816-1", "scope": null, "trust": 1.6, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m876-3", "scope": null, "trust": 1.6, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m876-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m804pb", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance s615", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m876-3 \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m826-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "ruggedcom rm1224 lte\\ nam", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance s615 eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m874-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m874-3 \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "ruggedcom rm1224 lte\\ eu", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m874-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m876-4", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance mum856-1", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m874-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224 lte nam", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224 lte eu", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m804pb", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m826-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m-800 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "8.2" }, { "model": "scalance s615 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "8.2" }, { "model": "ruggedcom rm1224 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "8.2" }, { "model": "scalance mum-800 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "8.2" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-44935" }, { "db": "JVNDB", "id": "JVNDB-2024-012573" }, { "db": "NVD", "id": "CVE-2024-50572" } ] }, "cve": "CVE-2024-50572", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CNVD-2024-44935", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "productcert@siemens.com", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "id": "CVE-2024-50572", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "OTHER", "availabilityImpact": "High", "baseScore": 7.2, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2024-012573", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "productcert@siemens.com", "id": "CVE-2024-50572", "trust": 1.0, "value": "High" }, { "author": "OTHER", "id": "JVNDB-2024-012573", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2024-44935", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-44935" }, { "db": "JVNDB", "id": "JVNDB-2024-012573" }, { "db": "NVD", "id": "CVE-2024-50572" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions \u003c V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions \u003c V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions \u003c V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions \u003c V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions \u003c V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions \u003c V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions \u003c V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions \u003c V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions \u003c V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions \u003c V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions \u003c V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions \u003c V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions \u003c V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions \u003c V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions \u003c V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions \u003c V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions \u003c V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions \u003c V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions \u003c V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions \u003c V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions \u003c V8.2). Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. ruggedcom rm1224 lte(4g) eu firmware, ruggedcom rm1224 lte(4g) nam firmware, scalance m804pb Multiple Siemens products such as firmware contain a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SCALANCE M-800, MUM-800 and S615 as well as RUGGEDCOM RM1224 are industrial routers", "sources": [ { "db": "NVD", "id": "CVE-2024-50572" }, { "db": "JVNDB", "id": "JVNDB-2024-012573" }, { "db": "CNVD", "id": "CNVD-2024-44935" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2024-50572", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-354112", "trust": 2.4 }, { "db": "ICS CERT", "id": "ICSA-24-319-06", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU96191615", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2024-012573", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2024-44935", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-44935" }, { "db": "JVNDB", "id": "JVNDB-2024-012573" }, { "db": "NVD", "id": "CVE-2024-50572" } ] }, "id": "VAR-202411-0490", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2024-44935" } ], "trust": 1.23674089 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-44935" } ] }, "last_update_date": "2024-11-20T20:49:46.227000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Multiple Siemens products injection vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/617336" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-44935" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-77", "trust": 1.0 }, { "problemtype": "CWE-74", "trust": 1.0 }, { "problemtype": "injection (CWE-74) [ others ]", "trust": 0.8 }, { "problemtype": " Command injection (CWE-77) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-012573" }, { "db": "NVD", "id": "CVE-2024-50572" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://cert-portal.siemens.com/productcert/html/ssa-354112.html" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu96191615/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2024-50572" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-319-06" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-44935" }, { "db": "JVNDB", "id": "JVNDB-2024-012573" }, { "db": "NVD", "id": "CVE-2024-50572" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2024-44935" }, { "db": "JVNDB", "id": "JVNDB-2024-012573" }, { "db": "NVD", "id": "CVE-2024-50572" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-11-14T00:00:00", "db": "CNVD", "id": "CNVD-2024-44935" }, { "date": "2024-11-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2024-012573" }, { "date": "2024-11-12T13:15:13.503000", "db": "NVD", "id": "CVE-2024-50572" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-11-14T00:00:00", "db": "CNVD", "id": "CNVD-2024-44935" }, { "date": "2024-11-19T06:00:00", "db": "JVNDB", "id": "JVNDB-2024-012573" }, { "date": "2024-11-13T19:59:16.777000", "db": "NVD", "id": "CVE-2024-50572" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Command injection vulnerability in multiple Siemens products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-012573" } ], "trust": 0.8 } }
var-202411-0489
Vulnerability from variot
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2). Affected devices do not properly sanitize the filenames before uploading. This could allow an authenticated remote attacker to compromise of integrity of the system. ruggedcom rm1224 lte(4g) eu firmware, ruggedcom rm1224 lte(4g) nam firmware, scalance m804pb Multiple Siemens products such as firmware contain a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. SCALANCE M-800, MUM-800 and S615 as well as RUGGEDCOM RM1224 are industrial routers.
A cross-site scripting vulnerability exists in several Siemens products, which can be exploited by attackers to compromise the integrity of the system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202411-0489", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance mum856-1 \\", "scope": "lt", "trust": 5.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance mum853-1 \\", "scope": "lt", "trust": 3.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m876-4", "scope": null, "trust": 2.4, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance mum853-1", "scope": null, "trust": 2.4, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m812-1 \\", "scope": "lt", "trust": 2.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m816-1 \\", "scope": "lt", "trust": 2.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m876-4 \\", "scope": "lt", "trust": 2.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m874-3", "scope": null, "trust": 1.6, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m812-1", "scope": null, "trust": 1.6, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m816-1", "scope": null, "trust": 1.6, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m876-3", "scope": null, "trust": 1.6, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m876-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m804pb", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance s615", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m876-3 \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m826-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "ruggedcom rm1224 lte\\ nam", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance s615 eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m874-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m874-3 \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "ruggedcom rm1224 lte\\ eu", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m874-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m876-4", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance mum856-1", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m874-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224 lte nam", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224 lte eu", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m804pb", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m826-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m-800 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "8.2" }, { "model": "scalance s615 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "8.2" }, { "model": "ruggedcom rm1224 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "8.2" }, { "model": "scalance mum-800 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "8.2" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-44936" }, { "db": "JVNDB", "id": "JVNDB-2024-012536" }, { "db": "NVD", "id": "CVE-2024-50561" } ] }, "cve": "CVE-2024-50561", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2024-44936", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "id": "CVE-2024-50561", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "productcert@siemens.com", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2024-50561", "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.1, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2024-50561", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2024-50561", "trust": 1.0, "value": "MEDIUM" }, { "author": "productcert@siemens.com", "id": "CVE-2024-50561", "trust": 1.0, "value": "Medium" }, { "author": "NVD", "id": "CVE-2024-50561", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2024-44936", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-44936" }, { "db": "JVNDB", "id": "JVNDB-2024-012536" }, { "db": "NVD", "id": "CVE-2024-50561" }, { "db": "NVD", "id": "CVE-2024-50561" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions \u003c V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions \u003c V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions \u003c V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions \u003c V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions \u003c V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions \u003c V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions \u003c V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions \u003c V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions \u003c V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions \u003c V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions \u003c V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions \u003c V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions \u003c V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions \u003c V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions \u003c V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions \u003c V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions \u003c V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions \u003c V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions \u003c V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions \u003c V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions \u003c V8.2). Affected devices do not properly sanitize the filenames before uploading. This could allow an authenticated remote attacker to compromise of integrity of the system. ruggedcom rm1224 lte(4g) eu firmware, ruggedcom rm1224 lte(4g) nam firmware, scalance m804pb Multiple Siemens products such as firmware contain a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. SCALANCE M-800, MUM-800 and S615 as well as RUGGEDCOM RM1224 are industrial routers. \n\nA cross-site scripting vulnerability exists in several Siemens products, which can be exploited by attackers to compromise the integrity of the system", "sources": [ { "db": "NVD", "id": "CVE-2024-50561" }, { "db": "JVNDB", "id": "JVNDB-2024-012536" }, { "db": "CNVD", "id": "CNVD-2024-44936" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2024-50561", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-354112", "trust": 2.4 }, { "db": "ICS CERT", "id": "ICSA-24-319-06", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU96191615", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2024-012536", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2024-44936", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-44936" }, { "db": "JVNDB", "id": "JVNDB-2024-012536" }, { "db": "NVD", "id": "CVE-2024-50561" } ] }, "id": "VAR-202411-0489", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2024-44936" } ], "trust": 1.23674089 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-44936" } ] }, "last_update_date": "2024-11-20T21:59:49.636000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Cross-site scripting vulnerability in multiple Siemens products (CNVD-2024-44936)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/617341" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-44936" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.0 }, { "problemtype": "Cross-site scripting (CWE-79) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-012536" }, { "db": "NVD", "id": "CVE-2024-50561" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://cert-portal.siemens.com/productcert/html/ssa-354112.html" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu96191615/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2024-50561" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-319-06" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-44936" }, { "db": "JVNDB", "id": "JVNDB-2024-012536" }, { "db": "NVD", "id": "CVE-2024-50561" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2024-44936" }, { "db": "JVNDB", "id": "JVNDB-2024-012536" }, { "db": "NVD", "id": "CVE-2024-50561" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-11-14T00:00:00", "db": "CNVD", "id": "CNVD-2024-44936" }, { "date": "2024-11-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2024-012536" }, { "date": "2024-11-12T13:15:13.260000", "db": "NVD", "id": "CVE-2024-50561" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-11-14T00:00:00", "db": "CNVD", "id": "CNVD-2024-44936" }, { "date": "2024-11-19T06:03:00", "db": "JVNDB", "id": "JVNDB-2024-012536" }, { "date": "2024-11-13T19:57:56.313000", "db": "NVD", "id": "CVE-2024-50561" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site scripting vulnerability in multiple Siemens products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-012536" } ], "trust": 0.8 } }
var-202108-2222
Vulnerability from variot
libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths case insensitively,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn't include the 'issuer cert' which a transfer can setto qualify how to verify the server certificate. A security issue has been found in curl before version 7.78.0. The comparison also didn't include the 'issuer cert' which a transfer can set to qualify how to verify the server certificate. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: rh-dotnet31-curl security update Advisory ID: RHSA-2022:1354-01 Product: .NET Core on Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:1354 Issue date: 2022-04-13 CVE Names: CVE-2021-22876 CVE-2021-22924 CVE-2021-22946 CVE-2021-22947 ==================================================================== 1. Summary:
An update for rh-dotnet31-curl is now available for .NET Core on Red Hat Enterprise Linux.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 .NET Core on Red Hat Enterprise Linux Server (v. 7) - x86_64 .NET Core on Red Hat Enterprise Linux Workstation (v. 7) - x86_64
- Description:
.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
Security Fix(es):
-
curl: Leak of authentication credentials in URL via automatic Referer (CVE-2021-22876)
-
curl: Bad connection reuse due to flawed path name checks (CVE-2021-22924)
-
curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols (CVE-2021-22946)
-
curl: Server responses received before STARTTLS processed after TLS handshake (CVE-2021-22947)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1941964 - CVE-2021-22876 curl: Leak of authentication credentials in URL via automatic Referer 1981460 - CVE-2021-22924 curl: Bad connection reuse due to flawed path name checks 2003175 - CVE-2021-22946 curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols 2003191 - CVE-2021-22947 curl: Server responses received before STARTTLS processed after TLS handshake
- Package List:
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source: rh-dotnet31-curl-7.61.1-22.el7_9.src.rpm
x86_64: rh-dotnet31-curl-7.61.1-22.el7_9.x86_64.rpm rh-dotnet31-curl-debuginfo-7.61.1-22.el7_9.x86_64.rpm rh-dotnet31-libcurl-7.61.1-22.el7_9.x86_64.rpm rh-dotnet31-libcurl-devel-7.61.1-22.el7_9.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source: rh-dotnet31-curl-7.61.1-22.el7_9.src.rpm
x86_64: rh-dotnet31-curl-7.61.1-22.el7_9.x86_64.rpm rh-dotnet31-curl-debuginfo-7.61.1-22.el7_9.x86_64.rpm rh-dotnet31-libcurl-7.61.1-22.el7_9.x86_64.rpm rh-dotnet31-libcurl-devel-7.61.1-22.el7_9.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source: rh-dotnet31-curl-7.61.1-22.el7_9.src.rpm
x86_64: rh-dotnet31-curl-7.61.1-22.el7_9.x86_64.rpm rh-dotnet31-curl-debuginfo-7.61.1-22.el7_9.x86_64.rpm rh-dotnet31-libcurl-7.61.1-22.el7_9.x86_64.rpm rh-dotnet31-libcurl-devel-7.61.1-22.el7_9.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2021-22876 https://access.redhat.com/security/cve/CVE-2021-22924 https://access.redhat.com/security/cve/CVE-2021-22946 https://access.redhat.com/security/cve/CVE-2021-22947 https://access.redhat.com/security/updates/classification/#moderate
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYlb3SNzjgjWX9erEAQgpXg/5AT2Nh6ff5mqlZ7dY4dfRgIFgwWOFbvsL 7SHL2ScZJGC2ArXHw9ZpL6XqOZlNm6LGy3V9py4CTEt3lSOl1i3NG4LBKjA7tnea C0l327UhJZqwg1NtZzuhfJTjngxY+09PKNF9X9ULfISZAU0LJlA32VsY/Aw3r2Pu tPx+v+xFKHov+lCT9M75Y7gd0O1McWRwnLF+9E8sVYfkkWp/KMEg4BiuiIax+5lD 9Cs7sgYGct1wDMC+aXbcgM06vCY8nKTwyD67yuFjL+wbHnjcO12Kle9AIzPLQpjU LvzQRqE5/KNhH1BC0jLJwRmFuRH4q/JP8+PRK7/9ABLIl10uj37z9XKpqRj5eBKe tof7/1Fq1DIhDQXoU2TB6SdWwAW/GgLb0tQf1F9KUfgJ+PUQGZED7JzB/jjBZqEy Rh2zDbM8hpCyTBA1bZb/34NyuGG2fypXYkbAda61bWAmn/oV4+P7tV+rGVdQP9GA rlvFPm3sEvT5qHe2pI0du5+Y0yB1PjPMmwYKBlNmhuNFbKgH6dLv8KlKMcbJvu4T dA7yKkZyyxux8W1Reyp0Wzh2wJE5aQfbZm9rzVDJ896AIlO+UzqHXH4XWoFQV1Rz Foj7yKfAJAS/fumVMGd5Z2rpzf8bVjiPltQi+qXFgdyfqpkLxzSKj1tFtWxFW8P4 04zDwrF/odg=o6o+ -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . These flaws may allow remote attackers to obtain sensitive information, leak authentication or cookie header data or facilitate a denial of service attack.
For the stable distribution (bullseye), these problems have been fixed in version 7.74.0-1.3+deb11u2.
We recommend that you upgrade your curl packages.
For the detailed security status of curl please refer to its security tracker page at: https://security-tracker.debian.org/tracker/curl
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmLoBaNfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeTf9A//VWkco2gxCMMe8JDcL9sLD0B5L8KGRxbPBYmpE1l2kCpiW9QGVwCN3q2K i8xo0jmRxSwSXDmAE17aTtGT66vU8vQSHewty031TcvWKBoAJpKRTbazfdOy/vDD waofTEaUClFt3NNiR3gigRU6OFV/9MWlUWwCJ/Wgd5osJTQCyWV/iHz3FJluc1Gp rXamYLnWGUJbIZgMFEo7TqIyb91P0PrX4hpnCcnhvY4ci5NWOj2qaoWGhgF+f9gz Uao91GTOnuTyoY3apKzifdO5dih9zJttnRKUgHkn9YCGxanljoPjHRYOavWdN6bE yIpT/Xw2dy05Fzydb73bDurQP+mkyWGZA+S8gxtbY7S7OylRS9iHSfyUpAVEM/Ab SPkGQl6vBKr7dmyHkdIlbViste6kcmhQQete9E3tM18MkyK0NbBiUj+pShNPC+SF REStal14ZE+DSwFKp5UA8izEh0G5RC5VUVhB/jtoxym2rvmIamk5YqCS1rupGP9R 1Y+Jm8CywBrKHl5EzAVUswC5xDAArWdXRvrgHCeElnkwuCwRC8AgRiYFFRulWKwt TV5qveehnzSc2z5IDc/tdiPWNJhJu/blNN8BauG8zmJV4ZhZP9EO1FCLE7DpqQ38 EPtUTMXaMQR1W15He51auBQwJgSiX1II+5jh6PeZTKBKnJgLYNA= =3E71 -----END PGP SIGNATURE----- . ========================================================================== Ubuntu Security Notice USN-5021-1 July 22, 2021
curl vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 21.04
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in curl.
Software Description: - curl: HTTP, HTTPS, and FTP client and client libraries
Details:
Harry Sintonen and Tomas Hoger discovered that curl incorrectly handled TELNET connections when the -t option was used on the command line. Uninitialized data possibly containing sensitive information could be sent to the remote server, contrary to expectations. (CVE-2021-22898, CVE-2021-22925)
Harry Sintonen discovered that curl incorrectly reused connections in the connection pool. This could result in curl reusing the wrong connections. (CVE-2021-22924)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 21.04: curl 7.74.0-1ubuntu2.1 libcurl3-gnutls 7.74.0-1ubuntu2.1 libcurl3-nss 7.74.0-1ubuntu2.1 libcurl4 7.74.0-1ubuntu2.1
Ubuntu 20.04 LTS: curl 7.68.0-1ubuntu2.6 libcurl3-gnutls 7.68.0-1ubuntu2.6 libcurl3-nss 7.68.0-1ubuntu2.6 libcurl4 7.68.0-1ubuntu2.6
Ubuntu 18.04 LTS: curl 7.58.0-2ubuntu3.14 libcurl3-gnutls 7.58.0-2ubuntu3.14 libcurl3-nss 7.58.0-2ubuntu3.14 libcurl4 7.58.0-2ubuntu3.14
In general, a standard system update will make all the necessary changes. Bugs fixed (https://bugzilla.redhat.com/):
2007489 - RHACM 2.1.12 images 2010991 - CVE-2021-32687 redis: Integer overflow issue with intsets 2011000 - CVE-2021-32675 redis: Denial of service via Redis Standard Protocol (RESP) request 2011001 - CVE-2021-32672 redis: Out of bounds read in lua debugger protocol parser 2011004 - CVE-2021-32628 redis: Integer overflow bug in the ziplist data structure 2011010 - CVE-2021-32627 redis: Integer overflow issue with Streams 2011017 - CVE-2021-32626 redis: Lua scripts can overflow the heap-based Lua stack 2011020 - CVE-2021-41099 redis: Integer overflow issue with strings
-
8) - aarch64, ppc64le, s390x, x86_64
-
Description:
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Summary:
The Migration Toolkit for Containers (MTC) 1.6.0 is now available. Description:
The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Bugs fixed (https://bugzilla.redhat.com/):
1878824 - Web console is not accessible when deployed on OpenShift cluster on IBM Cloud 1887526 - "Stage" pods fail when migrating from classic OpenShift source cluster on IBM Cloud with block storage 1899562 - MigMigration custom resource does not display an error message when a migration fails because of volume mount error 1936886 - Service account token of existing remote cluster cannot be updated by using the web console 1936894 - "Ready" status of MigHook and MigPlan custom resources is not synchronized automatically 1949117 - "Migration plan resources" page displays a permanent error message when a migration plan is deleted from the backend 1951869 - MigPlan custom resource does not detect invalid source cluster reference 1968621 - Paused deployment config causes a migration to hang 1970338 - Parallel migrations fail because the initial backup is missing 1974737 - Migration plan name length in the "Migration plan" wizard is not validated 1975369 - "Debug view" link text on "Migration plans" page can be improved 1975372 - Destination namespace in MigPlan custom resource is not validated 1976895 - Namespace mapping cannot be changed using the Migration Plan wizard 1981810 - "Excluded" resources are not excluded from the migration 1982026 - Direct image migration fails if the source URI contains a double slash ("//") 1994985 - Web console crashes when a MigPlan custom resource is created with an empty namespaces list 1996169 - When "None" is selected as the target storage class in the web console, the setting is ignored and the default storage class is used 1996627 - MigPlan custom resource displays a "PvUsageAnalysisFailed" warning after a successful PVC migration 1996784 - "Migration resources" tree on the "Migration details" page is not displayed 1996902 - "Select all" checkbox on the "Namespaces" page of the "Migration plan" wizard remains selected after a namespace is unselected 1996904 - "Migration" dialogs on the "Migration plans" page display inconsistent capitalization 1996906 - "Migration details" page link is displayed for a migration plan with no associated migrations 1996938 - Search function on "Migration plans" page displays no results 1997051 - Indirect migration from MTC 1.5.1 to 1.6.0 fails during "StageBackup" phase 1997127 - Direct volume migration "retry" feature does not work correctly after a network failure 1997173 - Migration of custom resource definitions to OpenShift Container Platform 4.9 fails because of API version incompatibility 1997180 - "migration-log-reader" pod does not log invalid Rsync options 1997665 - Selected PVCs in the "State migration" dialog are reset because of background polling 1997694 - "Update operator" link on the "Clusters" page is incorrect 1997827 - "Migration plan" wizard displays PVC names incorrectly formatted after running state migration 1998062 - Rsync pod uses upstream image 1998283 - "Migration step details" link on the "Migrations" page does not work 1998550 - "Migration plan" wizard does not support certain screen resolutions 1998581 - "Migration details" link on "Migration plans" page displays "latestIsFailed" error 1999113 - "oc describe" and "oc log" commands on "Migration resources" tree cannot be copied after failed migration 1999381 - MigPlan custom resource displays "Stage completed with warnings" status after successful migration 1999528 - Position of the "Add migration plan" button is different from the other "Add" buttons 1999765 - "Migrate" button on "State migration" dialog is enabled when no PVCs are selected 1999784 - CVE-2021-3749 nodejs-axios: Regular expression denial of service in trim function 2000205 - "Options" menu on the "Migration details" page displays incorrect items 2000218 - Validation incorrectly blocks namespace mapping if a source cluster namespace is the same as the destination namespace 2000243 - "Migration plan" wizard does not allow a migration within the same cluster 2000644 - Invalid migration plan causes "controller" pod to crash 2000875 - State migration status on "Migrations" page displays "Stage succeeded" message 2000979 - "clusterIPs" parameter of "service" object can cause Velero errors 2001089 - Direct volume migration fails because of missing CA path configuration 2001173 - Migration plan requires two clusters 2001786 - Migration fails during "Stage Backup" step because volume path on host not found 2001829 - Migration does not complete when the namespace contains a cron job with a PVC 2001941 - Fixing PVC conflicts in state migration plan using the web console causes the migration to run twice 2002420 - "Stage" pod not created for completed application pod, causing the "mig-controller" to stall 2002608 - Migration of unmounted PVC fails during "StageBackup" phase 2002897 - Rollback migration does not complete when the namespace contains a cron job 2003603 - "View logs" dialog displays the "--selector" option, which does not print all logs 2004601 - Migration plan status on "Migration plans" page is "Ready" after migration completed with warnings 2004923 - Web console displays "New operator version available" notification for incorrect operator 2005143 - Combining Rsync and Stunnel in a single pod can degrade performance 2006316 - Web console cannot create migration plan in a proxy environment 2007175 - Web console cannot be launched in a proxy environment
- JIRA issues fixed (https://issues.jboss.org/):
MIG-785 - Search for "Crane" in the Operator Hub should display the Migration Toolkit for Containers
- Summary:
Red Hat Advanced Cluster Management for Kubernetes 2.1.11 General Availability release images, which provide a security fix and update the container images. Description:
Red Hat Advanced Cluster Management for Kubernetes 2.1.11 images
Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in.
This advisory contains updates to one or more container images for Red Hat Advanced Cluster Management for Kubernetes.
Container updates:
-
RHACM 2.1.11 images (BZ# 1999375)
-
Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied. To apply this upgrade, you must upgrade your OpenShift Container Platform version to 4.6, or later. Bugs fixed (https://bugzilla.redhat.com/):
1963121 - CVE-2021-23017 nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name 1999375 - RHACM 2.1.11 images
- Description:
Quay 3.6.0 release
Security Fix(es):
-
nodejs-url-parse: incorrect hostname in url parsing (CVE-2018-3774)
-
python-pillow: insufficent fix for CVE-2020-35654 due to incorrect error checking in TiffDecode.c (CVE-2021-25289)
-
nodejs-urijs: mishandling certain uses of backslash may lead to confidentiality compromise (CVE-2021-27516)
-
nodejs-debug: Regular expression Denial of Service (CVE-2017-16137)
-
nodejs-mime: Regular expression Denial of Service (CVE-2017-16138)
-
nodejs-is-my-json-valid: ReDoS when validating JSON fields with email format (CVE-2018-1107)
-
nodejs-extend: Prototype pollution can allow attackers to modify object properties (CVE-2018-16492)
-
nodejs-stringstream: out-of-bounds read leading to uninitialized memory exposure (CVE-2018-21270)
-
nodejs-handlebars: lookup helper fails to properly validate templates allowing for arbitrary JavaScript execution (CVE-2019-20920)
-
nodejs-handlebars: an endless loop while processing specially-crafted templates leads to DoS (CVE-2019-20922)
-
nodejs-lodash: prototype pollution in zipObjectDeep function (CVE-2020-8203)
-
nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)
-
nodejs-highlight-js: prototype pollution via a crafted HTML code block (CVE-2020-26237)
-
urijs: Hostname spoofing via backslashes in URL (CVE-2020-26291)
-
python-pillow: decoding crafted YCbCr files could result in heap-based buffer overflow (CVE-2020-35654)
-
browserslist: parsing of invalid queries could result in Regular Expression Denial of Service (ReDoS) (CVE-2021-23364)
-
nodejs-postcss: Regular expression denial of service during source map parsing (CVE-2021-23368)
-
nodejs-postcss: ReDoS via getAnnotationURL() and loadAnnotation() in lib/previous-map.js (CVE-2021-23382)
-
python-pillow: negative-offset memcpy with an invalid size in TiffDecode.c (CVE-2021-25290)
-
python-pillow: out-of-bounds read in TiffReadRGBATile in TiffDecode.c (CVE-2021-25291)
-
python-pillow: backtracking regex in PDF parser could be used as a DOS attack (CVE-2021-25292)
-
python-pillow: out-of-bounds read in SGIRleDecode.c (CVE-2021-25293)
-
nodejs-url-parse: mishandling certain uses of backslash may lead to confidentiality compromise (CVE-2021-27515)
-
python-pillow: reported size of a contained image is not properly checked for a BLP container (CVE-2021-27921)
-
python-pillow: reported size of a contained image is not properly checked for an ICNS container (CVE-2021-27922)
-
python-pillow: reported size of a contained image is not properly checked for an ICO container (CVE-2021-27923)
-
python-pillow: buffer overflow in Convert.c because it allow an attacker to pass controlled parameters directly into a convert function (CVE-2021-34552)
-
nodejs-braces: Regular Expression Denial of Service (ReDoS) in lib/parsers.js (CVE-2018-1109)
-
lodash: Prototype pollution in utilities function (CVE-2018-3721)
-
hoek: Prototype pollution in utilities function (CVE-2018-3728)
-
lodash: uncontrolled resource consumption in Data handler causing denial of service (CVE-2019-1010266)
-
nodejs-yargs-parser: prototype pollution vulnerability (CVE-2020-7608)
-
python-pillow: decoding a crafted PCX file could result in buffer over-read (CVE-2020-35653)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bugs fixed (https://bugzilla.redhat.com/):
1500700 - CVE-2017-16138 nodejs-mime: Regular expression Denial of Service 1500705 - CVE-2017-16137 nodejs-debug: Regular expression Denial of Service 1545884 - CVE-2018-3721 lodash: Prototype pollution in utilities function 1545893 - CVE-2018-3728 hoek: Prototype pollution in utilities function 1546357 - CVE-2018-1107 nodejs-is-my-json-valid: ReDoS when validating JSON fields with email format 1547272 - CVE-2018-1109 nodejs-braces: Regular Expression Denial of Service (ReDoS) in lib/parsers.js 1608140 - CVE-2018-16492 nodejs-extend: Prototype pollution can allow attackers to modify object properties 1743096 - CVE-2019-1010266 lodash: uncontrolled resource consumption in Data handler causing denial of service 1840004 - CVE-2020-7608 nodejs-yargs-parser: prototype pollution vulnerability 1857412 - CVE-2020-8203 nodejs-lodash: prototype pollution in zipObjectDeep function 1857977 - CVE-2020-15366 nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function 1882256 - CVE-2019-20922 nodejs-handlebars: an endless loop while processing specially-crafted templates leads to DoS 1882260 - CVE-2019-20920 nodejs-handlebars: lookup helper fails to properly validate templates allowing for arbitrary JavaScript execution 1901662 - CVE-2020-26237 nodejs-highlight-js: prototype pollution via a crafted HTML code block 1915257 - CVE-2020-26291 urijs: Hostname spoofing via backslashes in URL 1915420 - CVE-2020-35653 python-pillow: decoding a crafted PCX file could result in buffer over-read 1915424 - CVE-2020-35654 python-pillow: decoding crafted YCbCr files could result in heap-based buffer overflow 1927293 - CVE-2018-21270 nodejs-stringstream: out-of-bounds read leading to uninitialized memory exposure 1934470 - CVE-2021-27516 nodejs-urijs: mishandling certain uses of backslash may lead to confidentiality compromise 1934474 - CVE-2021-27515 nodejs-url-parse: mishandling certain uses of backslash may lead to confidentiality compromise 1934680 - CVE-2021-25289 python-pillow: insufficent fix for CVE-2020-35654 due to incorrect error checking in TiffDecode.c 1934685 - CVE-2021-25290 python-pillow: negative-offset memcpy with an invalid size in TiffDecode.c 1934692 - CVE-2021-25291 python-pillow: out-of-bounds read in TiffReadRGBATile in TiffDecode.c 1934699 - CVE-2021-25292 python-pillow: backtracking regex in PDF parser could be used as a DOS attack 1934705 - CVE-2021-25293 python-pillow: out-of-bounds read in SGIRleDecode.c 1935384 - CVE-2021-27921 python-pillow: reported size of a contained image is not properly checked for a BLP container 1935396 - CVE-2021-27922 python-pillow: reported size of a contained image is not properly checked for an ICNS container 1935401 - CVE-2021-27923 python-pillow: reported size of a contained image is not properly checked for an ICO container 1940759 - CVE-2018-3774 nodejs-url-parse: incorrect hostname in url parsing 1948763 - CVE-2021-23368 nodejs-postcss: Regular expression denial of service during source map parsing 1954150 - CVE-2021-23382 nodejs-postcss: ReDoS via getAnnotationURL() and loadAnnotation() in lib/previous-map.js 1955619 - CVE-2021-23364 browserslist: parsing of invalid queries could result in Regular Expression Denial of Service (ReDoS) 1982378 - CVE-2021-34552 python-pillow: buffer overflow in Convert.c because it allow an attacker to pass controlled parameters directly into a convert function
- JIRA issues fixed (https://issues.jboss.org/):
PROJQUAY-1417 - zstd compressed layers PROJQUAY-1449 - As a Quay admin I want to rely on the Operator to auto-scale all stateless parts of Quay PROJQUAY-1535 - As a user I can create and use nested repository name structures PROJQUAY-1583 - add "disconnected" annotation to operators PROJQUAY-1609 - Operator communicates status per managed component PROJQUAY-1610 - Operator does not make Quay deployment wait on Clair deployment PROJQUAY-1791 - v1beta CRD EOL PROJQUAY-1883 - Support OCP Re-encrypt routes PROJQUAY-1887 - allow either sha or tag in related images PROJQUAY-1926 - As an admin, I want an API to create first user, so I can automate deployment. PROJQUAY-1998 - note database deprecations in 3.6 Config Tool PROJQUAY-2050 - Support OCP Edge-Termination PROJQUAY-2100 - A customer can update the Operator from 3.3 to 3.6 directly PROJQUAY-2102 - add clair-4.2 enrichment data to quay UI PROJQUAY-672 - MutatingAdmissionWebhook Created Automatically for QBO During Install
- Bugs fixed (https://bugzilla.redhat.com/):
1858777 - Alert for VM with 'evictionStrategy: LiveMigrate' for local PVs set 1891921 - virt-launcher is missing /usr/share/zoneinfo directory, making it impossible to set clock offset of timezone type for the guest RTC 1896469 - In cluster with OVN Kubernetes networking - a node doesn't recover when configuring linux-bridge over its default NIC 1903687 - [scale] 1K DV creation failed 1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation 1933043 - Delete VM just after it turns into "running" is very likely to hit grace period end 1935219 - [CNV-2.5] Set memory and CPU request on hco-operator and hco-webhook deployments 1942726 - test automatic bug creation for a new release 1943164 - Node drain: Sometimes source virt-launcher pod status is Failed and not Completed 1945589 - Live migration with virtiofs is possible 1953481 - New OCP priority classes are not used - Deploy 1953483 - New OCP priority classes are not used - SSP 1953484 - New OCP priority classes are not used - Storage 1955129 - Failed to bindmount hotplug-disk for hostpath-provisioner 1957852 - Could not start VM as restore snapshot was still not Complete 1958341 - CVE-2021-31525 golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header 1963963 - hco.kubevirt.io:config-reader role and rolebinding are not strictly reconciled 1965050 - RoleBinding and ClusterRoleBinding brought in by kubevirt does not get reconciled when kind is ServiceAccount 1973852 - Introduce VM crashloop backoff 1976604 - [CNV-5786] IP connectivity is lost after migration (masquerade) 1976730 - Disk is not usable due to incorrect size for proper alignment 1979631 - virt-chroot: container disk validation crash prevents VMI from starting/migrating 1979659 - 4.9.0 containers 1981345 - 4.9.0 rpms 1983596 - CVE-2021-34558 golang: crypto/tls: certificate of wrong type is causing TLS client to panic 1985083 - VMI Pod fails to terminate due to a zombie qemu process 1985649 - virt-handler Pod is missing xorrisofs command 1985670 - virt-launcher fails to create v1 controller cpu for group: Read-only file system 1985719 - Unprivileged client fails to get guest agent data 1989176 - kube-cni-linux-bridge-plugin Pod is missing bridge CNI plugin 1989263 - VM Snapshot may freeze guest indefinitely 1989269 - Online VM Snapshot storing incorrect VM spec 1989564 - CVE-2021-33195 golang: net: lookup functions may return invalid host names 1989570 - CVE-2021-33197 golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty 1989575 - CVE-2021-33198 golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents 1991691 - Enable DownwardMetrics FeatureGate via HCO CR 1992608 - kubevirt doesn't respect useEmulation: true 1993121 - Rhel9 templates - provider-url should be updated to https://www.redhat.com/ 1994389 - Some of the cdi resources missing app labels 1995295 - SCC annotation of ssp-operator was changed to privileged 1996407 - [cdi-functional-tests] cdi-docker-registry-host Pod fails to start 1997014 - Common templates - dataVolumeTemplates API version should be updated 1998054 - RHEL9 template - update template description. 1998656 - no "name" label in ssp-operator pod 1999571 - NFS clone not progressing when clone sizes mismatch (target > source) 1999617 - Unable to create a VM with nonroot VirtLauncher Pods 1999835 - ConsoleCLIDownload | wrong path in virtctl archive URL 2000052 - NNCP creation failures after nmstate-handler pod deletion 2000204 - [4.9.0] [RFE] volumeSnapshotStatuses reason does not check for volume type that do not support snapshots 2001041 - [4.9.0] Importer attempts to shrink an image in certain situations 2001047 - Automatic size detection may not request a PVC that is large enough for an import 2003473 - Failed to Migrate Windows VM with CDROM (readonly) 2005695 - With descheduler during multiple VMIs migrations, some VMs are restarted 2006418 - Clone Strategy does not work as described 2008900 - Eviction of not live migratable VMs due to virt-launcher upgrade can happen outside the upgrade window 2010742 - [CNV-4.9] VMI is in LiveMigrate loop when Upgrading Cluster from 2.6.7/4.7.32 to OCP 4.8.13 2011179 - Cluster-wide live migration limits and timeouts are not suitable 2017394 - After upgrade, live migration is Pending 2018521 - [Storage] Failed to restore VirtualMachineSnapshot after CNV upgrade
- Bugs fixed (https://bugzilla.redhat.com/):
1983596 - CVE-2021-34558 golang: crypto/tls: certificate of wrong type is causing TLS client to panic 1992006 - CVE-2021-29923 golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet 1998844 - virt-handler Pod is missing xorrisofs command 2008522 - "unable to execute QEMU agent command 'guest-get-users'" logs in virt-launcher pod every 10 seconds 2010334 - VM is not able to be migrated after failed migration 2012328 - 2.6.8 containers 2013494 - [CNV-2.6.8] VMI is in LiveMigrate loop when Upgrading Cluster from 2.6.7/4.7.32 to OCP 4.8.13
5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2222", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance m804pb", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.1" }, { "model": "universal forwarder", "scope": "eq", "trust": 1.0, "vendor": "splunk", "version": "9.1.0" }, { "model": "simatic rtu3030c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.0.14" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "solidfire \\\u0026 hci management node", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "sinema remote connect server", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.1" }, { "model": "scalance m816-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.1" }, { "model": "simatic cp 1543-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.0.22" }, { "model": "simatic rtu 3041c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.0.14" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "11.0" }, { "model": "universal forwarder", "scope": "lt", "trust": 1.0, "vendor": "splunk", "version": "9.0.6" }, { "model": "sinec infrastructure network services", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.0.1.1" }, { "model": "universal forwarder", "scope": "gte", "trust": 1.0, "vendor": "splunk", "version": "9.0.0" }, { "model": "mysql server", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "8.0.26" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "10.0" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "33" }, { "model": "mysql server", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "5.7.0" }, { "model": "sinema remote connect", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.1" }, { "model": "universal forwarder", "scope": "gte", "trust": 1.0, "vendor": "splunk", "version": "8.2.0" }, { "model": "simatic rtu3010c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.0.14" }, { "model": "logo\\! cmr2040", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "ruggedcomrm 1224 lte", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.1" }, { "model": "simatic cp 1545-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.1" }, { "model": "scalance m876-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.1" }, { "model": "scalance s615", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.1" }, { "model": "scalance m812-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.1" }, { "model": "mysql server", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "8.0.0" }, { "model": "logo\\! cmr2020", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance mum856-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.1" }, { "model": "simatic rtu3031c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.0.14" }, { "model": "scalance m876-4", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.1" }, { "model": "peoplesoft enterprise peopletools", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "8.58" }, { "model": "libcurl", "scope": "gte", "trust": 1.0, "vendor": "haxx", "version": "7.10.4" }, { "model": "scalance m874-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.1" }, { "model": "siplus net cp 1543-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.0.22" }, { "model": "universal forwarder", "scope": "lt", "trust": 1.0, "vendor": "splunk", "version": "8.2.12" }, { "model": "peoplesoft enterprise peopletools", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "8.57" }, { "model": "scalance m874-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.1" }, { "model": "libcurl", "scope": "lt", "trust": 1.0, "vendor": "haxx", "version": "7.77.0" }, { "model": "peoplesoft enterprise peopletools", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "8.59" }, { "model": "mysql server", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "5.7.36" }, { "model": "scalance m826-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.1" }, { "model": "solidfire baseboard management controller", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "cloud backup", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "clustered data ontap", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22924" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "166714" }, { "db": "PACKETSTORM", "id": "164583" }, { "db": "PACKETSTORM", "id": "164221" }, { "db": "PACKETSTORM", "id": "164342" }, { "db": "PACKETSTORM", "id": "164282" }, { "db": "PACKETSTORM", "id": "164555" }, { "db": "PACKETSTORM", "id": "164755" }, { "db": "PACKETSTORM", "id": "165008" } ], "trust": 0.8 }, "cve": "CVE-2021-22924", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2021-22924", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-381398", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "exploitabilityScore": 2.2, "id": "CVE-2021-22924", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22924", "trust": 1.0, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-381398", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-381398" }, { "db": "NVD", "id": "CVE-2021-22924" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take \u0027issuercert\u0027 into account and it compared the involved paths *case insensitively*,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn\u0027t include the \u0027issuer cert\u0027 which a transfer can setto qualify how to verify the server certificate. A security issue has been found in curl before version 7.78.0. The comparison also didn\u0027t include the \u0027issuer cert\u0027 which a transfer can set to qualify how to verify the server certificate. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Moderate: rh-dotnet31-curl security update\nAdvisory ID: RHSA-2022:1354-01\nProduct: .NET Core on Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2022:1354\nIssue date: 2022-04-13\nCVE Names: CVE-2021-22876 CVE-2021-22924 CVE-2021-22946\n CVE-2021-22947\n====================================================================\n1. Summary:\n\nAn update for rh-dotnet31-curl is now available for .NET Core on Red Hat\nEnterprise Linux. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\n.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64\n.NET Core on Red Hat Enterprise Linux Server (v. 7) - x86_64\n.NET Core on Red Hat Enterprise Linux Workstation (v. 7) - x86_64\n\n3. Description:\n\n.NET Core is a managed-software framework. It implements a subset of the\n.NET framework APIs and several new APIs, and it includes a CLR\nimplementation. \n\nSecurity Fix(es):\n\n* curl: Leak of authentication credentials in URL via automatic Referer\n(CVE-2021-22876)\n\n* curl: Bad connection reuse due to flawed path name checks\n(CVE-2021-22924)\n\n* curl: Requirement to use TLS not properly enforced for IMAP, POP3, and\nFTP protocols (CVE-2021-22946)\n\n* curl: Server responses received before STARTTLS processed after TLS\nhandshake (CVE-2021-22947)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1941964 - CVE-2021-22876 curl: Leak of authentication credentials in URL via automatic Referer\n1981460 - CVE-2021-22924 curl: Bad connection reuse due to flawed path name checks\n2003175 - CVE-2021-22946 curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols\n2003191 - CVE-2021-22947 curl: Server responses received before STARTTLS processed after TLS handshake\n\n6. Package List:\n\n.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nrh-dotnet31-curl-7.61.1-22.el7_9.src.rpm\n\nx86_64:\nrh-dotnet31-curl-7.61.1-22.el7_9.x86_64.rpm\nrh-dotnet31-curl-debuginfo-7.61.1-22.el7_9.x86_64.rpm\nrh-dotnet31-libcurl-7.61.1-22.el7_9.x86_64.rpm\nrh-dotnet31-libcurl-devel-7.61.1-22.el7_9.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux Server (v. 7):\n\nSource:\nrh-dotnet31-curl-7.61.1-22.el7_9.src.rpm\n\nx86_64:\nrh-dotnet31-curl-7.61.1-22.el7_9.x86_64.rpm\nrh-dotnet31-curl-debuginfo-7.61.1-22.el7_9.x86_64.rpm\nrh-dotnet31-libcurl-7.61.1-22.el7_9.x86_64.rpm\nrh-dotnet31-libcurl-devel-7.61.1-22.el7_9.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nrh-dotnet31-curl-7.61.1-22.el7_9.src.rpm\n\nx86_64:\nrh-dotnet31-curl-7.61.1-22.el7_9.x86_64.rpm\nrh-dotnet31-curl-debuginfo-7.61.1-22.el7_9.x86_64.rpm\nrh-dotnet31-libcurl-7.61.1-22.el7_9.x86_64.rpm\nrh-dotnet31-libcurl-devel-7.61.1-22.el7_9.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2021-22876\nhttps://access.redhat.com/security/cve/CVE-2021-22924\nhttps://access.redhat.com/security/cve/CVE-2021-22946\nhttps://access.redhat.com/security/cve/CVE-2021-22947\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2022 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\n04zDwrF/odg=o6o+\n-----END PGP SIGNATURE-----\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. These flaws may allow remote attackers to obtain sensitive\ninformation, leak authentication or cookie header data or facilitate a\ndenial of service attack. \n\nFor the stable distribution (bullseye), these problems have been fixed in\nversion 7.74.0-1.3+deb11u2. \n\nWe recommend that you upgrade your curl packages. \n\nFor the detailed security status of curl please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/curl\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n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\nEPtUTMXaMQR1W15He51auBQwJgSiX1II+5jh6PeZTKBKnJgLYNA=\n=3E71\n-----END PGP SIGNATURE-----\n. ==========================================================================\nUbuntu Security Notice USN-5021-1\nJuly 22, 2021\n\ncurl vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 21.04\n- Ubuntu 20.04 LTS\n- Ubuntu 18.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in curl. \n\nSoftware Description:\n- curl: HTTP, HTTPS, and FTP client and client libraries\n\nDetails:\n\nHarry Sintonen and Tomas Hoger discovered that curl incorrectly handled\nTELNET connections when the -t option was used on the command line. \nUninitialized data possibly containing sensitive information could be sent\nto the remote server, contrary to expectations. (CVE-2021-22898,\nCVE-2021-22925)\n\nHarry Sintonen discovered that curl incorrectly reused connections in the\nconnection pool. This could result in curl reusing the wrong connections. \n(CVE-2021-22924)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 21.04:\n curl 7.74.0-1ubuntu2.1\n libcurl3-gnutls 7.74.0-1ubuntu2.1\n libcurl3-nss 7.74.0-1ubuntu2.1\n libcurl4 7.74.0-1ubuntu2.1\n\nUbuntu 20.04 LTS:\n curl 7.68.0-1ubuntu2.6\n libcurl3-gnutls 7.68.0-1ubuntu2.6\n libcurl3-nss 7.68.0-1ubuntu2.6\n libcurl4 7.68.0-1ubuntu2.6\n\nUbuntu 18.04 LTS:\n curl 7.58.0-2ubuntu3.14\n libcurl3-gnutls 7.58.0-2ubuntu3.14\n libcurl3-nss 7.58.0-2ubuntu3.14\n libcurl4 7.58.0-2ubuntu3.14\n\nIn general, a standard system update will make all the necessary changes. Bugs fixed (https://bugzilla.redhat.com/):\n\n2007489 - RHACM 2.1.12 images\n2010991 - CVE-2021-32687 redis: Integer overflow issue with intsets\n2011000 - CVE-2021-32675 redis: Denial of service via Redis Standard Protocol (RESP) request\n2011001 - CVE-2021-32672 redis: Out of bounds read in lua debugger protocol parser\n2011004 - CVE-2021-32628 redis: Integer overflow bug in the ziplist data structure\n2011010 - CVE-2021-32627 redis: Integer overflow issue with Streams\n2011017 - CVE-2021-32626 redis: Lua scripts can overflow the heap-based Lua stack\n2011020 - CVE-2021-41099 redis: Integer overflow issue with strings\n\n5. 8) - aarch64, ppc64le, s390x, x86_64\n\n3. Description:\n\nThe curl packages provide the libcurl library and the curl utility for\ndownloading files from servers using various protocols, including HTTP,\nFTP, and LDAP. Summary:\n\nThe Migration Toolkit for Containers (MTC) 1.6.0 is now available. Description:\n\nThe Migration Toolkit for Containers (MTC) enables you to migrate\nKubernetes resources, persistent volume data, and internal container images\nbetween OpenShift Container Platform clusters, using the MTC web console or\nthe Kubernetes API. Bugs fixed (https://bugzilla.redhat.com/):\n\n1878824 - Web console is not accessible when deployed on OpenShift cluster on IBM Cloud\n1887526 - \"Stage\" pods fail when migrating from classic OpenShift source cluster on IBM Cloud with block storage\n1899562 - MigMigration custom resource does not display an error message when a migration fails because of volume mount error\n1936886 - Service account token of existing remote cluster cannot be updated by using the web console\n1936894 - \"Ready\" status of MigHook and MigPlan custom resources is not synchronized automatically\n1949117 - \"Migration plan resources\" page displays a permanent error message when a migration plan is deleted from the backend\n1951869 - MigPlan custom resource does not detect invalid source cluster reference\n1968621 - Paused deployment config causes a migration to hang\n1970338 - Parallel migrations fail because the initial backup is missing\n1974737 - Migration plan name length in the \"Migration plan\" wizard is not validated\n1975369 - \"Debug view\" link text on \"Migration plans\" page can be improved\n1975372 - Destination namespace in MigPlan custom resource is not validated\n1976895 - Namespace mapping cannot be changed using the Migration Plan wizard\n1981810 - \"Excluded\" resources are not excluded from the migration\n1982026 - Direct image migration fails if the source URI contains a double slash (\"//\")\n1994985 - Web console crashes when a MigPlan custom resource is created with an empty namespaces list\n1996169 - When \"None\" is selected as the target storage class in the web console, the setting is ignored and the default storage class is used\n1996627 - MigPlan custom resource displays a \"PvUsageAnalysisFailed\" warning after a successful PVC migration\n1996784 - \"Migration resources\" tree on the \"Migration details\" page is not displayed\n1996902 - \"Select all\" checkbox on the \"Namespaces\" page of the \"Migration plan\" wizard remains selected after a namespace is unselected\n1996904 - \"Migration\" dialogs on the \"Migration plans\" page display inconsistent capitalization\n1996906 - \"Migration details\" page link is displayed for a migration plan with no associated migrations\n1996938 - Search function on \"Migration plans\" page displays no results\n1997051 - Indirect migration from MTC 1.5.1 to 1.6.0 fails during \"StageBackup\" phase\n1997127 - Direct volume migration \"retry\" feature does not work correctly after a network failure\n1997173 - Migration of custom resource definitions to OpenShift Container Platform 4.9 fails because of API version incompatibility\n1997180 - \"migration-log-reader\" pod does not log invalid Rsync options\n1997665 - Selected PVCs in the \"State migration\" dialog are reset because of background polling\n1997694 - \"Update operator\" link on the \"Clusters\" page is incorrect\n1997827 - \"Migration plan\" wizard displays PVC names incorrectly formatted after running state migration\n1998062 - Rsync pod uses upstream image\n1998283 - \"Migration step details\" link on the \"Migrations\" page does not work\n1998550 - \"Migration plan\" wizard does not support certain screen resolutions\n1998581 - \"Migration details\" link on \"Migration plans\" page displays \"latestIsFailed\" error\n1999113 - \"oc describe\" and \"oc log\" commands on \"Migration resources\" tree cannot be copied after failed migration\n1999381 - MigPlan custom resource displays \"Stage completed with warnings\" status after successful migration\n1999528 - Position of the \"Add migration plan\" button is different from the other \"Add\" buttons\n1999765 - \"Migrate\" button on \"State migration\" dialog is enabled when no PVCs are selected\n1999784 - CVE-2021-3749 nodejs-axios: Regular expression denial of service in trim function\n2000205 - \"Options\" menu on the \"Migration details\" page displays incorrect items\n2000218 - Validation incorrectly blocks namespace mapping if a source cluster namespace is the same as the destination namespace\n2000243 - \"Migration plan\" wizard does not allow a migration within the same cluster\n2000644 - Invalid migration plan causes \"controller\" pod to crash\n2000875 - State migration status on \"Migrations\" page displays \"Stage succeeded\" message\n2000979 - \"clusterIPs\" parameter of \"service\" object can cause Velero errors\n2001089 - Direct volume migration fails because of missing CA path configuration\n2001173 - Migration plan requires two clusters\n2001786 - Migration fails during \"Stage Backup\" step because volume path on host not found\n2001829 - Migration does not complete when the namespace contains a cron job with a PVC\n2001941 - Fixing PVC conflicts in state migration plan using the web console causes the migration to run twice\n2002420 - \"Stage\" pod not created for completed application pod, causing the \"mig-controller\" to stall\n2002608 - Migration of unmounted PVC fails during \"StageBackup\" phase\n2002897 - Rollback migration does not complete when the namespace contains a cron job\n2003603 - \"View logs\" dialog displays the \"--selector\" option, which does not print all logs\n2004601 - Migration plan status on \"Migration plans\" page is \"Ready\" after migration completed with warnings\n2004923 - Web console displays \"New operator version available\" notification for incorrect operator\n2005143 - Combining Rsync and Stunnel in a single pod can degrade performance\n2006316 - Web console cannot create migration plan in a proxy environment\n2007175 - Web console cannot be launched in a proxy environment\n\n5. JIRA issues fixed (https://issues.jboss.org/):\n\nMIG-785 - Search for \"Crane\" in the Operator Hub should display the Migration Toolkit for Containers\n\n6. Summary:\n\nRed Hat Advanced Cluster Management for Kubernetes 2.1.11 General\nAvailability release images, which provide a security fix and update the\ncontainer images. Description:\n\nRed Hat Advanced Cluster Management for Kubernetes 2.1.11 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the\ncapabilities to address common challenges that administrators and site\nreliability engineers face as they work across a range of public and\nprivate cloud environments. Clusters and applications are all visible and\nmanaged from a single console\u2014with security policy built in. \n\nThis advisory contains updates to one or more container images for Red Hat\nAdvanced Cluster Management for Kubernetes. \n\nContainer updates:\n\n* RHACM 2.1.11 images (BZ# 1999375)\n\n3. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. To apply this upgrade,\nyou \nmust upgrade your OpenShift Container Platform version to 4.6, or later. Bugs fixed (https://bugzilla.redhat.com/):\n\n1963121 - CVE-2021-23017 nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name\n1999375 - RHACM 2.1.11 images\n\n5. Description:\n\nQuay 3.6.0 release\n\nSecurity Fix(es):\n\n* nodejs-url-parse: incorrect hostname in url parsing (CVE-2018-3774)\n\n* python-pillow: insufficent fix for CVE-2020-35654 due to incorrect error\nchecking in TiffDecode.c (CVE-2021-25289)\n\n* nodejs-urijs: mishandling certain uses of backslash may lead to\nconfidentiality compromise (CVE-2021-27516)\n\n* nodejs-debug: Regular expression Denial of Service (CVE-2017-16137)\n\n* nodejs-mime: Regular expression Denial of Service (CVE-2017-16138)\n\n* nodejs-is-my-json-valid: ReDoS when validating JSON fields with email\nformat (CVE-2018-1107)\n\n* nodejs-extend: Prototype pollution can allow attackers to modify object\nproperties (CVE-2018-16492)\n\n* nodejs-stringstream: out-of-bounds read leading to uninitialized memory\nexposure (CVE-2018-21270)\n\n* nodejs-handlebars: lookup helper fails to properly validate templates\nallowing for arbitrary JavaScript execution (CVE-2019-20920)\n\n* nodejs-handlebars: an endless loop while processing specially-crafted\ntemplates leads to DoS (CVE-2019-20922)\n\n* nodejs-lodash: prototype pollution in zipObjectDeep function\n(CVE-2020-8203)\n\n* nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate\nfunction (CVE-2020-15366)\n\n* nodejs-highlight-js: prototype pollution via a crafted HTML code block\n(CVE-2020-26237)\n\n* urijs: Hostname spoofing via backslashes in URL (CVE-2020-26291)\n\n* python-pillow: decoding crafted YCbCr files could result in heap-based\nbuffer overflow (CVE-2020-35654)\n\n* browserslist: parsing of invalid queries could result in Regular\nExpression Denial of Service (ReDoS) (CVE-2021-23364)\n\n* nodejs-postcss: Regular expression denial of service during source map\nparsing (CVE-2021-23368)\n\n* nodejs-postcss: ReDoS via getAnnotationURL() and loadAnnotation() in\nlib/previous-map.js (CVE-2021-23382)\n\n* python-pillow: negative-offset memcpy with an invalid size in\nTiffDecode.c (CVE-2021-25290)\n\n* python-pillow: out-of-bounds read in TiffReadRGBATile in TiffDecode.c\n(CVE-2021-25291)\n\n* python-pillow: backtracking regex in PDF parser could be used as a DOS\nattack (CVE-2021-25292)\n\n* python-pillow: out-of-bounds read in SGIRleDecode.c (CVE-2021-25293)\n\n* nodejs-url-parse: mishandling certain uses of backslash may lead to\nconfidentiality compromise (CVE-2021-27515)\n\n* python-pillow: reported size of a contained image is not properly checked\nfor a BLP container (CVE-2021-27921)\n\n* python-pillow: reported size of a contained image is not properly checked\nfor an ICNS container (CVE-2021-27922)\n\n* python-pillow: reported size of a contained image is not properly checked\nfor an ICO container (CVE-2021-27923)\n\n* python-pillow: buffer overflow in Convert.c because it allow an attacker\nto pass controlled parameters directly into a convert function\n(CVE-2021-34552)\n\n* nodejs-braces: Regular Expression Denial of Service (ReDoS) in\nlib/parsers.js (CVE-2018-1109)\n\n* lodash: Prototype pollution in utilities function (CVE-2018-3721)\n\n* hoek: Prototype pollution in utilities function (CVE-2018-3728)\n\n* lodash: uncontrolled resource consumption in Data handler causing denial\nof service (CVE-2019-1010266)\n\n* nodejs-yargs-parser: prototype pollution vulnerability (CVE-2020-7608)\n\n* python-pillow: decoding a crafted PCX file could result in buffer\nover-read (CVE-2020-35653)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. Bugs fixed (https://bugzilla.redhat.com/):\n\n1500700 - CVE-2017-16138 nodejs-mime: Regular expression Denial of Service\n1500705 - CVE-2017-16137 nodejs-debug: Regular expression Denial of Service\n1545884 - CVE-2018-3721 lodash: Prototype pollution in utilities function\n1545893 - CVE-2018-3728 hoek: Prototype pollution in utilities function\n1546357 - CVE-2018-1107 nodejs-is-my-json-valid: ReDoS when validating JSON fields with email format\n1547272 - CVE-2018-1109 nodejs-braces: Regular Expression Denial of Service (ReDoS) in lib/parsers.js\n1608140 - CVE-2018-16492 nodejs-extend: Prototype pollution can allow attackers to modify object properties\n1743096 - CVE-2019-1010266 lodash: uncontrolled resource consumption in Data handler causing denial of service\n1840004 - CVE-2020-7608 nodejs-yargs-parser: prototype pollution vulnerability\n1857412 - CVE-2020-8203 nodejs-lodash: prototype pollution in zipObjectDeep function\n1857977 - CVE-2020-15366 nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function\n1882256 - CVE-2019-20922 nodejs-handlebars: an endless loop while processing specially-crafted templates leads to DoS\n1882260 - CVE-2019-20920 nodejs-handlebars: lookup helper fails to properly validate templates allowing for arbitrary JavaScript execution\n1901662 - CVE-2020-26237 nodejs-highlight-js: prototype pollution via a crafted HTML code block\n1915257 - CVE-2020-26291 urijs: Hostname spoofing via backslashes in URL\n1915420 - CVE-2020-35653 python-pillow: decoding a crafted PCX file could result in buffer over-read\n1915424 - CVE-2020-35654 python-pillow: decoding crafted YCbCr files could result in heap-based buffer overflow\n1927293 - CVE-2018-21270 nodejs-stringstream: out-of-bounds read leading to uninitialized memory exposure\n1934470 - CVE-2021-27516 nodejs-urijs: mishandling certain uses of backslash may lead to confidentiality compromise\n1934474 - CVE-2021-27515 nodejs-url-parse: mishandling certain uses of backslash may lead to confidentiality compromise\n1934680 - CVE-2021-25289 python-pillow: insufficent fix for CVE-2020-35654 due to incorrect error checking in TiffDecode.c\n1934685 - CVE-2021-25290 python-pillow: negative-offset memcpy with an invalid size in TiffDecode.c\n1934692 - CVE-2021-25291 python-pillow: out-of-bounds read in TiffReadRGBATile in TiffDecode.c\n1934699 - CVE-2021-25292 python-pillow: backtracking regex in PDF parser could be used as a DOS attack\n1934705 - CVE-2021-25293 python-pillow: out-of-bounds read in SGIRleDecode.c\n1935384 - CVE-2021-27921 python-pillow: reported size of a contained image is not properly checked for a BLP container\n1935396 - CVE-2021-27922 python-pillow: reported size of a contained image is not properly checked for an ICNS container\n1935401 - CVE-2021-27923 python-pillow: reported size of a contained image is not properly checked for an ICO container\n1940759 - CVE-2018-3774 nodejs-url-parse: incorrect hostname in url parsing\n1948763 - CVE-2021-23368 nodejs-postcss: Regular expression denial of service during source map parsing\n1954150 - CVE-2021-23382 nodejs-postcss: ReDoS via getAnnotationURL() and loadAnnotation() in lib/previous-map.js\n1955619 - CVE-2021-23364 browserslist: parsing of invalid queries could result in Regular Expression Denial of Service (ReDoS)\n1982378 - CVE-2021-34552 python-pillow: buffer overflow in Convert.c because it allow an attacker to pass controlled parameters directly into a convert function\n\n5. JIRA issues fixed (https://issues.jboss.org/):\n\nPROJQUAY-1417 - zstd compressed layers\nPROJQUAY-1449 - As a Quay admin I want to rely on the Operator to auto-scale all stateless parts of Quay\nPROJQUAY-1535 - As a user I can create and use nested repository name structures\nPROJQUAY-1583 - add \"disconnected\" annotation to operators\nPROJQUAY-1609 - Operator communicates status per managed component\nPROJQUAY-1610 - Operator does not make Quay deployment wait on Clair deployment\nPROJQUAY-1791 - v1beta CRD EOL\nPROJQUAY-1883 - Support OCP Re-encrypt routes\nPROJQUAY-1887 - allow either sha or tag in related images\nPROJQUAY-1926 - As an admin, I want an API to create first user, so I can automate deployment. \nPROJQUAY-1998 - note database deprecations in 3.6 Config Tool\nPROJQUAY-2050 - Support OCP Edge-Termination\nPROJQUAY-2100 - A customer can update the Operator from 3.3 to 3.6 directly\nPROJQUAY-2102 - add clair-4.2 enrichment data to quay UI\nPROJQUAY-672 - MutatingAdmissionWebhook Created Automatically for QBO During Install\n\n6. Bugs fixed (https://bugzilla.redhat.com/):\n\n1858777 - Alert for VM with \u0027evictionStrategy: LiveMigrate\u0027 for local PVs set\n1891921 - virt-launcher is missing /usr/share/zoneinfo directory, making it impossible to set clock offset of timezone type for the guest RTC\n1896469 - In cluster with OVN Kubernetes networking - a node doesn\u0027t recover when configuring linux-bridge over its default NIC\n1903687 - [scale] 1K DV creation failed\n1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation\n1933043 - Delete VM just after it turns into \"running\" is very likely to hit grace period end\n1935219 - [CNV-2.5] Set memory and CPU request on hco-operator and hco-webhook deployments\n1942726 - test automatic bug creation for a new release\n1943164 - Node drain: Sometimes source virt-launcher pod status is Failed and not Completed\n1945589 - Live migration with virtiofs is possible\n1953481 - New OCP priority classes are not used - Deploy\n1953483 - New OCP priority classes are not used - SSP\n1953484 - New OCP priority classes are not used - Storage\n1955129 - Failed to bindmount hotplug-disk for hostpath-provisioner\n1957852 - Could not start VM as restore snapshot was still not Complete\n1958341 - CVE-2021-31525 golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header\n1963963 - hco.kubevirt.io:config-reader role and rolebinding are not strictly reconciled\n1965050 - RoleBinding and ClusterRoleBinding brought in by kubevirt does not get reconciled when kind is ServiceAccount\n1973852 - Introduce VM crashloop backoff\n1976604 - [CNV-5786] IP connectivity is lost after migration (masquerade)\n1976730 - Disk is not usable due to incorrect size for proper alignment\n1979631 - virt-chroot: container disk validation crash prevents VMI from starting/migrating\n1979659 - 4.9.0 containers\n1981345 - 4.9.0 rpms\n1983596 - CVE-2021-34558 golang: crypto/tls: certificate of wrong type is causing TLS client to panic\n1985083 - VMI Pod fails to terminate due to a zombie qemu process\n1985649 - virt-handler Pod is missing xorrisofs command\n1985670 - virt-launcher fails to create v1 controller cpu for group: Read-only file system\n1985719 - Unprivileged client fails to get guest agent data\n1989176 - kube-cni-linux-bridge-plugin Pod is missing bridge CNI plugin\n1989263 - VM Snapshot may freeze guest indefinitely\n1989269 - Online VM Snapshot storing incorrect VM spec\n1989564 - CVE-2021-33195 golang: net: lookup functions may return invalid host names\n1989570 - CVE-2021-33197 golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty\n1989575 - CVE-2021-33198 golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents\n1991691 - Enable DownwardMetrics FeatureGate via HCO CR\n1992608 - kubevirt doesn\u0027t respect useEmulation: true\n1993121 - Rhel9 templates - provider-url should be updated to https://www.redhat.com/\n1994389 - Some of the cdi resources missing app labels\n1995295 - SCC annotation of ssp-operator was changed to privileged\n1996407 - [cdi-functional-tests] cdi-docker-registry-host Pod fails to start\n1997014 - Common templates - dataVolumeTemplates API version should be updated\n1998054 - RHEL9 template - update template description. \n1998656 - no \"name\" label in ssp-operator pod\n1999571 - NFS clone not progressing when clone sizes mismatch (target \u003e source)\n1999617 - Unable to create a VM with nonroot VirtLauncher Pods\n1999835 - ConsoleCLIDownload | wrong path in virtctl archive URL\n2000052 - NNCP creation failures after nmstate-handler pod deletion\n2000204 - [4.9.0] [RFE] volumeSnapshotStatuses reason does not check for volume type that do not support snapshots\n2001041 - [4.9.0] Importer attempts to shrink an image in certain situations\n2001047 - Automatic size detection may not request a PVC that is large enough for an import\n2003473 - Failed to Migrate Windows VM with CDROM (readonly)\n2005695 - With descheduler during multiple VMIs migrations, some VMs are restarted\n2006418 - Clone Strategy does not work as described\n2008900 - Eviction of not live migratable VMs due to virt-launcher upgrade can happen outside the upgrade window\n2010742 - [CNV-4.9] VMI is in LiveMigrate loop when Upgrading Cluster from 2.6.7/4.7.32 to OCP 4.8.13\n2011179 - Cluster-wide live migration limits and timeouts are not suitable\n2017394 - After upgrade, live migration is Pending\n2018521 - [Storage] Failed to restore VirtualMachineSnapshot after CNV upgrade\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1983596 - CVE-2021-34558 golang: crypto/tls: certificate of wrong type is causing TLS client to panic\n1992006 - CVE-2021-29923 golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet\n1998844 - virt-handler Pod is missing xorrisofs command\n2008522 - \"unable to execute QEMU agent command \u0027guest-get-users\u0027\" logs in virt-launcher pod every 10 seconds\n2010334 - VM is not able to be migrated after failed migration\n2012328 - 2.6.8 containers\n2013494 - [CNV-2.6.8] VMI is in LiveMigrate loop when Upgrading Cluster from 2.6.7/4.7.32 to OCP 4.8.13\n\n5", "sources": [ { "db": "NVD", "id": "CVE-2021-22924" }, { "db": "VULHUB", "id": "VHN-381398" }, { "db": "VULMON", "id": "CVE-2021-22924" }, { "db": "PACKETSTORM", "id": "166714" }, { "db": "PACKETSTORM", "id": "169318" }, { "db": "PACKETSTORM", "id": "163637" }, { "db": "PACKETSTORM", "id": "164583" }, { "db": "PACKETSTORM", "id": "164221" }, { "db": "PACKETSTORM", "id": "164342" }, { "db": "PACKETSTORM", "id": "164282" }, { "db": "PACKETSTORM", "id": "164555" }, { "db": "PACKETSTORM", "id": "164755" }, { "db": "PACKETSTORM", "id": "165008" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22924", "trust": 2.2 }, { "db": "SIEMENS", "id": "SSA-732250", "trust": 1.1 }, { "db": "SIEMENS", "id": "SSA-484086", "trust": 1.1 }, { "db": "SIEMENS", "id": "SSA-389290", "trust": 1.1 }, { "db": "HACKERONE", "id": "1223565", "trust": 1.1 }, { "db": "PACKETSTORM", "id": "165008", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "164755", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "164583", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "164948", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-381398", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22924", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "166714", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "169318", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163637", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "164221", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "164342", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "164282", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "164555", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-381398" }, { "db": "VULMON", "id": "CVE-2021-22924" }, { "db": "PACKETSTORM", "id": "166714" }, { "db": "PACKETSTORM", "id": "169318" }, { "db": "PACKETSTORM", "id": "163637" }, { "db": "PACKETSTORM", "id": "164583" }, { "db": "PACKETSTORM", "id": "164221" }, { "db": "PACKETSTORM", "id": "164342" }, { "db": "PACKETSTORM", "id": "164282" }, { "db": "PACKETSTORM", "id": "164555" }, { "db": "PACKETSTORM", "id": "164755" }, { "db": "PACKETSTORM", "id": "165008" }, { "db": "NVD", "id": "CVE-2021-22924" } ] }, "id": "VAR-202108-2222", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-381398" } ], "trust": 0.7410993499999999 }, "last_update_date": "2024-11-29T22:22:49.365000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2021-22924 log" }, { "title": "Arch Linux Advisories: [ASA-202107-61] libcurl-compat: multiple issues", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-202107-61" }, { "title": "Arch Linux Advisories: [ASA-202107-60] lib32-curl: multiple issues", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-202107-60" }, { "title": "Arch Linux Advisories: [ASA-202107-64] lib32-libcurl-gnutls: multiple issues", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-202107-64" }, { "title": "Arch Linux Advisories: [ASA-202107-62] lib32-libcurl-compat: multiple issues", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-202107-62" }, { "title": "Arch Linux Advisories: [ASA-202107-63] libcurl-gnutls: multiple issues", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-202107-63" }, { "title": "Arch Linux Advisories: [ASA-202107-59] curl: multiple issues", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-202107-59" } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-22924" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-706", "trust": 1.1 }, { "problemtype": "CWE-20", "trust": 1.0 } ], "sources": [ { "db": "VULHUB", "id": "VHN-381398" }, { "db": "NVD", "id": "CVE-2021-22924" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.1, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "trust": 1.1, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf" }, { "trust": 1.1, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf" }, { "trust": 1.1, "url": "https://security.netapp.com/advisory/ntap-20210902-0003/" }, { "trust": 1.1, "url": "https://www.debian.org/security/2022/dsa-5197" }, { "trust": 1.1, "url": "https://hackerone.com/reports/1223565" }, { "trust": 1.1, "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "trust": 1.1, "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "trust": 1.1, "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html" }, { "trust": 1.1, "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html" }, { "trust": 1.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22924" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3cdev.kafka.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3cusers.kafka.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3cdev.kafka.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3cusers.kafka.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/frucw2uvnyudzf72dqlfqr4pjec6cf7v/" }, { "trust": 0.8, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.8, "url": "https://access.redhat.com/security/cve/cve-2021-22924" }, { "trust": 0.8, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.8, "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22922" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2021-22922" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2021-22923" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22923" }, { "trust": 0.6, "url": "https://access.redhat.com/security/cve/cve-2021-37750" }, { "trust": 0.6, "url": "https://access.redhat.com/security/cve/cve-2021-36222" }, { "trust": 0.5, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.5, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37750" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36222" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3653" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2021-3653" }, { "trust": 0.3, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-25648" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25648" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22946" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22947" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22898" }, { "trust": 0.2, "url": "https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37576" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-37576" }, { "trust": 0.2, "url": "https://issues.jboss.org/):" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-34558" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-34558" }, { "trust": 0.1, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/frucw2uvnyudzf72dqlfqr4pjec6cf7v/" }, { "trust": 0.1, "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3cdev.kafka.apache.org%3e" }, { "trust": 0.1, "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3cdev.kafka.apache.org%3e" }, { "trust": 0.1, "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3cusers.kafka.apache.org%3e" }, { "trust": 0.1, "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3cusers.kafka.apache.org%3e" }, { "trust": 0.1, "url": "http://seclists.org/oss-sec/2021/q3/26" }, { "trust": 0.1, "url": "https://security.archlinux.org/cve-2021-22924" }, { "trust": 0.1, "url": "https://security.archlinux.org/asa-202107-61" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-22947" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-22946" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22876" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2022:1354" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-22876" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-27782" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-32205" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-27775" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-32206" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-27774" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-32207" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-27781" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-27776" }, { "trust": 0.1, "url": "https://security-tracker.debian.org/tracker/curl" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22576" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22945" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/curl/7.74.0-1ubuntu2.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/curl/7.58.0-2ubuntu3.14" }, { "trust": 0.1, "url": "https://ubuntu.com/security/notices/usn-5021-1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22925" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/curl/7.68.0-1ubuntu2.6" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-22543" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-32626" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32675" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22543" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3656" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-32675" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3949" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-23841" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-41099" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-41099" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3656" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-23840" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-32672" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-32627" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-23841" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32627" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-23840" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-32628" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32626" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32672" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32687" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4658" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4658" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-32687" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32628" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3582" }, { "trust": 0.1, "url": "https://docs.openshift.com/container-platform/4.8/migration_toolkit_for_con" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-38201" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-38201" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3694" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3749" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3749" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-27777" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-29154" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-31535" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3653" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32399" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-23017" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-29650" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27777" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-29154" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-32399" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-29650" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22555" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-23017" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-31535" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-22555" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-27922" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-1109" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-7608" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-26237" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-21270" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-25292" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-26237" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-25289" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-20920" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3728" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-34552" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-35653" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-25289" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-35654" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1109" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-3721" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-23368" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-8203" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1107" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-3774" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-7608" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-16137" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8203" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-21270" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-23382" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-26291" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-15366" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-25291" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-16492" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-27921" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3774" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20920" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-27515" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-20922" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-1010266" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-35654" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-27923" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-25290" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-23364" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16492" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-1010266" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20922" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-1107" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3917" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-26291" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-35653" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-23382" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-16138" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-3728" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3721" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-15366" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-27516" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-16138" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-16137" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-25293" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-23364" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-23368" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-33195" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3121" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-33197" }, { "trust": 0.1, "url": "https://www.redhat.com/" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:4104" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-33195" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3121" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-33198" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-33198" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-31525" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-33197" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-31525" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3733" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3733" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:4725" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-29923" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-29923" } ], "sources": [ { "db": "VULHUB", "id": "VHN-381398" }, { "db": "VULMON", "id": "CVE-2021-22924" }, { "db": "PACKETSTORM", "id": "166714" }, { "db": "PACKETSTORM", "id": "169318" }, { "db": "PACKETSTORM", "id": "163637" }, { "db": "PACKETSTORM", "id": "164583" }, { "db": "PACKETSTORM", "id": "164221" }, { "db": "PACKETSTORM", "id": "164342" }, { "db": "PACKETSTORM", "id": "164282" }, { "db": "PACKETSTORM", "id": "164555" }, { "db": "PACKETSTORM", "id": "164755" }, { "db": "PACKETSTORM", "id": "165008" }, { "db": "NVD", "id": "CVE-2021-22924" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-381398" }, { "db": "VULMON", "id": "CVE-2021-22924" }, { "db": "PACKETSTORM", "id": "166714" }, { "db": "PACKETSTORM", "id": "169318" }, { "db": "PACKETSTORM", "id": "163637" }, { "db": "PACKETSTORM", "id": "164583" }, { "db": "PACKETSTORM", "id": "164221" }, { "db": "PACKETSTORM", "id": "164342" }, { "db": "PACKETSTORM", "id": "164282" }, { "db": "PACKETSTORM", "id": "164555" }, { "db": "PACKETSTORM", "id": "164755" }, { "db": "PACKETSTORM", "id": "165008" }, { "db": "NVD", "id": "CVE-2021-22924" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-05T00:00:00", "db": "VULHUB", "id": "VHN-381398" }, { "date": "2022-04-13T22:20:44", "db": "PACKETSTORM", "id": "166714" }, { "date": "2022-08-28T19:12:00", "db": "PACKETSTORM", "id": "169318" }, { "date": "2021-07-22T23:15:11", "db": "PACKETSTORM", "id": "163637" }, { "date": "2021-10-21T15:31:47", "db": "PACKETSTORM", "id": "164583" }, { "date": "2021-09-21T15:40:44", "db": "PACKETSTORM", "id": "164221" }, { "date": "2021-09-30T16:27:16", "db": "PACKETSTORM", "id": "164342" }, { "date": "2021-09-24T15:49:04", "db": "PACKETSTORM", "id": "164282" }, { "date": "2021-10-19T15:32:20", "db": "PACKETSTORM", "id": "164555" }, { "date": "2021-11-03T17:47:45", "db": "PACKETSTORM", "id": "164755" }, { "date": "2021-11-18T17:07:15", "db": "PACKETSTORM", "id": "165008" }, { "date": "2021-08-05T21:15:11.380000", "db": "NVD", "id": "CVE-2021-22924" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-28T00:00:00", "db": "VULHUB", "id": "VHN-381398" }, { "date": "2024-03-27T15:11:45.923000", "db": "NVD", "id": "CVE-2021-22924" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "169318" }, { "db": "PACKETSTORM", "id": "163637" } ], "trust": 0.2 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat Security Advisory 2022-1354-01", "sources": [ { "db": "PACKETSTORM", "id": "166714" } ], "trust": 0.1 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "overflow", "sources": [ { "db": "PACKETSTORM", "id": "164583" } ], "trust": 0.1 } }
var-202408-0001
Vulnerability from variot
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.1), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.1), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.1), SCALANCE M812-1 ADSL-Router family (All versions < V8.1), SCALANCE M816-1 ADSL-Router family (All versions < V8.1), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.1), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.1), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.1), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.1), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.1), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.1), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.1), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.1), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.1), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.1), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.1), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.1), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.1), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.1), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.1), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.1), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.1), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.1), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.1). Affected devices do not properly enforce isolation between user sessions in their web server component. This could allow an authenticated remote attacker to escalate their privileges on the devices. ruggedcom rm1224 lte(4g) eu firmware, ruggedcom rm1224 lte(4g) nam firmware, scalance m804pb Multiple Siemens products such as firmware have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SCALANCE M-800, MUM-800, S615, RUGGEDCOM RM1224 are all industrial routers
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202408-0001", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance mum856-1 \\", "scope": "lt", "trust": 5.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance mum856-1", "scope": null, "trust": 4.0, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance mum853-1 \\", "scope": "lt", "trust": 3.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m876-4", "scope": null, "trust": 2.4, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance mum853-1", "scope": null, "trust": 2.4, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m816-1 \\", "scope": "lt", "trust": 2.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m876-4 \\", "scope": "lt", "trust": 2.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m812-1 \\", "scope": "lt", "trust": 2.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m876-3", "scope": null, "trust": 1.6, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance s615 eec lan-router", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m874-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m876-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance s615 lan-router", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m874-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m826-2 shdsl-router", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m874-3 3g-router \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m876-3 \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m804pb", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "ruggedcom rm1224 lte\\ eu", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m876-4", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "ruggedcom rm1224 lte\\ nam", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m804pb", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m874-3", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m874-3 3g-router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m874-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224 lte eu", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m826-2 shdsl-router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224 lte nam", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m-800 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "8.1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-35437" }, { "db": "JVNDB", "id": "JVNDB-2024-006497" }, { "db": "NVD", "id": "CVE-2024-41977" } ] }, "cve": "CVE-2024-41977", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2024-35437", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.1, "id": "CVE-2024-41977", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "productcert@siemens.com", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "id": "CVE-2024-41977", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.0, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2024-41977", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2024-41977", "trust": 1.0, "value": "HIGH" }, { "author": "productcert@siemens.com", "id": "CVE-2024-41977", "trust": 1.0, "value": "High" }, { "author": "NVD", "id": "CVE-2024-41977", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2024-35437", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-35437" }, { "db": "JVNDB", "id": "JVNDB-2024-006497" }, { "db": "NVD", "id": "CVE-2024-41977" }, { "db": "NVD", "id": "CVE-2024-41977" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions \u003c V8.1), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions \u003c V8.1), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions \u003c V8.1), SCALANCE M812-1 ADSL-Router family (All versions \u003c V8.1), SCALANCE M816-1 ADSL-Router family (All versions \u003c V8.1), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions \u003c V8.1), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions \u003c V8.1), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions \u003c V8.1), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions \u003c V8.1), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions \u003c V8.1), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions \u003c V8.1), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions \u003c V8.1), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions \u003c V8.1), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions \u003c V8.1), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions \u003c V8.1), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions \u003c V8.1), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions \u003c V8.1), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions \u003c V8.1), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions \u003c V8.1). Affected devices do not properly enforce isolation between user sessions in their web server component. This could allow an authenticated remote attacker to escalate their privileges on the devices. ruggedcom rm1224 lte(4g) eu firmware, ruggedcom rm1224 lte(4g) nam firmware, scalance m804pb Multiple Siemens products such as firmware have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SCALANCE M-800, MUM-800, S615, RUGGEDCOM RM1224 are all industrial routers", "sources": [ { "db": "NVD", "id": "CVE-2024-41977" }, { "db": "JVNDB", "id": "JVNDB-2024-006497" }, { "db": "CNVD", "id": "CNVD-2024-35437" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2024-41977", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-087301", "trust": 2.4 }, { "db": "JVN", "id": "JVNVU99084687", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-24-228-01", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2024-006497", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2024-35437", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-35437" }, { "db": "JVNDB", "id": "JVNDB-2024-006497" }, { "db": "NVD", "id": "CVE-2024-41977" } ] }, "id": "VAR-202408-0001", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2024-35437" } ], "trust": 0.99285713 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-35437" } ] }, "last_update_date": "2024-08-27T19:43:14.983000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Siemens SCALANCE M-800 Series Configuration Error Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/576906" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-35437" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-488", "trust": 1.0 }, { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-006497" }, { "db": "NVD", "id": "CVE-2024-41977" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://cert-portal.siemens.com/productcert/html/ssa-087301.html" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu99084687/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2024-41977" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-228-01" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-35437" }, { "db": "JVNDB", "id": "JVNDB-2024-006497" }, { "db": "NVD", "id": "CVE-2024-41977" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2024-35437" }, { "db": "JVNDB", "id": "JVNDB-2024-006497" }, { "db": "NVD", "id": "CVE-2024-41977" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-08-14T00:00:00", "db": "CNVD", "id": "CNVD-2024-35437" }, { "date": "2024-08-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2024-006497" }, { "date": "2024-08-13T08:15:15.640000", "db": "NVD", "id": "CVE-2024-41977" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-08-14T00:00:00", "db": "CNVD", "id": "CNVD-2024-35437" }, { "date": "2024-08-26T05:28:00", "db": "JVNDB", "id": "JVNDB-2024-006497" }, { "date": "2024-08-23T18:39:13.990000", "db": "NVD", "id": "CVE-2024-41977" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerabilities in multiple Siemens products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-006497" } ], "trust": 0.8 } }
var-202411-0487
Vulnerability from variot
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2). Affected devices improperly manage access control for read-only users. This could allow an attacker to cause a temporary denial of service condition. ruggedcom rm1224 lte(4g) eu firmware, ruggedcom rm1224 lte(4g) nam firmware, scalance m804pb Multiple Siemens products such as firmware have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. SCALANCE M-800, MUM-800 and S615 as well as RUGGEDCOM RM1224 are industrial routers
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202411-0487", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance mum856-1 \\", "scope": "lt", "trust": 5.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance mum853-1 \\", "scope": "lt", "trust": 3.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m876-4", "scope": null, "trust": 2.4, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance mum853-1", "scope": null, "trust": 2.4, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m812-1 \\", "scope": "lt", "trust": 2.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m816-1 \\", "scope": "lt", "trust": 2.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m876-4 \\", "scope": "lt", "trust": 2.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m874-3", "scope": null, "trust": 1.6, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m812-1", "scope": null, "trust": 1.6, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m816-1", "scope": null, "trust": 1.6, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m876-3", "scope": null, "trust": 1.6, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m876-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m804pb", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance s615", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m876-3 \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m826-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "ruggedcom rm1224 lte\\ nam", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance s615 eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m874-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m874-3 \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "ruggedcom rm1224 lte\\ eu", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m874-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m876-4", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance mum856-1", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m874-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224 lte nam", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224 lte eu", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m804pb", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m826-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m-800 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "8.2" }, { "model": "scalance s615 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "8.2" }, { "model": "ruggedcom rm1224 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "8.2" }, { "model": "scalance mum-800 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "8.2" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-45209" }, { "db": "JVNDB", "id": "JVNDB-2024-012495" }, { "db": "NVD", "id": "CVE-2024-50558" } ] }, "cve": "CVE-2024-50558", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CNVD-2024-45209", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "productcert@siemens.com", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2024-50558", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "OTHER", "availabilityImpact": "Low", "baseScore": 4.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2024-012495", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "productcert@siemens.com", "id": "CVE-2024-50558", "trust": 1.0, "value": "Medium" }, { "author": "OTHER", "id": "JVNDB-2024-012495", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2024-45209", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-45209" }, { "db": "JVNDB", "id": "JVNDB-2024-012495" }, { "db": "NVD", "id": "CVE-2024-50558" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions \u003c V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions \u003c V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions \u003c V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions \u003c V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions \u003c V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions \u003c V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions \u003c V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions \u003c V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions \u003c V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions \u003c V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions \u003c V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions \u003c V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions \u003c V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions \u003c V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions \u003c V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions \u003c V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions \u003c V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions \u003c V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions \u003c V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions \u003c V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions \u003c V8.2). Affected devices improperly manage access control for read-only users. This could allow an attacker to cause a temporary denial of service condition. ruggedcom rm1224 lte(4g) eu firmware, ruggedcom rm1224 lte(4g) nam firmware, scalance m804pb Multiple Siemens products such as firmware have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. SCALANCE M-800, MUM-800 and S615 as well as RUGGEDCOM RM1224 are industrial routers", "sources": [ { "db": "NVD", "id": "CVE-2024-50558" }, { "db": "JVNDB", "id": "JVNDB-2024-012495" }, { "db": "CNVD", "id": "CNVD-2024-45209" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2024-50558", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-354112", "trust": 2.4 }, { "db": "ICS CERT", "id": "ICSA-24-319-06", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU96191615", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2024-012495", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2024-45209", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-45209" }, { "db": "JVNDB", "id": "JVNDB-2024-012495" }, { "db": "NVD", "id": "CVE-2024-50558" } ] }, "id": "VAR-202411-0487", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2024-45209" } ], "trust": 1.23674089 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-45209" } ] }, "last_update_date": "2024-11-20T20:36:16.657000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Multiple Siemens products have access control errors (CNVD-2024-45209)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/617356" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-45209" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-284", "trust": 1.0 }, { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Inappropriate access control (CWE-284) [ others ]", "trust": 0.8 }, { "problemtype": " Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-012495" }, { "db": "NVD", "id": "CVE-2024-50558" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://cert-portal.siemens.com/productcert/html/ssa-354112.html" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu96191615/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2024-50558" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-319-06" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-45209" }, { "db": "JVNDB", "id": "JVNDB-2024-012495" }, { "db": "NVD", "id": "CVE-2024-50558" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2024-45209" }, { "db": "JVNDB", "id": "JVNDB-2024-012495" }, { "db": "NVD", "id": "CVE-2024-50558" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-11-18T00:00:00", "db": "CNVD", "id": "CNVD-2024-45209" }, { "date": "2024-11-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2024-012495" }, { "date": "2024-11-12T13:15:12.403000", "db": "NVD", "id": "CVE-2024-50558" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-11-18T00:00:00", "db": "CNVD", "id": "CNVD-2024-45209" }, { "date": "2024-11-19T06:07:00", "db": "JVNDB", "id": "JVNDB-2024-012495" }, { "date": "2024-11-13T19:55:25.200000", "db": "NVD", "id": "CVE-2024-50558" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerabilities in multiple Siemens products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-012495" } ], "trust": 0.8 } }
var-202411-0486
Vulnerability from variot
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2). Affected devices do not properly validate input in configuration fields of the iperf functionality. This could allow an unauthenticated remote attacker to execute arbitrary code on the device. ruggedcom rm1224 lte(4g) eu firmware, ruggedcom rm1224 lte(4g) nam firmware, scalance m804pb Multiple Siemens products such as firmware have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SCALANCE M-800, MUM-800 and S615 as well as RUGGEDCOM RM1224 are industrial routers
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202411-0486", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance mum856-1 \\", "scope": "lt", "trust": 5.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance mum853-1 \\", "scope": "lt", "trust": 3.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m876-4", "scope": null, "trust": 2.4, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance mum853-1", "scope": null, "trust": 2.4, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m812-1 \\", "scope": "lt", "trust": 2.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m816-1 \\", "scope": "lt", "trust": 2.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m876-4 \\", "scope": "lt", "trust": 2.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m874-3", "scope": null, "trust": 1.6, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m812-1", "scope": null, "trust": 1.6, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m816-1", "scope": null, "trust": 1.6, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m876-3", "scope": null, "trust": 1.6, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m876-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m804pb", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance s615", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m876-3 \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m826-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "ruggedcom rm1224 lte\\ nam", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance s615 eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m874-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m874-3 \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "ruggedcom rm1224 lte\\ eu", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m874-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m876-4", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance mum856-1", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m874-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224 lte nam", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224 lte eu", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m804pb", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m826-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m-800 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "8.2" }, { "model": "scalance s615 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "8.2" }, { "model": "ruggedcom rm1224 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "8.2" }, { "model": "scalance mum-800 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "8.2" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-45210" }, { "db": "JVNDB", "id": "JVNDB-2024-012537" }, { "db": "NVD", "id": "CVE-2024-50557" } ] }, "cve": "CVE-2024-50557", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CNVD-2024-45210", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2024-50557", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "productcert@siemens.com", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "id": "CVE-2024-50557", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2024-50557", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2024-50557", "trust": 1.0, "value": "CRITICAL" }, { "author": "productcert@siemens.com", "id": "CVE-2024-50557", "trust": 1.0, "value": "High" }, { "author": "NVD", "id": "CVE-2024-50557", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2024-45210", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-45210" }, { "db": "JVNDB", "id": "JVNDB-2024-012537" }, { "db": "NVD", "id": "CVE-2024-50557" }, { "db": "NVD", "id": "CVE-2024-50557" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions \u003c V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions \u003c V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions \u003c V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions \u003c V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions \u003c V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions \u003c V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions \u003c V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions \u003c V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions \u003c V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions \u003c V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions \u003c V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions \u003c V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions \u003c V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions \u003c V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions \u003c V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions \u003c V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions \u003c V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions \u003c V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions \u003c V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions \u003c V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions \u003c V8.2). Affected devices do not properly validate input in configuration fields of the iperf functionality. This could allow an unauthenticated remote attacker to execute arbitrary code on the device. ruggedcom rm1224 lte(4g) eu firmware, ruggedcom rm1224 lte(4g) nam firmware, scalance m804pb Multiple Siemens products such as firmware have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SCALANCE M-800, MUM-800 and S615 as well as RUGGEDCOM RM1224 are industrial routers", "sources": [ { "db": "NVD", "id": "CVE-2024-50557" }, { "db": "JVNDB", "id": "JVNDB-2024-012537" }, { "db": "CNVD", "id": "CNVD-2024-45210" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2024-50557", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-354112", "trust": 2.4 }, { "db": "ICS CERT", "id": "ICSA-24-319-06", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU96191615", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2024-012537", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2024-45210", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-45210" }, { "db": "JVNDB", "id": "JVNDB-2024-012537" }, { "db": "NVD", "id": "CVE-2024-50557" } ] }, "id": "VAR-202411-0486", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2024-45210" } ], "trust": 1.23674089 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-45210" } ] }, "last_update_date": "2024-11-20T22:03:08.248000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Multiple Siemens products have input validation errors (CNVD-2024-45210)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/617361" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-45210" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 1.0 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [ others ]", "trust": 0.8 }, { "problemtype": " Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-012537" }, { "db": "NVD", "id": "CVE-2024-50557" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://cert-portal.siemens.com/productcert/html/ssa-354112.html" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu96191615/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2024-50557" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-319-06" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-45210" }, { "db": "JVNDB", "id": "JVNDB-2024-012537" }, { "db": "NVD", "id": "CVE-2024-50557" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2024-45210" }, { "db": "JVNDB", "id": "JVNDB-2024-012537" }, { "db": "NVD", "id": "CVE-2024-50557" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-11-18T00:00:00", "db": "CNVD", "id": "CNVD-2024-45210" }, { "date": "2024-11-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2024-012537" }, { "date": "2024-11-12T13:15:12.157000", "db": "NVD", "id": "CVE-2024-50557" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-11-18T00:00:00", "db": "CNVD", "id": "CNVD-2024-45210" }, { "date": "2024-11-19T06:02:00", "db": "JVNDB", "id": "JVNDB-2024-012537" }, { "date": "2024-11-13T19:54:52.490000", "db": "NVD", "id": "CVE-2024-50557" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerabilities in multiple Siemens products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-012537" } ], "trust": 0.8 } }
var-202411-0488
Vulnerability from variot
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2). Affected devices truncates usernames longer than 15 characters when accessed via SSH or Telnet. This could allow an attacker to compromise system integrity. ruggedcom rm1224 lte(4g) eu firmware, ruggedcom rm1224 lte(4g) nam firmware, scalance m804pb Multiple Siemens products such as firmware have unspecified vulnerabilities.Information may be tampered with. SCALANCE M-800, MUM-800 and S615 as well as RUGGEDCOM RM1224 are industrial routers.
Multiple Siemens products have input validation errors that can be exploited by attackers to compromise system integrity
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202411-0488", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance mum856-1 \\", "scope": "lt", "trust": 5.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance mum853-1 \\", "scope": "lt", "trust": 3.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m876-4", "scope": null, "trust": 2.4, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance mum853-1", "scope": null, "trust": 2.4, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m812-1 \\", "scope": "lt", "trust": 2.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m816-1 \\", "scope": "lt", "trust": 2.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m876-4 \\", "scope": "lt", "trust": 2.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m874-3", "scope": null, "trust": 1.6, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m812-1", "scope": null, "trust": 1.6, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m816-1", "scope": null, "trust": 1.6, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m876-3", "scope": null, "trust": 1.6, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m876-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m804pb", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance s615", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m876-3 \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m826-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "ruggedcom rm1224 lte\\ nam", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance s615 eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m874-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m874-3 \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "ruggedcom rm1224 lte\\ eu", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m874-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m876-4", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance mum856-1", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m874-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224 lte nam", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224 lte eu", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m804pb", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m826-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m-800 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "8.2" }, { "model": "scalance s615 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "8.2" }, { "model": "ruggedcom rm1224 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "8.2" }, { "model": "scalance mum-800 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "8.2" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-44937" }, { "db": "JVNDB", "id": "JVNDB-2024-012574" }, { "db": "NVD", "id": "CVE-2024-50560" } ] }, "cve": "CVE-2024-50560", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CNVD-2024-44937", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.6, "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2024-50560", "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "productcert@siemens.com", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 1.6, "id": "CVE-2024-50560", "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2024-50560", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2024-50560", "trust": 1.0, "value": "MEDIUM" }, { "author": "productcert@siemens.com", "id": "CVE-2024-50560", "trust": 1.0, "value": "Low" }, { "author": "NVD", "id": "CVE-2024-50560", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2024-44937", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-44937" }, { "db": "JVNDB", "id": "JVNDB-2024-012574" }, { "db": "NVD", "id": "CVE-2024-50560" }, { "db": "NVD", "id": "CVE-2024-50560" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions \u003c V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions \u003c V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions \u003c V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions \u003c V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions \u003c V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions \u003c V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions \u003c V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions \u003c V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions \u003c V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions \u003c V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions \u003c V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions \u003c V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions \u003c V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions \u003c V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions \u003c V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions \u003c V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions \u003c V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions \u003c V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions \u003c V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions \u003c V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions \u003c V8.2). Affected devices truncates usernames longer than 15 characters when accessed via SSH or Telnet. This could allow an attacker to compromise system integrity. ruggedcom rm1224 lte(4g) eu firmware, ruggedcom rm1224 lte(4g) nam firmware, scalance m804pb Multiple Siemens products such as firmware have unspecified vulnerabilities.Information may be tampered with. SCALANCE M-800, MUM-800 and S615 as well as RUGGEDCOM RM1224 are industrial routers. \n\nMultiple Siemens products have input validation errors that can be exploited by attackers to compromise system integrity", "sources": [ { "db": "NVD", "id": "CVE-2024-50560" }, { "db": "JVNDB", "id": "JVNDB-2024-012574" }, { "db": "CNVD", "id": "CNVD-2024-44937" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2024-50560", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-354112", "trust": 2.4 }, { "db": "ICS CERT", "id": "ICSA-24-319-06", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU96191615", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2024-012574", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2024-44937", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-44937" }, { "db": "JVNDB", "id": "JVNDB-2024-012574" }, { "db": "NVD", "id": "CVE-2024-50560" } ] }, "id": "VAR-202411-0488", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2024-44937" } ], "trust": 1.23674089 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-44937" } ] }, "last_update_date": "2024-11-20T21:29:41.909000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Multiple Siemens products have input validation errors (CNVD-2024-44937)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/617346" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-44937" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 1.0 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [ others ]", "trust": 0.8 }, { "problemtype": " Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-012574" }, { "db": "NVD", "id": "CVE-2024-50560" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://cert-portal.siemens.com/productcert/html/ssa-354112.html" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu96191615/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2024-50560" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-319-06" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-44937" }, { "db": "JVNDB", "id": "JVNDB-2024-012574" }, { "db": "NVD", "id": "CVE-2024-50560" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2024-44937" }, { "db": "JVNDB", "id": "JVNDB-2024-012574" }, { "db": "NVD", "id": "CVE-2024-50560" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-11-14T00:00:00", "db": "CNVD", "id": "CNVD-2024-44937" }, { "date": "2024-11-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2024-012574" }, { "date": "2024-11-12T13:15:12.913000", "db": "NVD", "id": "CVE-2024-50560" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-11-14T00:00:00", "db": "CNVD", "id": "CNVD-2024-44937" }, { "date": "2024-11-19T05:58:00", "db": "JVNDB", "id": "JVNDB-2024-012574" }, { "date": "2024-11-13T19:57:26.073000", "db": "NVD", "id": "CVE-2024-50560" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerabilities in multiple Siemens products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-012574" } ], "trust": 0.8 } }
var-202312-0198
Vulnerability from variot
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V7.2.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V7.2.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V7.2.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V7.2.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V7.2.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V7.2.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V7.2.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V7.2.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V7.2.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V7.2.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V7.2.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V7.2.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V7.2.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V7.2.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V7.2.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V7.2.2). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the parsing of the IPSEC configuration. This could allow malicious local administrators to issue commands on system level after a new connection is established. 6gk6108-4am00-2ba2 firmware, 6gk6108-4am00-2da2 firmware, 6gk5804-0ap00-2aa2 Several Siemens products, such as firmware, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SCALANCE M-800, MUM-800 and S615 as well as RUGGEDCOM RM1224 are industrial routers
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202312-0198", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance m876-4", "scope": "lt", "trust": 1.8, "vendor": "siemens", "version": "v7.2.2" }, { "model": "scalance m812-1 adsl-router", "scope": "lt", "trust": 1.2, "vendor": "siemens", "version": "v7.2.2" }, { "model": "scalance m816-1 adsl-router", "scope": "lt", "trust": 1.2, "vendor": "siemens", "version": "v7.2.2" }, { "model": "scalance m876-3", "scope": "lt", "trust": 1.2, "vendor": "siemens", "version": "v7.2.2" }, { "model": "scalance mum856-1", "scope": "lt", "trust": 1.2, "vendor": "siemens", "version": "v7.2.2" }, { "model": "6gk5876-3aa02-2ea2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.2.2" }, { "model": "6gk5856-2ea00-3da1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.2.2" }, { "model": "6gk5816-1ba00-2aa2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.2.2" }, { "model": "6gk5812-1ba00-2aa2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.2.2" }, { "model": "6gk6108-4am00-2ba2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.2.2" }, { "model": "6gk5816-1aa00-2aa2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.2.2" }, { "model": "6gk5856-2ea00-3aa1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.2.2" }, { "model": "6gk5615-0aa00-2aa2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.2.2" }, { "model": "6gk5874-3aa00-2aa2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.2.2" }, { "model": "6gk5876-3aa02-2ba2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.2.2" }, { "model": "6gk5876-4aa10-2ba2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.2.2" }, { "model": "6gk5876-4aa00-2ba2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.2.2" }, { "model": "6gk5874-2aa00-2aa2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.2.2" }, { "model": "6gk5615-0aa01-2aa2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.2.2" }, { "model": "6gk5826-2ab00-2ab2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.2.2" }, { "model": "6gk5812-1aa00-2aa2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.2.2" }, { "model": "6gk5853-2ea00-2da1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.2.2" }, { "model": "6gk5804-0ap00-2aa2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.2.2" }, { "model": "6gk6108-4am00-2da2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.2.2" }, { "model": "6gk5876-4aa00-2da2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.2.2" }, { "model": "6gk5856-2ea00-3aa1", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5812-1aa00-2aa2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5615-0aa01-2aa2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5615-0aa00-2aa2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5856-2ea00-3da1", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5876-3aa02-2ea2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5876-4aa00-2ba2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5812-1ba00-2aa2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5816-1ba00-2aa2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk6108-4am00-2da2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5826-2ab00-2ab2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5874-2aa00-2aa2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk6108-4am00-2ba2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5876-4aa10-2ba2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5876-3aa02-2ba2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5816-1aa00-2aa2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5876-4aa00-2da2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5853-2ea00-2da1", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5874-3aa00-2aa2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5804-0ap00-2aa2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224 lte eu", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v7.2.2" }, { "model": "ruggedcom rm1224 lte nam", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v7.2.2" }, { "model": "scalance m804pb", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v7.2.2" }, { "model": "scalance m826-2 shdsl-router", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v7.2.2" }, { "model": "scalance m874-2", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v7.2.2" }, { "model": "scalance m874-3", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v7.2.2" }, { "model": "scalance mum853-1", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v7.2.2" }, { "model": "scalance s615", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v7.2.2" }, { "model": "scalance s615 eec", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v7.2.2" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-97257" }, { "db": "JVNDB", "id": "JVNDB-2023-019857" }, { "db": "NVD", "id": "CVE-2023-49692" } ] }, "cve": "CVE-2023-49692", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.4, "id": "CNVD-2023-97257", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:M/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "id": "CVE-2023-49692", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "productcert@siemens.com", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "id": "CVE-2023-49692", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.7, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2023-49692", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2023-49692", "trust": 1.0, "value": "MEDIUM" }, { "author": "productcert@siemens.com", "id": "CVE-2023-49692", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2023-49692", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2023-97257", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-97257" }, { "db": "JVNDB", "id": "JVNDB-2023-019857" }, { "db": "NVD", "id": "CVE-2023-49692" }, { "db": "NVD", "id": "CVE-2023-49692" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions \u003c V7.2.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions \u003c V7.2.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions \u003c V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions \u003c V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions \u003c V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions \u003c V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions \u003c V7.2.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions \u003c V7.2.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions \u003c V7.2.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions \u003c V7.2.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions \u003c V7.2.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions \u003c V7.2.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions \u003c V7.2.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions \u003c V7.2.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions \u003c V7.2.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions \u003c V7.2.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions \u003c V7.2.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions \u003c V7.2.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions \u003c V7.2.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions \u003c V7.2.2). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the parsing of the IPSEC configuration. This could allow malicious local administrators to issue commands on system level after a new connection is established. 6gk6108-4am00-2ba2 firmware, 6gk6108-4am00-2da2 firmware, 6gk5804-0ap00-2aa2 Several Siemens products, such as firmware, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SCALANCE M-800, MUM-800 and S615 as well as RUGGEDCOM RM1224 are industrial routers", "sources": [ { "db": "NVD", "id": "CVE-2023-49692" }, { "db": "JVNDB", "id": "JVNDB-2023-019857" }, { "db": "CNVD", "id": "CNVD-2023-97257" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2023-49692", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-068047", "trust": 1.8 }, { "db": "SIEMENS", "id": "SSA-602936", "trust": 1.0 }, { "db": "JVN", "id": "JVNVU98271228", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU91198149", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-23-348-13", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-24-046-09", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2023-019857", "trust": 0.8 }, { "db": "SIEMENS", "id": "SSA-077170", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2023-97257", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-97257" }, { "db": "JVNDB", "id": "JVNDB-2023-019857" }, { "db": "NVD", "id": "CVE-2023-49692" } ] }, "id": "VAR-202312-0198", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2023-97257" } ], "trust": 1.5 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-97257" } ] }, "last_update_date": "2024-08-14T12:16:28.465000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Siemens SCALANCE M-800/S615 series operating system command injection vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/500316" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-97257" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-78", "trust": 1.0 }, { "problemtype": "OS Command injection (CWE-78) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-019857" }, { "db": "NVD", "id": "CVE-2023-49692" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-068047.pdf" }, { "trust": 1.0, "url": "https://cert-portal.siemens.com/productcert/html/ssa-068047.html" }, { "trust": 1.0, "url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu98271228/" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu91198149/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-49692" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-348-13" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-046-09" }, { "trust": 0.6, "url": "https://cert-portal.siemens.com/productcert/html/ssa-077170.html" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-97257" }, { "db": "JVNDB", "id": "JVNDB-2023-019857" }, { "db": "NVD", "id": "CVE-2023-49692" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2023-97257" }, { "db": "JVNDB", "id": "JVNDB-2023-019857" }, { "db": "NVD", "id": "CVE-2023-49692" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-12-13T00:00:00", "db": "CNVD", "id": "CNVD-2023-97257" }, { "date": "2024-01-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-019857" }, { "date": "2023-12-12T12:15:16.203000", "db": "NVD", "id": "CVE-2023-49692" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-12-13T00:00:00", "db": "CNVD", "id": "CNVD-2023-97257" }, { "date": "2024-02-19T07:00:00", "db": "JVNDB", "id": "JVNDB-2023-019857" }, { "date": "2024-08-13T08:15:09.553000", "db": "NVD", "id": "CVE-2023-49692" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "in multiple Siemens products \u00a0OS\u00a0 Command injection vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-019857" } ], "trust": 0.8 } }
var-202212-1134
Vulnerability from variot
Affected devices store the CLI user passwords encrypted in flash memory. Attackers with physical access to the device could retrieve the file and decrypt the CLI user passwords. ruggedcom rm1224 lte(4g) eu firmware, ruggedcom rm1224 lte(4g) nam firmware, scalance m804pb Multiple Siemens products, including firmware, contain vulnerabilities related to storing passwords in a recoverable format.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-1134", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance xr552-12m", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance wam766-1 ecc", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xm416-4c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xr326-2c poe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance sc642-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3" }, { "model": "scalance xc224-4c g eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xr328-4c wg", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w734-1 rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "siplus net scalance xc206-2", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance sc632-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3" }, { "model": "scalance w788-1 rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "siplus net scalance xc208", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xp208poe eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w738-1 m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr524-8c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance s615 eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance m874-2", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2sfp eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance sc646-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3" }, { "model": "ruggedcom rm1224 lte\\ eu", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf204-2bca dna", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc224", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xb208", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc206-2g poe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc224-4c g", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w786-1 rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w748-1 m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance w786-2 sfp", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc216-4c g eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "siplus net scalance xc206-2sfp", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance wum766-1 6ghz", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xp208", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance m826-2 shdsl-router", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance w778-1 m12 eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xr528-6m", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance m876-3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr326-2c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w778-1 m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w788-2 m12 eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xb213-3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance wum766-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xp216eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance sc636-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3" }, { "model": "scalance w788-2 m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance mum853-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "siplus net scalance xc216-4c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc216-4c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc206-2sfp g eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance m804pb", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance w774-1 rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w1788-2ia m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xr526-8c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc206-2g poe eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc216-4c g", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w721-1 rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance mum856-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "ruggedcom rm1224 lte\\ nam", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xb205-3ld", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xb216", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance m874-3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf204-2ba", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w1788-2 eec m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xb205-3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w786-2 rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance sc622-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3" }, { "model": "scalance w761-1 rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc216-3g poe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xf204 dna", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance s615", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance wum763-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xr324wg", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance wam763-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xm408-8c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc206-2sfp g", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w774-1 m12 eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance wam766-1 6ghz", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w786-2ia rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance m812-1 adsl-router", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance wam766-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w774-1 m12 rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xb213-3ld", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc206-2", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xm408-4c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance m816-1 adsl-router", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance w788-1 m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xp208eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w1788-2 m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w722-1 rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance w1748-1 m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc208 poe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance m876-4", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2sfp", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w1788-1 m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc208", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc216", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance sc626-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3" }, { "model": "scalance xc216eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc208 eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xp216", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xf204", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xp216poe eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance s615 eec", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m812-1 adsl-router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m876-4", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance s615", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224 lte eu", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-622-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-636-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224 lte nam", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m816-1 adsl-router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance mum856-1", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m876-3", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc626-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m874-3", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-642-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance mum853-1", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m826-2 shdsl-router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m804pb", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-646-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-632-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m874-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023552" }, { "db": "NVD", "id": "CVE-2022-46142" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens reported these vulnerabilities to CISA.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-3090" } ], "trust": 0.6 }, "cve": "CVE-2022-46142", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "author": "productcert@siemens.com", "availabilityImpact": "LOW", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.9, "id": "CVE-2022-46142", "impactScore": 4.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.9, "id": "CVE-2022-46142", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Physical", "author": "OTHER", "availabilityImpact": "Low", "baseScore": 5.7, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2022-023552", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "productcert@siemens.com", "id": "CVE-2022-46142", "trust": 1.0, "value": "MEDIUM" }, { "author": "nvd@nist.gov", "id": "CVE-2022-46142", "trust": 1.0, "value": "MEDIUM" }, { "author": "OTHER", "id": "JVNDB-2022-023552", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202212-3090", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023552" }, { "db": "CNNVD", "id": "CNNVD-202212-3090" }, { "db": "NVD", "id": "CVE-2022-46142" }, { "db": "NVD", "id": "CVE-2022-46142" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Affected devices store the CLI user passwords encrypted in flash memory. Attackers with physical access to the device could retrieve the file and decrypt the CLI user passwords. ruggedcom rm1224 lte(4g) eu firmware, ruggedcom rm1224 lte(4g) nam firmware, scalance m804pb Multiple Siemens products, including firmware, contain vulnerabilities related to storing passwords in a recoverable format.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46142" }, { "db": "JVNDB", "id": "JVNDB-2022-023552" } ], "trust": 1.62 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46142", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-413565", "trust": 2.4 }, { "db": "ICS CERT", "id": "ICSA-22-349-04", "trust": 1.4 }, { "db": "JVN", "id": "JVNVU91561630", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-023552", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-3090", "trust": 0.6 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023552" }, { "db": "CNNVD", "id": "CNNVD-202212-3090" }, { "db": "NVD", "id": "CVE-2022-46142" } ] }, "id": "VAR-202212-1134", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.6398166875 }, "last_update_date": "2024-08-14T12:13:17.100000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Siemens part of the product Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=218339" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-3090" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-257", "trust": 1.0 }, { "problemtype": "CWE-522", "trust": 1.0 }, { "problemtype": "Password storage in recoverable form (CWE-257) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023552" }, { "db": "NVD", "id": "CVE-2022-46142" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-413565.pdf" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu91561630/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46142" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-04" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-349-04" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46142/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023552" }, { "db": "CNNVD", "id": "CNNVD-202212-3090" }, { "db": "NVD", "id": "CVE-2022-46142" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "JVNDB", "id": "JVNDB-2022-023552" }, { "db": "CNNVD", "id": "CNNVD-202212-3090" }, { "db": "NVD", "id": "CVE-2022-46142" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-11-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023552" }, { "date": "2022-12-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-3090" }, { "date": "2022-12-13T16:15:25.067000", "db": "NVD", "id": "CVE-2022-46142" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-11-29T03:03:00", "db": "JVNDB", "id": "JVNDB-2022-023552" }, { "date": "2023-03-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-3090" }, { "date": "2023-03-14T10:15:24.137000", "db": "NVD", "id": "CVE-2022-46142" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Recoverable password storage vulnerability in multiple Siemens products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023552" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-3090" } ], "trust": 0.6 } }
var-202408-0002
Vulnerability from variot
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.1), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.1), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.1), SCALANCE M812-1 ADSL-Router family (All versions < V8.1), SCALANCE M816-1 ADSL-Router family (All versions < V8.1), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.1), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.1), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.1), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.1), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.1), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.1), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.1), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.1), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.1), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.1), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.1), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.1), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.1), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.1), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.1), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.1), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.1), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.1), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.1). Affected devices insert sensitive information about the generation of 2FA tokens into log files. This could allow an authenticated remote attacker to forge 2FA tokens of other users. ruggedcom rm1224 lte(4g) eu firmware, ruggedcom rm1224 lte(4g) nam firmware, scalance m804pb Multiple Siemens products, including firmware, contain vulnerabilities that may allow information to be leaked from log files.Information may be obtained. SCALANCE M-800, MUM-800, S615, RUGGEDCOM RM1224 are all industrial routers.
The Siemens SCALANCE M-800 series has an information disclosure vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202408-0002", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance mum856-1 \\", "scope": "lt", "trust": 5.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance mum856-1", "scope": null, "trust": 4.0, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance mum853-1 \\", "scope": "lt", "trust": 3.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m876-4", "scope": null, "trust": 2.4, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance mum853-1", "scope": null, "trust": 2.4, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m816-1 \\", "scope": "lt", "trust": 2.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m876-4 \\", "scope": "lt", "trust": 2.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m812-1 \\", "scope": "lt", "trust": 2.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m876-3", "scope": null, "trust": 1.6, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance s615 eec lan-router", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m874-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m876-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance s615 lan-router", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m874-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m826-2 shdsl-router", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m874-3 3g-router \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m876-3 \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m804pb", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "ruggedcom rm1224 lte\\ eu", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m876-4", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "ruggedcom rm1224 lte\\ nam", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m804pb", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m874-3", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m874-3 3g-router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m874-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224 lte eu", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m826-2 shdsl-router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224 lte nam", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m-800 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "8.1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-35436" }, { "db": "JVNDB", "id": "JVNDB-2024-006488" }, { "db": "NVD", "id": "CVE-2024-41978" } ] }, "cve": "CVE-2024-41978", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 6.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CNVD-2024-35436", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:C/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2024-41978", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2024-41978", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2024-41978", "trust": 1.0, "value": "MEDIUM" }, { "author": "productcert@siemens.com", "id": "CVE-2024-41978", "trust": 1.0, "value": "High" }, { "author": "NVD", "id": "CVE-2024-41978", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2024-35436", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-35436" }, { "db": "JVNDB", "id": "JVNDB-2024-006488" }, { "db": "NVD", "id": "CVE-2024-41978" }, { "db": "NVD", "id": "CVE-2024-41978" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions \u003c V8.1), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions \u003c V8.1), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions \u003c V8.1), SCALANCE M812-1 ADSL-Router family (All versions \u003c V8.1), SCALANCE M816-1 ADSL-Router family (All versions \u003c V8.1), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions \u003c V8.1), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions \u003c V8.1), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions \u003c V8.1), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions \u003c V8.1), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions \u003c V8.1), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions \u003c V8.1), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions \u003c V8.1), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions \u003c V8.1), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions \u003c V8.1), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions \u003c V8.1), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions \u003c V8.1), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions \u003c V8.1), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions \u003c V8.1), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions \u003c V8.1). Affected devices insert sensitive information about the generation of 2FA tokens into log files. This could allow an authenticated remote attacker to forge 2FA tokens of other users. ruggedcom rm1224 lte(4g) eu firmware, ruggedcom rm1224 lte(4g) nam firmware, scalance m804pb Multiple Siemens products, including firmware, contain vulnerabilities that may allow information to be leaked from log files.Information may be obtained. SCALANCE M-800, MUM-800, S615, RUGGEDCOM RM1224 are all industrial routers. \n\nThe Siemens SCALANCE M-800 series has an information disclosure vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2024-41978" }, { "db": "JVNDB", "id": "JVNDB-2024-006488" }, { "db": "CNVD", "id": "CNVD-2024-35436" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2024-41978", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-087301", "trust": 2.4 }, { "db": "JVN", "id": "JVNVU99084687", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-24-228-01", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2024-006488", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2024-35436", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-35436" }, { "db": "JVNDB", "id": "JVNDB-2024-006488" }, { "db": "NVD", "id": "CVE-2024-41978" } ] }, "id": "VAR-202408-0002", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2024-35436" } ], "trust": 0.99285713 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-35436" } ] }, "last_update_date": "2024-08-27T19:21:24.432000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Siemens SCALANCE M-800 Series Information Disclosure Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/576901" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-35436" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-532", "trust": 1.0 }, { "problemtype": "Information leakage from log files (CWE-532) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-006488" }, { "db": "NVD", "id": "CVE-2024-41978" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://cert-portal.siemens.com/productcert/html/ssa-087301.html" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu99084687/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2024-41978" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-228-01" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-35436" }, { "db": "JVNDB", "id": "JVNDB-2024-006488" }, { "db": "NVD", "id": "CVE-2024-41978" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2024-35436" }, { "db": "JVNDB", "id": "JVNDB-2024-006488" }, { "db": "NVD", "id": "CVE-2024-41978" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-08-14T00:00:00", "db": "CNVD", "id": "CNVD-2024-35436" }, { "date": "2024-08-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2024-006488" }, { "date": "2024-08-13T08:15:15.903000", "db": "NVD", "id": "CVE-2024-41978" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-08-14T00:00:00", "db": "CNVD", "id": "CNVD-2024-35436" }, { "date": "2024-08-26T05:09:00", "db": "JVNDB", "id": "JVNDB-2024-006488" }, { "date": "2024-08-23T18:34:36.283000", "db": "NVD", "id": "CVE-2024-41978" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerability related to information leakage from log files in multiple Siemens products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-006488" } ], "trust": 0.8 } }
var-202312-0199
Vulnerability from variot
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.0). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the handling of the DDNS configuration. This could allow malicious local administrators to issue commands on system level after a successful IP address update. 6gk6108-4am00-2ba2 firmware, 6gk6108-4am00-2da2 firmware, 6gk5804-0ap00-2aa2 Several Siemens products, such as firmware, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SCALANCE M-800, MUM-800 and S615 as well as RUGGEDCOM RM1224 are industrial routers.
Siemens SCALANCE M-800/S615 series has an operating system command injection vulnerability that allows an attacker to execute commands on the system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202312-0199", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance m876-4", "scope": "lt", "trust": 1.8, "vendor": "siemens", "version": "v8.0" }, { "model": "scalance m812-1 adsl-router", "scope": "lt", "trust": 1.2, "vendor": "siemens", "version": "v8.0" }, { "model": "scalance m816-1 adsl-router", "scope": "lt", "trust": 1.2, "vendor": "siemens", "version": "v8.0" }, { "model": "scalance m876-3", "scope": "lt", "trust": 1.2, "vendor": "siemens", "version": "v8.0" }, { "model": "scalance mum856-1", "scope": "lt", "trust": 1.2, "vendor": "siemens", "version": "v8.0" }, { "model": "6gk5876-3aa02-2ea2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.0" }, { "model": "6gk6108-4am00-2ba2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.0" }, { "model": "6gk5856-2ea00-3da1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.0" }, { "model": "6gk5816-1ba00-2aa2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.0" }, { "model": "6gk5812-1ba00-2aa2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.0" }, { "model": "6gk5816-1aa00-2aa2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.0" }, { "model": "6gk5615-0aa00-2aa2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.0" }, { "model": "6gk5856-2ea00-3aa1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.0" }, { "model": "6gk5876-4aa10-2ba2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.0" }, { "model": "6gk5876-3aa02-2ba2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.0" }, { "model": "6gk5615-0aa01-2aa2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.0" }, { "model": "6gk5826-2ab00-2ab2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.0" }, { "model": "6gk5874-3aa00-2aa2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.0" }, { "model": "6gk5876-4aa00-2ba2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.0" }, { "model": "6gk5874-2aa00-2aa2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.0" }, { "model": "6gk5853-2ea00-2da1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.0" }, { "model": "6gk5812-1aa00-2aa2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.0" }, { "model": "6gk5804-0ap00-2aa2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.0" }, { "model": "6gk5876-4aa00-2da2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.0" }, { "model": "6gk6108-4am00-2da2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.0" }, { "model": "6gk5853-2ea00-2da1", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5812-1aa00-2aa2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5856-2ea00-3aa1", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5874-3aa00-2aa2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5615-0aa00-2aa2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5816-1ba00-2aa2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5876-3aa02-2ea2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5615-0aa01-2aa2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5874-2aa00-2aa2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5876-4aa00-2da2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5876-4aa10-2ba2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5876-3aa02-2ba2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5816-1aa00-2aa2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk6108-4am00-2da2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5804-0ap00-2aa2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk6108-4am00-2ba2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5812-1ba00-2aa2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5826-2ab00-2ab2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5856-2ea00-3da1", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "6gk5876-4aa00-2ba2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224 lte eu", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v8.0" }, { "model": "ruggedcom rm1224 lte nam", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v8.0" }, { "model": "scalance m804pb", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v8.0" }, { "model": "scalance m826-2 shdsl-router", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v8.0" }, { "model": "scalance m874-2", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v8.0" }, { "model": "scalance m874-3", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v8.0" }, { "model": "scalance mum853-1", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v8.0" }, { "model": "scalance s615", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v8.0" }, { "model": "scalance s615 eec", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v8.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-97258" }, { "db": "JVNDB", "id": "JVNDB-2023-019858" }, { "db": "NVD", "id": "CVE-2023-49691" } ] }, "cve": "CVE-2023-49691", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.4, "id": "CNVD-2023-97258", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:M/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "id": "CVE-2023-49691", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "productcert@siemens.com", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "id": "CVE-2023-49691", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.7, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2023-49691", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2023-49691", "trust": 1.0, "value": "MEDIUM" }, { "author": "productcert@siemens.com", "id": "CVE-2023-49691", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2023-49691", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2023-97258", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-97258" }, { "db": "JVNDB", "id": "JVNDB-2023-019858" }, { "db": "NVD", "id": "CVE-2023-49691" }, { "db": "NVD", "id": "CVE-2023-49691" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions \u003c V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions \u003c V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions \u003c V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions \u003c V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions \u003c V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions \u003c V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions \u003c V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions \u003c V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions \u003c V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions \u003c V8.0), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions \u003c V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions \u003c V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions \u003c V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions \u003c V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions \u003c V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions \u003c V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions \u003c V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions \u003c V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions \u003c V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions \u003c V8.0). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the handling of the DDNS configuration. This could allow malicious local administrators to issue commands on system level after a successful IP address update. 6gk6108-4am00-2ba2 firmware, 6gk6108-4am00-2da2 firmware, 6gk5804-0ap00-2aa2 Several Siemens products, such as firmware, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SCALANCE M-800, MUM-800 and S615 as well as RUGGEDCOM RM1224 are industrial routers. \n\r\n\r\nSiemens SCALANCE M-800/S615 series has an operating system command injection vulnerability that allows an attacker to execute commands on the system", "sources": [ { "db": "NVD", "id": "CVE-2023-49691" }, { "db": "JVNDB", "id": "JVNDB-2023-019858" }, { "db": "CNVD", "id": "CNVD-2023-97258" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2023-49691", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-180704", "trust": 2.4 }, { "db": "SIEMENS", "id": "SSA-602936", "trust": 1.0 }, { "db": "SIEMENS", "id": "SSA-690517", "trust": 1.0 }, { "db": "JVN", "id": "JVNVU91198149", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU93250330", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU98271228", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-24-165-12", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-24-046-09", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-23-348-14", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2023-019858", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2023-97258", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-97258" }, { "db": "JVNDB", "id": "JVNDB-2023-019858" }, { "db": "NVD", "id": "CVE-2023-49691" } ] }, "id": "VAR-202312-0199", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2023-97258" } ], "trust": 1.5 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-97258" } ] }, "last_update_date": "2024-08-14T12:46:32.774000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Siemens SCALANCE M-800/S615 series operating system command injection vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/500366" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-97258" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-78", "trust": 1.0 }, { "problemtype": "OS Command injection (CWE-78) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-019858" }, { "db": "NVD", "id": "CVE-2023-49691" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf" }, { "trust": 1.6, "url": "https://cert-portal.siemens.com/productcert/html/ssa-180704.html" }, { "trust": 1.0, "url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html" }, { "trust": 1.0, "url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu98271228/" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu91198149/index.html" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu93250330/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-49691" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-348-14" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-046-09" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-12" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-97258" }, { "db": "JVNDB", "id": "JVNDB-2023-019858" }, { "db": "NVD", "id": "CVE-2023-49691" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2023-97258" }, { "db": "JVNDB", "id": "JVNDB-2023-019858" }, { "db": "NVD", "id": "CVE-2023-49691" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-12-14T00:00:00", "db": "CNVD", "id": "CNVD-2023-97258" }, { "date": "2024-01-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-019858" }, { "date": "2023-12-12T12:15:15.990000", "db": "NVD", "id": "CVE-2023-49691" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-12-13T00:00:00", "db": "CNVD", "id": "CNVD-2023-97258" }, { "date": "2024-06-17T05:39:00", "db": "JVNDB", "id": "JVNDB-2023-019858" }, { "date": "2024-08-13T08:15:09.340000", "db": "NVD", "id": "CVE-2023-49691" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "in multiple Siemens products \u00a0OS\u00a0 Command injection vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-019858" } ], "trust": 0.8 } }
var-202212-1136
Vulnerability from variot
Affected devices do not check the TFTP blocksize correctly. This could allow an authenticated attacker to read from an uninitialized buffer that potentially contains previously allocated data. ruggedcom rm1224 lte(4g) eu firmware, ruggedcom rm1224 lte(4g) nam firmware, scalance m804pb Multiple Siemens products, including firmware, contain a vulnerability related to improper validation of quantities specified in input.Information may be obtained. SCALANCE M-800, MUM-800 and S615 as well as RUGGEDCOM RM1224 are industrial routers.
The Siemens SCALANCE M-800/S615 series has an information disclosure vulnerability due to the affected device not properly checking the TFTP block size
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-1136", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance m876-4", "scope": "lt", "trust": 1.8, "vendor": "siemens", "version": "v8.0" }, { "model": "scalance m812-1 adsl-router", "scope": "lt", "trust": 1.2, "vendor": "siemens", "version": "v8.0" }, { "model": "scalance m816-1 adsl-router", "scope": "lt", "trust": 1.2, "vendor": "siemens", "version": "v8.0" }, { "model": "scalance m876-3", "scope": "lt", "trust": 1.2, "vendor": "siemens", "version": "v8.0" }, { "model": "scalance mum856-1", "scope": "lt", "trust": 1.2, "vendor": "siemens", "version": "v8.0" }, { "model": "scalance w778-1 m12 eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w788-2 m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance m812-1 adsl-router", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2g poe eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance sc636-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3" }, { "model": "scalance xp208eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w1788-2 eec m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w788-1 m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xb213-3ld", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w761-1 rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w774-1 m12 eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w1788-2ia m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xf204-2ba", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc208 eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xp216poe eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc224", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc216-4c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance mum853-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance w786-2 sfp", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xp216eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "siplus net scalance xc208", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "ruggedcom rm1224 lte\\ eu", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr326-2c poe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xb213-3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w721-1 rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2sfp eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "siplus net scalance xc216-4c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance wam766-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w1788-2 m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xp208", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xr328-4c wg", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xb205-3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w788-1 rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc224-4c g eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc216", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance m816-1 adsl-router", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance s615 eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance m804pb", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr524-8c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "siplus net scalance xc206-2", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc206-2g poe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance sc622-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3" }, { "model": "ruggedcom rm1224 lte\\ nam", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance w786-2ia rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc216eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance wum763-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance wum766-1 6ghz", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc216-4c g", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance m876-4", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf204 dna", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance wam766-1 6ghz", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance m826-2 shdsl-router", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xm416-4c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w738-1 m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance w1788-1 m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xp208poe eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc208 poe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xr526-8c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc206-2sfp g eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance wam766-1 ecc", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w748-1 m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc224-4c g", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w774-1 rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xr552-12m", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance s615", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance w722-1 rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xm408-4c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc206-2sfp g", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w774-1 m12 rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance sc632-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3" }, { "model": "scalance w734-1 rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance sc646-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3" }, { "model": "scalance m874-3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance sc626-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3" }, { "model": "scalance xc216-3g poe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w786-2 rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xr528-6m", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w1748-1 m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w786-1 rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xm408-8c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance m874-2", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance wam763-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w778-1 m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance wum766-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc206-2sfp", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc208", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xp216", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance sc642-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3" }, { "model": "scalance xb216", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc216-4c g eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xr324wg", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc206-2", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xr326-2c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "siplus net scalance xc206-2sfp", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w788-2 m12 eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance mum856-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance m876-3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xb208", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xf204", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xb205-3ld", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xf204-2bca dna", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance s615 eec", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m812-1 adsl-router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m876-4", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance s615", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224 lte eu", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-622-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-636-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224 lte nam", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m816-1 adsl-router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance mum856-1", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m876-3", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc626-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m874-3", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-642-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance mum853-1", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m826-2 shdsl-router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m804pb", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-646-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-632-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m874-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224 lte eu", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v8.0" }, { "model": "ruggedcom rm1224 lte nam", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v8.0" }, { "model": "scalance m804pb", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v8.0" }, { "model": "scalance m826-2 shdsl-router", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v8.0" }, { "model": "scalance m874-2", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v8.0" }, { "model": "scalance m874-3", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v8.0" }, { "model": "scalance mum853-1", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v8.0" }, { "model": "scalance s615", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v8.0" }, { "model": "scalance s615 eec", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v8.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-97251" }, { "db": "JVNDB", "id": "JVNDB-2022-023553" }, { "db": "NVD", "id": "CVE-2022-46143" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens reported these vulnerabilities to CISA.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-3089" } ], "trust": 0.6 }, "cve": "CVE-2022-46143", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.4, "id": "CNVD-2023-97251", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:M/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "productcert@siemens.com", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "exploitabilityScore": 1.2, "id": "CVE-2022-46143", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "OTHER", "availabilityImpact": "None", "baseScore": 2.7, "baseSeverity": "Low", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2022-023553", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "productcert@siemens.com", "id": "CVE-2022-46143", "trust": 1.0, "value": "LOW" }, { "author": "nvd@nist.gov", "id": "CVE-2022-46143", "trust": 1.0, "value": "LOW" }, { "author": "OTHER", "id": "JVNDB-2022-023553", "trust": 0.8, "value": "Low" }, { "author": "CNVD", "id": "CNVD-2023-97251", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202212-3089", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-97251" }, { "db": "JVNDB", "id": "JVNDB-2022-023553" }, { "db": "CNNVD", "id": "CNNVD-202212-3089" }, { "db": "NVD", "id": "CVE-2022-46143" }, { "db": "NVD", "id": "CVE-2022-46143" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Affected devices do not check the TFTP blocksize correctly. This could allow an authenticated attacker to read from an uninitialized buffer that potentially contains previously allocated data. ruggedcom rm1224 lte(4g) eu firmware, ruggedcom rm1224 lte(4g) nam firmware, scalance m804pb Multiple Siemens products, including firmware, contain a vulnerability related to improper validation of quantities specified in input.Information may be obtained. SCALANCE M-800, MUM-800 and S615 as well as RUGGEDCOM RM1224 are industrial routers. \n\r\n\r\nThe Siemens SCALANCE M-800/S615 series has an information disclosure vulnerability due to the affected device not properly checking the TFTP block size", "sources": [ { "db": "NVD", "id": "CVE-2022-46143" }, { "db": "JVNDB", "id": "JVNDB-2022-023553" }, { "db": "CNVD", "id": "CNVD-2023-97251" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46143", "trust": 3.8 }, { "db": "SIEMENS", "id": "SSA-413565", "trust": 2.4 }, { "db": "SIEMENS", "id": "SSA-180704", "trust": 1.6 }, { "db": "ICS CERT", "id": "ICSA-22-349-04", "trust": 1.4 }, { "db": "JVN", "id": "JVNVU91561630", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-023553", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2023-97251", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202212-3089", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-97251" }, { "db": "JVNDB", "id": "JVNDB-2022-023553" }, { "db": "CNNVD", "id": "CNNVD-202212-3089" }, { "db": "NVD", "id": "CVE-2022-46143" } ] }, "id": "VAR-202212-1136", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2023-97251" } ], "trust": 1.2398166874999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-97251" } ] }, "last_update_date": "2024-08-14T12:11:36.523000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Siemens SCALANCE M-800/S615 series information leakage vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/500346" }, { "title": "Siemens part of the product Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=218338" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-97251" }, { "db": "CNNVD", "id": "CNNVD-202212-3089" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-1284", "trust": 1.0 }, { "problemtype": "Improper validation of quantity specified in input (CWE-1284) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023553" }, { "db": "NVD", "id": "CVE-2022-46143" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-413565.pdf" }, { "trust": 1.6, "url": "https://cert-portal.siemens.com/productcert/html/ssa-180704.html" }, { "trust": 1.0, "url": "https://cert-portal.siemens.com/productcert/html/ssa-413565.html" }, { "trust": 1.0, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu91561630/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46143" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-04" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-349-04" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46143/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-97251" }, { "db": "JVNDB", "id": "JVNDB-2022-023553" }, { "db": "CNNVD", "id": "CNNVD-202212-3089" }, { "db": "NVD", "id": "CVE-2022-46143" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2023-97251" }, { "db": "JVNDB", "id": "JVNDB-2022-023553" }, { "db": "CNNVD", "id": "CNNVD-202212-3089" }, { "db": "NVD", "id": "CVE-2022-46143" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-12-14T00:00:00", "db": "CNVD", "id": "CNVD-2023-97251" }, { "date": "2023-11-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023553" }, { "date": "2022-12-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-3089" }, { "date": "2022-12-13T16:15:25.137000", "db": "NVD", "id": "CVE-2022-46143" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-12-13T00:00:00", "db": "CNVD", "id": "CNVD-2023-97251" }, { "date": "2023-11-29T03:03:00", "db": "JVNDB", "id": "JVNDB-2022-023553" }, { "date": "2022-12-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-3089" }, { "date": "2024-08-13T08:15:05.483000", "db": "NVD", "id": "CVE-2022-46143" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-3089" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerability in multiple Siemens products related to improper validation of quantities specified in inputs", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023553" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-3089" } ], "trust": 0.6 } }
var-202411-0491
Vulnerability from variot
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2). Affected devices do not properly validate the filenames of the certificate. This could allow an authenticated remote attacker to append arbitrary values which will lead to compromise of integrity of the system. ruggedcom rm1224 lte(4g) eu firmware, ruggedcom rm1224 lte(4g) nam firmware, scalance m804pb A path traversal vulnerability exists in firmware and other aspects of several Siemens products.Information may be tampered with. SCALANCE M-800, MUM-800 and S615 as well as RUGGEDCOM RM1224 are industrial routers
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202411-0491", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance mum856-1 \\", "scope": "lt", "trust": 5.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance mum853-1 \\", "scope": "lt", "trust": 3.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m876-4", "scope": null, "trust": 2.4, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance mum853-1", "scope": null, "trust": 2.4, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m812-1 \\", "scope": "lt", "trust": 2.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m816-1 \\", "scope": "lt", "trust": 2.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m876-4 \\", "scope": "lt", "trust": 2.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m874-3", "scope": null, "trust": 1.6, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m812-1", "scope": null, "trust": 1.6, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m816-1", "scope": null, "trust": 1.6, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m876-3", "scope": null, "trust": 1.6, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m876-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m804pb", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance s615", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m876-3 \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m826-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "ruggedcom rm1224 lte\\ nam", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance s615 eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m874-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m874-3 \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "ruggedcom rm1224 lte\\ eu", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m874-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance m876-4", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.2" }, { "model": "scalance mum856-1", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m874-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224 lte nam", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224 lte eu", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m804pb", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m826-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m-800 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "8.2" }, { "model": "scalance s615 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "8.2" }, { "model": "ruggedcom rm1224 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "8.2" }, { "model": "scalance mum-800 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "8.2" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-44938" }, { "db": "JVNDB", "id": "JVNDB-2024-012502" }, { "db": "NVD", "id": "CVE-2024-50559" } ] }, "cve": "CVE-2024-50559", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2024-44938", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2024-50559", "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "productcert@siemens.com", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2024-50559", "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2024-50559", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2024-50559", "trust": 1.0, "value": "MEDIUM" }, { "author": "productcert@siemens.com", "id": "CVE-2024-50559", "trust": 1.0, "value": "Medium" }, { "author": "NVD", "id": "CVE-2024-50559", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2024-44938", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-44938" }, { "db": "JVNDB", "id": "JVNDB-2024-012502" }, { "db": "NVD", "id": "CVE-2024-50559" }, { "db": "NVD", "id": "CVE-2024-50559" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions \u003c V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions \u003c V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions \u003c V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions \u003c V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions \u003c V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions \u003c V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions \u003c V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions \u003c V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions \u003c V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions \u003c V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions \u003c V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions \u003c V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions \u003c V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions \u003c V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions \u003c V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions \u003c V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions \u003c V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions \u003c V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions \u003c V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions \u003c V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions \u003c V8.2). Affected devices do not properly validate the filenames of the certificate. This could allow an authenticated remote attacker to append arbitrary values which will lead to compromise of integrity of the system. ruggedcom rm1224 lte(4g) eu firmware, ruggedcom rm1224 lte(4g) nam firmware, scalance m804pb A path traversal vulnerability exists in firmware and other aspects of several Siemens products.Information may be tampered with. SCALANCE M-800, MUM-800 and S615 as well as RUGGEDCOM RM1224 are industrial routers", "sources": [ { "db": "NVD", "id": "CVE-2024-50559" }, { "db": "JVNDB", "id": "JVNDB-2024-012502" }, { "db": "CNVD", "id": "CNVD-2024-44938" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2024-50559", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-354112", "trust": 2.4 }, { "db": "ICS CERT", "id": "ICSA-24-319-06", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU96191615", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2024-012502", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2024-44938", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-44938" }, { "db": "JVNDB", "id": "JVNDB-2024-012502" }, { "db": "NVD", "id": "CVE-2024-50559" } ] }, "id": "VAR-202411-0491", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2024-44938" } ], "trust": 1.23674089 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-44938" } ] }, "last_update_date": "2024-11-20T21:54:14.932000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Path traversal vulnerabilities in multiple Siemens products", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/617351" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-44938" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.0 }, { "problemtype": "Path traversal (CWE-22) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-012502" }, { "db": "NVD", "id": "CVE-2024-50559" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://cert-portal.siemens.com/productcert/html/ssa-354112.html" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu96191615/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2024-50559" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-319-06" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-44938" }, { "db": "JVNDB", "id": "JVNDB-2024-012502" }, { "db": "NVD", "id": "CVE-2024-50559" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2024-44938" }, { "db": "JVNDB", "id": "JVNDB-2024-012502" }, { "db": "NVD", "id": "CVE-2024-50559" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-11-14T00:00:00", "db": "CNVD", "id": "CNVD-2024-44938" }, { "date": "2024-11-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2024-012502" }, { "date": "2024-11-12T13:15:12.653000", "db": "NVD", "id": "CVE-2024-50559" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-11-14T00:00:00", "db": "CNVD", "id": "CNVD-2024-44938" }, { "date": "2024-11-19T06:05:00", "db": "JVNDB", "id": "JVNDB-2024-012502" }, { "date": "2024-11-13T19:56:31.780000", "db": "NVD", "id": "CVE-2024-50559" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Path traversal vulnerability in multiple Siemens products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-012502" } ], "trust": 0.8 } }
var-202408-0003
Vulnerability from variot
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.1), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.1), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.1), SCALANCE M812-1 ADSL-Router family (All versions < V8.1), SCALANCE M816-1 ADSL-Router family (All versions < V8.1), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.1), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.1), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.1), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.1), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.1), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.1), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.1), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.1), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.1), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.1), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.1), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.1), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.1), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.1), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.1), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.1), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.1), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.1), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.1). Affected devices do not properly validate input in specific VPN configuration fields. This could allow an authenticated remote attacker to execute arbitrary code on the device. ruggedcom rm1224 lte(4g) eu firmware, ruggedcom rm1224 lte(4g) nam firmware, scalance m804pb Multiple Siemens products such as firmware have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SCALANCE M-800, MUM-800, S615, RUGGEDCOM RM1224 are all industrial routers
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202408-0003", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance mum856-1 \\", "scope": "lt", "trust": 5.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance mum856-1", "scope": null, "trust": 4.0, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance mum853-1 \\", "scope": "lt", "trust": 3.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m876-4", "scope": null, "trust": 2.4, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance mum853-1", "scope": null, "trust": 2.4, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m816-1 \\", "scope": "lt", "trust": 2.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m876-4 \\", "scope": "lt", "trust": 2.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m812-1 \\", "scope": "lt", "trust": 2.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m876-3", "scope": null, "trust": 1.6, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance s615 eec lan-router", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m874-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m876-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance s615 lan-router", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m874-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m826-2 shdsl-router", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m874-3 3g-router \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m876-3 \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m804pb", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "ruggedcom rm1224 lte\\ eu", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m876-4", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "ruggedcom rm1224 lte\\ nam", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.1" }, { "model": "scalance m804pb", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m874-3", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m874-3 3g-router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m874-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224 lte eu", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m826-2 shdsl-router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224 lte nam", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m-800 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "8.1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-35438" }, { "db": "JVNDB", "id": "JVNDB-2024-006387" }, { "db": "NVD", "id": "CVE-2024-41976" } ] }, "cve": "CVE-2024-41976", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CNVD-2024-35438", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2024-41976", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "productcert@siemens.com", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "id": "CVE-2024-41976", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2024-41976", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2024-41976", "trust": 1.0, "value": "HIGH" }, { "author": "productcert@siemens.com", "id": "CVE-2024-41976", "trust": 1.0, "value": "High" }, { "author": "NVD", "id": "CVE-2024-41976", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2024-35438", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-35438" }, { "db": "JVNDB", "id": "JVNDB-2024-006387" }, { "db": "NVD", "id": "CVE-2024-41976" }, { "db": "NVD", "id": "CVE-2024-41976" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions \u003c V8.1), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions \u003c V8.1), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions \u003c V8.1), SCALANCE M812-1 ADSL-Router family (All versions \u003c V8.1), SCALANCE M816-1 ADSL-Router family (All versions \u003c V8.1), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions \u003c V8.1), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions \u003c V8.1), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions \u003c V8.1), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions \u003c V8.1), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions \u003c V8.1), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions \u003c V8.1), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions \u003c V8.1), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions \u003c V8.1), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions \u003c V8.1), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions \u003c V8.1), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions \u003c V8.1), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions \u003c V8.1), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions \u003c V8.1), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions \u003c V8.1). Affected devices do not properly validate input in specific VPN configuration fields. This could allow an authenticated remote attacker to execute arbitrary code on the device. ruggedcom rm1224 lte(4g) eu firmware, ruggedcom rm1224 lte(4g) nam firmware, scalance m804pb Multiple Siemens products such as firmware have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SCALANCE M-800, MUM-800, S615, RUGGEDCOM RM1224 are all industrial routers", "sources": [ { "db": "NVD", "id": "CVE-2024-41976" }, { "db": "JVNDB", "id": "JVNDB-2024-006387" }, { "db": "CNVD", "id": "CNVD-2024-35438" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2024-41976", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-087301", "trust": 2.4 }, { "db": "JVN", "id": "JVNVU99084687", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-24-228-01", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2024-006387", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2024-35438", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-35438" }, { "db": "JVNDB", "id": "JVNDB-2024-006387" }, { "db": "NVD", "id": "CVE-2024-41976" } ] }, "id": "VAR-202408-0003", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2024-35438" } ], "trust": 0.99285713 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-35438" } ] }, "last_update_date": "2024-08-27T21:42:11.648000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Siemens SCALANCE M-800 Series Input Validation Error Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/576911" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-35438" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-006387" }, { "db": "NVD", "id": "CVE-2024-41976" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://cert-portal.siemens.com/productcert/html/ssa-087301.html" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu99084687/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2024-41976" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-228-01" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-35438" }, { "db": "JVNDB", "id": "JVNDB-2024-006387" }, { "db": "NVD", "id": "CVE-2024-41976" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2024-35438" }, { "db": "JVNDB", "id": "JVNDB-2024-006387" }, { "db": "NVD", "id": "CVE-2024-41976" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-08-14T00:00:00", "db": "CNVD", "id": "CNVD-2024-35438" }, { "date": "2024-08-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2024-006387" }, { "date": "2024-08-13T08:15:15.403000", "db": "NVD", "id": "CVE-2024-41976" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-08-14T00:00:00", "db": "CNVD", "id": "CNVD-2024-35438" }, { "date": "2024-08-26T01:20:00", "db": "JVNDB", "id": "JVNDB-2024-006387" }, { "date": "2024-08-23T18:40:16.173000", "db": "NVD", "id": "CVE-2024-41976" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerabilities in multiple Siemens products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2024-006387" } ], "trust": 0.8 } }
var-202212-1133
Vulnerability from variot
Affected devices use a weak encryption scheme to encrypt the debug zip file. This could allow an authenticated attacker to decrypt the contents of the file and retrieve debug information about the system. ruggedcom rm1224 lte(4g) eu firmware, ruggedcom rm1224 lte(4g) nam firmware, scalance m804pb Multiple Siemens products, including firmware, contain vulnerabilities related to the use of cryptographic algorithms.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-1133", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance xr552-12m", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance wam766-1 ecc", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xm416-4c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xr326-2c poe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance sc642-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3" }, { "model": "scalance xc224-4c g eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xr328-4c wg", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w734-1 rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "siplus net scalance xc206-2", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance sc632-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3" }, { "model": "scalance w788-1 rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "siplus net scalance xc208", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xp208poe eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w738-1 m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr524-8c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance s615 eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance m874-2", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2sfp eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance sc646-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3" }, { "model": "ruggedcom rm1224 lte\\ eu", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf204-2bca dna", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc224", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xb208", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc206-2g poe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc224-4c g", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w786-1 rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w748-1 m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance w786-2 sfp", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc216-4c g eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "siplus net scalance xc206-2sfp", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance wum766-1 6ghz", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xp208", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance m826-2 shdsl-router", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance w778-1 m12 eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xr528-6m", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance m876-3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr326-2c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w778-1 m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w788-2 m12 eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xb213-3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance wum766-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xp216eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance sc636-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3" }, { "model": "scalance w788-2 m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance mum853-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "siplus net scalance xc216-4c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc216-4c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc206-2sfp g eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance m804pb", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance w774-1 rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w1788-2ia m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xr526-8c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc206-2g poe eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc216-4c g", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w721-1 rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance mum856-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "ruggedcom rm1224 lte\\ nam", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xb205-3ld", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xb216", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance m874-3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf204-2ba", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w1788-2 eec m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xb205-3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w786-2 rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance sc622-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3" }, { "model": "scalance w761-1 rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc216-3g poe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xf204 dna", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance s615", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance wum763-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xr324wg", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance wam763-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xm408-8c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc206-2sfp g", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w774-1 m12 eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance wam766-1 6ghz", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w786-2ia rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance m812-1 adsl-router", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance wam766-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w774-1 m12 rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xb213-3ld", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc206-2", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xm408-4c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance m816-1 adsl-router", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance w788-1 m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xp208eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w1788-2 m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w722-1 rj45", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance w1748-1 m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc208 poe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance m876-4", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2sfp", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance w1788-1 m12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc208", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc216", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance sc626-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3" }, { "model": "scalance xc216eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xc208 eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xp216", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xf204", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xp216poe eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance s615 eec", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m812-1 adsl-router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m876-4", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance s615", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224 lte eu", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-622-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-636-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224 lte nam", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m816-1 adsl-router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance mum856-1", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m876-3", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc626-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m874-3", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-642-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance mum853-1", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m826-2 shdsl-router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m804pb", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-646-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-632-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m874-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023551" }, { "db": "NVD", "id": "CVE-2022-46140" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens reported these vulnerabilities to CISA.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-3091" } ], "trust": 0.6 }, "cve": "CVE-2022-46140", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "productcert@siemens.com", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2022-46140", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "OTHER", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2022-023551", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "productcert@siemens.com", "id": "CVE-2022-46140", "trust": 1.0, "value": "MEDIUM" }, { "author": "nvd@nist.gov", "id": "CVE-2022-46140", "trust": 1.0, "value": "MEDIUM" }, { "author": "OTHER", "id": "JVNDB-2022-023551", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202212-3091", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023551" }, { "db": "CNNVD", "id": "CNNVD-202212-3091" }, { "db": "NVD", "id": "CVE-2022-46140" }, { "db": "NVD", "id": "CVE-2022-46140" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Affected devices use a weak encryption scheme to encrypt the debug zip file. This could allow an authenticated attacker to decrypt the contents of the file and retrieve debug information about the system. ruggedcom rm1224 lte(4g) eu firmware, ruggedcom rm1224 lte(4g) nam firmware, scalance m804pb Multiple Siemens products, including firmware, contain vulnerabilities related to the use of cryptographic algorithms.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-46140" }, { "db": "JVNDB", "id": "JVNDB-2022-023551" } ], "trust": 1.62 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46140", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-413565", "trust": 2.4 }, { "db": "ICS CERT", "id": "ICSA-22-349-04", "trust": 1.4 }, { "db": "JVN", "id": "JVNVU91561630", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-023551", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-3091", "trust": 0.6 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023551" }, { "db": "CNNVD", "id": "CNNVD-202212-3091" }, { "db": "NVD", "id": "CVE-2022-46140" } ] }, "id": "VAR-202212-1133", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.6398166875 }, "last_update_date": "2024-08-14T12:05:03.547000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Siemens part of the product Fixes for encryption problem vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=218340" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-3091" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-327", "trust": 1.0 }, { "problemtype": "Use of incomplete or dangerous cryptographic algorithms (CWE-327) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023551" }, { "db": "NVD", "id": "CVE-2022-46140" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-413565.pdf" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu91561630/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46140" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-04" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46140/" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-349-04" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023551" }, { "db": "CNNVD", "id": "CNNVD-202212-3091" }, { "db": "NVD", "id": "CVE-2022-46140" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "JVNDB", "id": "JVNDB-2022-023551" }, { "db": "CNNVD", "id": "CNNVD-202212-3091" }, { "db": "NVD", "id": "CVE-2022-46140" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-11-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023551" }, { "date": "2022-12-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-3091" }, { "date": "2022-12-13T16:15:25.007000", "db": "NVD", "id": "CVE-2022-46140" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-11-29T03:03:00", "db": "JVNDB", "id": "JVNDB-2022-023551" }, { "date": "2022-12-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-3091" }, { "date": "2023-03-14T10:15:23.297000", "db": "NVD", "id": "CVE-2022-46140" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-3091" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerabilities related to the use of cryptographic algorithms in multiple Siemens products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023551" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-3091" } ], "trust": 0.6 } }
cve-2022-31766
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: All versions < V7.1.2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.135Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-697140.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router (Annex A)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router (Annex B)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router (Annex A)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router (Annex B)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (EVDO)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM763-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V1.1.0 \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V1.1.0 \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (US)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V1.1.0 \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V1.1.0 \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (US)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V1.1.0 \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V1.1.0 \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V1.1.0 \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V1.1.0 \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (US)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V1.1.0 \u003c V2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (All versions \u003c V7.1.2), RUGGEDCOM RM1224 LTE(4G) NAM (All versions \u003c V7.1.2), SCALANCE M804PB (All versions \u003c V7.1.2), SCALANCE M812-1 ADSL-Router (Annex A) (All versions \u003c V7.1.2), SCALANCE M812-1 ADSL-Router (Annex B) (All versions \u003c V7.1.2), SCALANCE M816-1 ADSL-Router (Annex A) (All versions \u003c V7.1.2), SCALANCE M816-1 ADSL-Router (Annex B) (All versions \u003c V7.1.2), SCALANCE M826-2 SHDSL-Router (All versions \u003c V7.1.2), SCALANCE M874-2 (All versions \u003c V7.1.2), SCALANCE M874-3 (All versions \u003c V7.1.2), SCALANCE M876-3 (EVDO) (All versions \u003c V7.1.2), SCALANCE M876-3 (ROK) (All versions \u003c V7.1.2), SCALANCE M876-4 (All versions \u003c V7.1.2), SCALANCE M876-4 (EU) (All versions \u003c V7.1.2), SCALANCE M876-4 (NAM) (All versions \u003c V7.1.2), SCALANCE MUM853-1 (EU) (All versions \u003c V7.1.2), SCALANCE MUM856-1 (EU) (All versions \u003c V7.1.2), SCALANCE MUM856-1 (RoW) (All versions \u003c V7.1.2), SCALANCE S615 (All versions \u003c V7.1.2), SCALANCE S615 EEC (All versions \u003c V7.1.2), SCALANCE WAM763-1 (All versions \u003e= V1.1.0 \u003c V2.0), SCALANCE WAM766-1 (EU) (All versions \u003e= V1.1.0 \u003c V2.0), SCALANCE WAM766-1 (US) (All versions \u003e= V1.1.0 \u003c V2.0), SCALANCE WAM766-1 EEC (EU) (All versions \u003e= V1.1.0 \u003c V2.0), SCALANCE WAM766-1 EEC (US) (All versions \u003e= V1.1.0 \u003c V2.0), SCALANCE WUM763-1 (All versions \u003e= V1.1.0 \u003c V2.0), SCALANCE WUM763-1 (All versions \u003e= V1.1.0 \u003c V2.0), SCALANCE WUM766-1 (EU) (All versions \u003e= V1.1.0 \u003c V2.0), SCALANCE WUM766-1 (US) (All versions \u003e= V1.1.0 \u003c V2.0). Affected devices with TCP Event service enabled do not properly handle malformed packets.\r\nThis could allow an unauthenticated remote attacker to cause a denial of service condition and reboot the device thus possibly affecting other network resources." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-14T09:30:35.008Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-697140.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-31766", "datePublished": "2022-10-11T00:00:00", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.135Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49692
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:01:25.938Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-068047.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-068047.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 EEC LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions \u003c V7.2.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions \u003c V7.2.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions \u003c V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions \u003c V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions \u003c V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions \u003c V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions \u003c V7.2.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions \u003c V7.2.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions \u003c V7.2.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions \u003c V7.2.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions \u003c V7.2.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions \u003c V7.2.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions \u003c V7.2.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions \u003c V7.2.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions \u003c V7.2.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions \u003c V7.2.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions \u003c V7.2.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions \u003c V7.2.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions \u003c V7.2.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions \u003c V7.2.2). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the parsing of the IPSEC configuration. This could allow malicious local administrators to issue commands on system level after a new connection is established." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-13T07:53:59.588Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-068047.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-068047.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2023-49692", "datePublished": "2023-12-12T11:27:26.231Z", "dateReserved": "2023-11-29T17:51:25.463Z", "dateUpdated": "2024-08-13T07:53:59.588Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44322
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf | ||
https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf | ||
https://cert-portal.siemens.com/productcert/html/ssa-699386.html | ||
https://cert-portal.siemens.com/productcert/html/ssa-180704.html | ||
https://cert-portal.siemens.com/productcert/html/ssa-602936.html |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: 0 < V8.0 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:52.069Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-180704.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 EEC LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions \u003c V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions \u003c V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions \u003c V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions \u003c V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions \u003c V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions \u003c V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions \u003c V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions \u003c V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions \u003c V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions \u003c V8.0), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions \u003c V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions \u003c V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions \u003c V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions \u003c V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions \u003c V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions \u003c V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions \u003c V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions \u003c V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions \u003c V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions \u003c V8.0). Affected devices can be configured to send emails when certain events occur on the device. When presented with an invalid response from the SMTP server, the device triggers an error that disrupts email sending. An attacker with access to the network can use this to do disable notification of users when certain events occur." } ], "metrics": [ { "cvssV3_1": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-252", "description": "CWE-252: Unchecked Return Value", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-13T07:52:50.641Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-180704.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2023-44322", "datePublished": "2023-11-14T11:04:06.212Z", "dateReserved": "2023-09-28T16:24:50.190Z", "dateUpdated": "2024-08-13T07:52:50.641Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44320
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf | ||
https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf | ||
https://cert-portal.siemens.com/productcert/html/ssa-699386.html | ||
https://cert-portal.siemens.com/productcert/html/ssa-180704.html | ||
https://cert-portal.siemens.com/productcert/html/ssa-602936.html | ||
https://cert-portal.siemens.com/productcert/html/ssa-068047.html |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: 0 < V7.2.2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:52.158Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-180704.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 EEC LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions \u003c V7.2.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions \u003c V7.2.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions \u003c V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions \u003c V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions \u003c V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions \u003c V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions \u003c V7.2.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions \u003c V7.2.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions \u003c V7.2.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions \u003c V7.2.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions \u003c V7.2.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions \u003c V7.2.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions \u003c V7.2.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions \u003c V7.2.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions \u003c V7.2.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions \u003c V7.2.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions \u003c V7.2.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions \u003c V7.2.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions \u003c V7.2.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions \u003c V7.2.2). Affected devices do not properly validate the authentication when performing certain modifications in the web interface allowing an authenticated attacker to influence the user interface configured by an administrator." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-425", "description": "CWE-425: Direct Request (\u0027Forced Browsing\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-13T07:52:19.094Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-180704.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-068047.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2023-44320", "datePublished": "2023-11-14T11:03:59.528Z", "dateReserved": "2023-09-28T16:18:45.648Z", "dateUpdated": "2024-08-13T07:52:19.094Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46143
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: 0 < V7.2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:24:03.372Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-413565.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 EEC LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 EEC LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC622-2C", "vendor": "Siemens", "versions": [ { "lessThan": "V2.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC622-2C", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0", "status": "affected", "version": "V2.3", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC626-2C", "vendor": "Siemens", "versions": [ { "lessThan": "V2.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC626-2C", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0", "status": "affected", "version": "V2.3", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC632-2C", "vendor": "Siemens", "versions": [ { "lessThan": "V2.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC632-2C", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0", "status": "affected", "version": "V2.3", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC636-2C", "vendor": "Siemens", "versions": [ { "lessThan": "V2.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC636-2C", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0", "status": "affected", "version": "V2.3", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC642-2C", "vendor": "Siemens", "versions": [ { "lessThan": "V2.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC642-2C", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0", "status": "affected", "version": "V2.3", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC646-2C", "vendor": "Siemens", "versions": [ { "lessThan": "V2.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC646-2C", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0", "status": "affected", "version": "V2.3", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1748-1 M12", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1748-1 M12", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-1 M12", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-2 EEC M12", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-2 M12", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-2IA M12", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W721-1 RJ45", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W721-1 RJ45", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W722-1 RJ45", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W722-1 RJ45", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W722-1 RJ45", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45 (USA)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W738-1 M12", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W738-1 M12", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 M12", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 M12", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 RJ45", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 RJ45", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W761-1 RJ45", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W761-1 RJ45", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 M12 EEC", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 M12 EEC", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45 (USA)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12 EEC", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12 EEC (USA)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-1 RJ45", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-1 RJ45", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 RJ45", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 RJ45", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 RJ45", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 SFP", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 SFP", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2IA RJ45", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2IA RJ45", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 M12", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 M12", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 RJ45", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 RJ45", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12 EEC", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12 EEC", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12 EEC", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 RJ45", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 RJ45", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 RJ45", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM763-1", "vendor": "Siemens", "versions": [ { "lessThan": "V2.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V2.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (US)", "vendor": "Siemens", "versions": [ { "lessThan": "V2.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V2.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (US)", "vendor": "Siemens", "versions": [ { "lessThan": "V2.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1", "vendor": "Siemens", "versions": [ { "lessThan": "V2.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1", "vendor": "Siemens", "versions": [ { "lessThan": "V2.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V2.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (US)", "vendor": "Siemens", "versions": [ { "lessThan": "V2.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (SC, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3LD (SC, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3LD (SC, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB208 (E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB208 (PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (SC, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (SC, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (ST, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3LD (SC, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3LD (SC, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB216 (E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB216 (PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2 (SC)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2 (ST/BFOC)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE EEC (54 V DC)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G (EIP DEF.)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G (EIP def.)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G PoE", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-3G PoE", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-3G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G (EIP Def.)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G (EIP Def.)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204 DNA", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA DNA", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-4C", "vendor": "Siemens", "versions": [ { "lessThan": "V6.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-4C (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-8C", "vendor": "Siemens", "versions": [ { "lessThan": "V6.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-8C (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM416-4C", "vendor": "Siemens", "versions": [ { "lessThan": "V6.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM416-4C (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208 (Ethernet/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208PoE EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216 (Ethernet/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216POE EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324WG (24 x FE, AC 230V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324WG (24 X FE, DC 24V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR326-2C PoE WG", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR326-2C PoE WG (without UL)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (28xGE, AC 230V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (28xGE, DC 24V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 1x230V", "vendor": "Siemens", "versions": [ { "lessThan": "V6.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 1x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 24V", "vendor": "Siemens", "versions": [ { "lessThan": "V6.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 24V (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 2x230V", "vendor": "Siemens", "versions": [ { "lessThan": "V6.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 2x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 1x230V", "vendor": "Siemens", "versions": [ { "lessThan": "V6.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 1x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 24V", "vendor": "Siemens", "versions": [ { "lessThan": "V6.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 24V (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 2x230V", "vendor": "Siemens", "versions": [ { "lessThan": "V6.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 2x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M", "vendor": "Siemens", "versions": [ { "lessThan": "V6.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (2HR2, L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (2HR2)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M", "vendor": "Siemens", "versions": [ { "lessThan": "V6.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2, L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC206-2", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC206-2SFP", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC208", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC216-4C", "vendor": "Siemens", "versions": [ { "lessThan": "V4.4", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Affected devices do not check the TFTP blocksize correctly. This could allow an authenticated attacker to read from an uninitialized buffer that potentially contains previously allocated data." } ], "metrics": [ { "cvssV3_1": { "baseScore": 2.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1284", "description": "CWE-1284: Improper Validation of Specified Quantity in Input", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-13T07:50:25.824Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-413565.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-413565.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-180704.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-46143", "datePublished": "2022-12-13T00:00:00", "dateReserved": "2022-11-28T00:00:00", "dateUpdated": "2024-08-13T07:50:25.824Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41977
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: 0 < V8.1 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_rcm1224_firmware:6.2:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_rcm1224_firmware", "vendor": "siemens", "versions": [ { "lessThan": "v8.1", "status": "affected", "version": "6.2", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-41977", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-13T15:59:08.645171Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-13T16:01:41.802Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router family", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router family", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3 3G-Router (CN)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (A1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (B1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (A1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (B1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (CN)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 EEC LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions \u003c V8.1), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions \u003c V8.1), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions \u003c V8.1), SCALANCE M812-1 ADSL-Router family (All versions \u003c V8.1), SCALANCE M816-1 ADSL-Router family (All versions \u003c V8.1), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions \u003c V8.1), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions \u003c V8.1), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions \u003c V8.1), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions \u003c V8.1), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions \u003c V8.1), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions \u003c V8.1), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions \u003c V8.1), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions \u003c V8.1), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions \u003c V8.1), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions \u003c V8.1), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions \u003c V8.1), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions \u003c V8.1), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions \u003c V8.1), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions \u003c V8.1). Affected devices do not properly enforce isolation between user sessions in their web server component. This could allow an authenticated remote attacker to escalate their privileges on the devices." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" } }, { "cvssV4_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-488", "description": "CWE-488: Exposure of Data Element to Wrong Session", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-13T07:54:37.591Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-087301.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2024-41977", "datePublished": "2024-08-13T07:54:37.591Z", "dateReserved": "2024-07-25T11:00:11.939Z", "dateUpdated": "2024-08-13T16:01:41.802Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-13946
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller |
Version: 0 < * |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2019-13946", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-09T18:06:01.358486Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-09T18:06:09.778Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-05T00:05:44.023Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-780073.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-780073.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V4.5" } ] }, { "defaultStatus": "unknown", "product": "Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V4.6" } ] }, { "defaultStatus": "unknown", "product": "PROFINET Driver for Controller", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V2.1" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 family", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 LAN-Router", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W-700 IEEE 802.11n family", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c= V6.0.1" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X200-4P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X201-3P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X201-3P IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2P IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2FM", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2LD TS", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2TS", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X206-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X206-1LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X208PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X212-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X212-2LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X216", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X224", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (230V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (24V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (2x 230V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (2x 230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (2x 24V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (2x 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X304-2FE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X306-1LD FE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (230V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (24V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (2x 230V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (2x 230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (2x 24V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (2x 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-3LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-3LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LH", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LH", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LH+", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LH+", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M PoE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M PoE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M TS", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M TS", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X310", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X310", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X310FE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X310FE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X320-1 FE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X320-1-2LD FE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X408-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB-200 family", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC-200", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF-200BA", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF201-3P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF202-2P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF206-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM-400 family", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V6.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP-200", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR-300WG family", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR-500 family", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V6.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (230V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (230V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (230V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (230V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M TS (24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M TS (24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M PoE (230V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M PoE (230V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M PoE (24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M PoE (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M PoE TS (24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 1616 and CP 1604", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V2.8" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 343-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 343-1 Advanced", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 343-1 ERPC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 343-1 Lean", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 443-1", "vendor": "Siemens", "versions": [ { "lessThan": "V3.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 443-1", "vendor": "Siemens", "versions": [ { "lessThan": "V3.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 443-1 Advanced", "vendor": "Siemens", "versions": [ { "lessThan": "V3.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 443-1 OPC UA", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET 200AL IM 157-1 PN", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET 200M IM 153-4 PN IO HF (incl. SIPLUS variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET 200M IM 153-4 PN IO ST (incl. SIPLUS variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET 200MP IM 155-5 PN HF", "vendor": "Siemens", "versions": [ { "lessThan": "V4.2.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET 200MP IM 155-5 PN ST", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET 200pro IM 154-3 PN HF", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET 200pro IM 154-4 PN HF", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET 200SP IM 155-6 PN BA", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET 200SP IM 155-6 PN HF", "vendor": "Siemens", "versions": [ { "lessThan": "V4.2.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET 200SP IM 155-6 PN ST", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET 200SP IM 155-6 PN ST BA", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET200ecoPN, 16DI, DC24V, 8xM12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET200ecoPN, 16DO DC24V/1,3A, 8xM12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET200ecoPN, 4AO U/I 4xM12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET200ecoPN, 8 DIO, DC24V/1,3A, 8xM12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET200ecoPN, 8 DO, DC24V/2A, 8xM12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET200ecoPN, 8AI RTD/TC 8xM12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET200ecoPN, 8AI; 4 U/I; 4 RTD/TC 8xM12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET200ecoPN, 8DI, DC24V, 4xM12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET200ecoPN, 8DI, DC24V, 8xM12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET200ecoPN, 8DO, DC24V/0,5A, 4xM12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET200ecoPN, 8DO, DC24V/1,3A, 4xM12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET200ecoPN, 8DO, DC24V/1,3A, 8xM12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET200ecoPN: IO-Link Master", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET200S (incl. SIPLUS variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC IPC Support, Package for VxWorks", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC MV420 SR-B", "vendor": "Siemens", "versions": [ { "lessThan": "V7.0.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC MV420 SR-B Body", "vendor": "Siemens", "versions": [ { "lessThan": "V7.0.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC MV420 SR-P", "vendor": "Siemens", "versions": [ { "lessThan": "V7.0.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC MV420 SR-P Body", "vendor": "Siemens", "versions": [ { "lessThan": "V7.0.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC MV440 HR", "vendor": "Siemens", "versions": [ { "lessThan": "V7.0.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC MV440 SR", "vendor": "Siemens", "versions": [ { "lessThan": "V7.0.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC MV440 UR", "vendor": "Siemens", "versions": [ { "lessThan": "V7.0.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC PN/PN Coupler (incl. SIPLUS NET variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC RF180C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC RF182C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC RF600R family", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3" } ] }, { "defaultStatus": "unknown", "product": "SIMOTION C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.5" } ] }, { "defaultStatus": "unknown", "product": "SIMOTION D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.5" } ] }, { "defaultStatus": "unknown", "product": "SIMOTION P", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.5" } ] }, { "defaultStatus": "unknown", "product": "SINAMICS DCP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V1.3" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200MP IM 155-5 PN HF", "vendor": "Siemens", "versions": [ { "lessThan": "V4.2.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200MP IM 155-5 PN HF", "vendor": "Siemens", "versions": [ { "lessThan": "V4.2.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL", "vendor": "Siemens", "versions": [ { "lessThan": "V4.2.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200MP IM 155-5 PN ST", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200MP IM 155-5 PN ST TX RAIL", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200SP IM 155-6 PN HF", "vendor": "Siemens", "versions": [ { "lessThan": "V4.2.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200SP IM 155-6 PN HF", "vendor": "Siemens", "versions": [ { "lessThan": "V4.2.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL", "vendor": "Siemens", "versions": [ { "lessThan": "V4.2.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200SP IM 155-6 PN ST", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200SP IM 155-6 PN ST BA", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200SP IM 155-6 PN ST TX RAIL", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET CP 343-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET CP 343-1 Advanced", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET CP 343-1 Lean", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET CP 443-1", "vendor": "Siemens", "versions": [ { "lessThan": "V3.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET CP 443-1 Advanced", "vendor": "Siemens", "versions": [ { "lessThan": "V3.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE X308-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SOFTNET-IE PNIO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Profinet-IO (PNIO) stack versions prior V06.00 do not properly limit\ninternal resource allocation when multiple legitimate diagnostic package\nrequests are sent to the DCE-RPC interface.\nThis could lead to a denial of service condition due to lack of memory\nfor devices that include a vulnerable version of the stack.\n\nThe security vulnerability could be exploited by an attacker with network\naccess to an affected device. Successful exploitation requires no system\nprivileges and no user interaction. An attacker could use the vulnerability\nto compromise the availability of the device." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-09T12:03:58.088Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-780073.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-780073.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-13946", "datePublished": "2020-02-11T15:36:10", "dateReserved": "2019-07-18T00:00:00", "dateUpdated": "2024-08-05T00:05:44.023Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-28400
Vulnerability from cvelistv5
8.7 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller |
Version: All versions |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:seimens:scalance_m812-1_adsl-router_annex_b:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m812-1_adsl-router_annex_b", "vendor": "seimens", "versions": [ { "status": "affected", "version": "0" } ] }, { "cpes": [ "cpe:2.3:a:siemens:development_evaluation_kits_for_profinet_io_dk_standard_ethernet_controller:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "development_evaluation_kits_for_profinet_io_dk_standard_ethernet_controller", "vendor": "siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:development_evaluation_kits_for_profinet_io_ek_ertec_200:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "development_evaluation_kits_for_profinet_io_ek_ertec_200", "vendor": "siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:development_evaluation_kits_for_profinet_io_ek_ertec_200p:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "development_evaluation_kits_for_profinet_io_ek_ertec_200p", "vendor": "siemens", "versions": [ { "lessThan": "v4.7", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:ruggedcom_rm1224:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_rm1224", "vendor": "siemens", "versions": [ { "lessThan": "v6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:scalance_m804pb:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m804pb", "vendor": "siemens", "versions": [ { "lessThan": "v6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:seimens:scalance_m812-1_adsl-router_annex_a:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m812-1_adsl-router_annex_a", "vendor": "seimens", "versions": [ { "lessThan": "v6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:seimens:scalance_m812-1_adsl-router_annex_b:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m812-1_adsl-router_annex_b", "vendor": "seimens", "versions": [ { "lessThan": "6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_m816_1_adsl_router_annex_a:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m816_1_adsl_router_annex_a", "vendor": "siemens", "versions": [ { "lessThan": "v6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_m816-1_adsl-router_annex_b:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m816-1_adsl-router_annex_b", "vendor": "siemens", "versions": [ { "lessThan": "v6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_m826-2_shdsl-router:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m826-2_shdsl-router", "vendor": "siemens", "versions": [ { "lessThan": "v6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalence_m874_2:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalence_m874_2", "vendor": "siemens", "versions": [ { "lessThan": "v6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalence_m874_3:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalence_m874_3", "vendor": "siemens", "versions": [ { "lessThan": "v6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_m876_3_evdo:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m876_3_evdo", "vendor": "siemens", "versions": [ { "lessThan": "v6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_m876_3_rok:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m876_3_rok", "vendor": "siemens", "versions": [ { "lessThan": "6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_m876_4_eu:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m876_4_eu", "vendor": "siemens", "versions": [ { "lessThan": "6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_m876_4_nam:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m876_4_nam", "vendor": "siemens", "versions": [ { "lessThan": "v6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:scalance_s615:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_s615", "vendor": "siemens", "versions": [ { "lessThan": "v6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_w700_ieee_802.11n_family:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_w700_ieee_802.11n_family", "vendor": "siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_w1748_1_m12:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_w1748_1_m12", "vendor": "siemens", "versions": [ { "lessThan": "v3.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_w1788_1_m12:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_w1788_1_m12", "vendor": "siemens", "versions": [ { "lessThan": "v3.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_w1788_2_eec_m12:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_w1788_2_eec_m12", "vendor": "siemens", "versions": [ { "lessThan": "v3.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_w1788_2_m12:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_w1788_2_m12", "vendor": "siemens", "versions": [ { "lessThan": "v3.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_w1788_2ia_m12:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_w1788_2ia_m12", "vendor": "siemens", "versions": [ { "lessThan": "v3.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_x200_4p_irt:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_x200_4p_irt", "vendor": "siemens", "versions": [ { "lessThan": "v5.5.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_x201_3p_irt:0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_x201_3p_irt", "vendor": "siemens", "versions": [ { "lessThan": "v5.5.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_x201_3p_irt_pro:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_x201_3p_irt_pro", "vendor": "siemens", "versions": [ { "lessThan": "v5.5.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalancce_x202_2p_irt:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalancce_x202_2p_irt", "vendor": "siemens", "versions": [ { "lessThan": "v5.5.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalence_202_2p_irt_pro:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalence_202_2p_irt_pro", "vendor": "siemens", "versions": [ { "lessThan": "v5.5.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalancce_x204_2:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalancce_x204_2", "vendor": "siemens", "versions": [ { "lessThan": "v5.25", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalence_x204_2fm:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalence_x204_2fm", "vendor": "siemens", "versions": [ { "lessThan": "v5.25", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalence_x204_2ld:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalence_x204_2ld", "vendor": "siemens", "versions": [ { "lessThan": "v5.25", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalence_x204_2ld_ts:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalence_x204_2ld_ts", "vendor": "siemens", "versions": [ { "lessThan": "v5.25", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalence_x204_2ts:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalence_x204_2ts", "vendor": "siemens", "versions": [ { "lessThan": "v5.25", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2020-28400", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-13T18:59:11.953107Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-24T18:07:44.485Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-04T16:33:59.218Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-599968.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-194-03" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-599968.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.7" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3 3G-Router (CN)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (A1)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (B1)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (A1)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (B1)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (CN)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 EEC LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-2 EEC M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-2 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-2IA M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W721-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W721-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W722-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W722-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W722-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45 (USA)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W738-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W738-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W761-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W761-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45 (USA)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12 EEC (USA)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2IA RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2IA RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X200-4P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X201-3P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X201-3P IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2P IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2FM", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2LD", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2LD TS", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2TS", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X206-1", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X206-1LD", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X208", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X208PRO", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X212-2", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X212-2LD", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X216", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X224", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (230V, coated)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (230V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (24V, coated)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (24V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (2x 230V, coated)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (2x 230V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (2x 24V, coated)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (2x 24V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X304-2FE", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X306-1LD FE", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (230V, coated)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (230V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (24V, coated)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (24V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (2x 230V, coated)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (2x 230V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (2x 24V, coated)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (2x 24V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-3", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-3", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-3LD", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-3LD", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LD", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LD", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LH", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LH", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LH+", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LH+", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M PoE", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M PoE", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M TS", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M TS", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X310", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X310", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X310FE", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X310FE", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X320-1 FE", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X320-1-2LD FE", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X408-2", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (SC, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3LD (SC, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3LD (SC, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB208 (E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB208 (PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (SC, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (SC, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (ST, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3LD (SC, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3LD (SC, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB216 (E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB216 (PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2 (SC)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2 (ST/BFOC)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE EEC (54 V DC)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G (EIP DEF.)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G (EIP def.)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G PoE", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-3G PoE", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-3G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G (EIP Def.)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G (EIP Def.)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF201-3P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF202-2P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204 DNA", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA DNA", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF206-1", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF208", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-4C", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-4C (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-8C", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-8C (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM416-4C", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM416-4C (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208 (Ethernet/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208PoE EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216 (Ethernet/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216POE EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (230V, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (230V, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (230V, ports on rear)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (230V, ports on rear)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (24V, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (24V, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M TS (24V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M TS (24V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (24V, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (24V, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 24V, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 24V, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 24V, ports on rear)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 24V, ports on rear)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M PoE (230V, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M PoE (230V, ports on rear)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M PoE (24V, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M PoE (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M PoE TS (24V, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324WG (24 x FE, AC 230V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324WG (24 X FE, DC 24V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR326-2C PoE WG", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR326-2C PoE WG (without UL)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (28xGE, AC 230V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (28xGE, DC 24V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 1x230V", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 1x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 24V", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 24V (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 2x230V", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 2x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 1x230V", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 1x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 24V", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 24V (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 2x230V", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 2x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (2HR2, L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (2HR2)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2, L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CFU DIQ", "vendor": "Siemens", "versions": [ { "lessThan": "V2.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CFU PA", "vendor": "Siemens", "versions": [ { "lessThan": "V2.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CM 1542-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 1604", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003e= V2.7" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 1616", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003e= V2.7" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 1626", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC IE/PB-LINK", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "V3", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC MV540 H", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC MV540 S", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC MV550 H", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC MV550 S", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC MV560 U", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC MV560 X", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC NET DK-16xx PN IO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003e= V2.7" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC Power Line Booster PLB, Base Module", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC PROFINET Driver", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC S7-1200 CPU family (incl. SIPLUS variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V4.5" } ] }, { "defaultStatus": "unknown", "product": "SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V1.1.3" } ] }, { "defaultStatus": "unknown", "product": "SIMOCODE pro V PROFINET (incl. SIPLUS variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.1.3" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE X308-2", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC206-2", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC206-2SFP", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC208", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC216-4C", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SOFTNET-IE PNIO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Affected devices contain a vulnerability that allows an unauthenticated attacker to trigger a denial of service condition. The vulnerability can be triggered if a large amount of DCP reset packets are sent to the device." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "cvssV4_0": { "baseScore": 8.7, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "version": "4.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770: Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-10T13:53:22.763Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-599968.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-194-03" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-599968.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2020-28400", "datePublished": "2021-07-13T11:02:49", "dateReserved": "2020-11-10T00:00:00", "dateUpdated": "2024-12-10T13:53:22.763Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-50557
Vulnerability from cvelistv5
8.6 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: 0 < V8.2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:siemens:scalance_m874-3_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m874-3_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_m816-1_\\(annex_a\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_m816-1_\\(annex_b\\)_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m816-1_\\(annex_b\\)_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_s615_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_s615_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_s615_eec_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_s615_eec_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_mum856-1_\\(row\\)_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_mum856-1_\\(row\\)_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_mum856-1_\\(eu\\)_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_mum856-1_\\(eu\\)_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_mum856-1_\\(cn\\)_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_mum856-1_\\(cn\\)_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_mum856-1_\\(b1\\)_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_mum856-1_\\(b1\\)_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_mum856-1_\\(a1\\)_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_mum856-1_\\(a1\\)_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_mum853-1_\\(a1\\)_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_mum853-1_\\(a1\\)_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_mum853-1_\\(b1\\)_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_mum853-1_\\(b1\\)_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_mum853-1_\\(eu\\)_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_mum853-1_\\(eu\\)_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_m876-4_\\(eu\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_m876-4_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m876-4_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_m876-3_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m876-3_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_m812-1_\\(annex_a\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_m812-1_\\(annex_b\\)_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m812-1_\\(annex_b\\)_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_m804pb_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m804pb_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_rm1224_lte\\(4g\\)_eu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ruggedcom_rm1224_lte\\(4g\\)_nam_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_rm1224_lte\\(4g\\)_nam_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-50557", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-20T16:25:19.026984Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-20T16:47:43.578Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3 3G-Router (CN)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (A1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (B1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (A1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (B1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (CN)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 EEC LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions \u003c V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions \u003c V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions \u003c V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions \u003c V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions \u003c V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions \u003c V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions \u003c V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions \u003c V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions \u003c V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions \u003c V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions \u003c V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions \u003c V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions \u003c V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions \u003c V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions \u003c V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions \u003c V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions \u003c V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions \u003c V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions \u003c V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions \u003c V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions \u003c V8.2). Affected devices do not properly validate input in configuration fields of the iperf functionality. This could allow an unauthenticated remote attacker to execute arbitrary code on the device." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "cvssV4_0": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-12T12:49:56.426Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-354112.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2024-50557", "datePublished": "2024-11-12T12:49:56.426Z", "dateReserved": "2024-10-24T10:38:08.424Z", "dateUpdated": "2024-11-20T16:47:43.578Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31765
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: All versions < V7.1.2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.033Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-552702.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router (Annex A)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router (Annex B)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router (Annex A)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router (Annex B)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (EVDO)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC622-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC632-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC636-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC642-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC646-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-2 EEC M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-2 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-2IA M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W721-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W721-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W722-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W722-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W722-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45 (USA)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W738-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W738-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W761-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W761-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45 (USA)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12 EEC (USA)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2IA RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2IA RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM763-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (US)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (US)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (US)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (SC, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3LD (SC, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3LD (SC, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB208 (E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB208 (PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (SC, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (SC, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (ST, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3LD (SC, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3LD (SC, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB216 (E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB216 (PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2 (SC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2 (ST/BFOC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE EEC (54 V DC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G (EIP DEF.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G (EIP def.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G PoE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-3G PoE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-3G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G (EIP Def.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G (EIP Def.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204 DNA", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA DNA", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-4C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-4C (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-8C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-8C (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM416-4C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM416-4C (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208 (Ethernet/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208PoE EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216 (Ethernet/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216POE EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324WG (24 x FE, AC 230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324WG (24 X FE, DC 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR326-2C PoE WG", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR326-2C PoE WG (without UL)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (28xGE, AC 230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (28xGE, DC 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 1x230V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 1x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 24V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 24V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 2x230V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 2x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 1x230V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 1x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 24V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 24V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 2x230V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 2x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (2HR2, L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (2HR2)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2, L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC206-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC206-2SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC216-4C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Affected devices do not properly authorize the change password function of the web interface.\r\nThis could allow low privileged users to escalate their privileges." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862: Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-11T09:02:25.347Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-552702.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-31765", "datePublished": "2022-10-11T00:00:00", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.033Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-36323
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: All versions < V7.1.2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:00:04.366Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-710008.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router (Annex A)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router (Annex B)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router (Annex A)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router (Annex B)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (EVDO)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC622-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3.1" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC626-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3.1" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC632-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3.1" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC636-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3.1" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC642-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3.1" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC646-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3.1" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-2 EEC M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-2 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-2IA M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W721-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W721-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W722-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W722-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W722-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45 (USA)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W738-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W738-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W761-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W761-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45 (USA)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12 EEC (USA)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2IA RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2IA RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM763-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (US)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (US)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (US)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (SC, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3LD (SC, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3LD (SC, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB208 (E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB208 (PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (SC, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (SC, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (ST, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3LD (SC, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3LD (SC, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB216 (E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB216 (PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2 (SC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2 (ST/BFOC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE EEC (54 V DC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G (EIP DEF.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G (EIP def.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G PoE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-3G PoE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-3G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G (EIP Def.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G (EIP Def.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204 DNA", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA DNA", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-4C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-4C (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-8C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-8C (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM416-4C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM416-4C (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208 (Ethernet/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208PoE EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216 (Ethernet/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216POE EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324WG (24 x FE, AC 230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324WG (24 X FE, DC 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR326-2C PoE WG", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR326-2C PoE WG (without UL)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (28xGE, AC 230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (28xGE, DC 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 1x230V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 1x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 24V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 24V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 2x230V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 2x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 1x230V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 1x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 24V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 24V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 2x230V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 2x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (2HR2, L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (2HR2)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2, L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC206-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC206-2SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC216-4C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell." } ], "metrics": [ { "cvssV3_1": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-10T10:20:59.701Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-710008.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-36323", "datePublished": "2022-08-10T11:18:33", "dateReserved": "2022-07-20T00:00:00", "dateUpdated": "2024-08-03T10:00:04.366Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-50558
Vulnerability from cvelistv5
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: 0 < V8.2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-50558", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T14:50:50.605395Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T14:50:58.351Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3 3G-Router (CN)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (A1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (B1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (A1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (B1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (CN)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 EEC LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions \u003c V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions \u003c V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions \u003c V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions \u003c V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions \u003c V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions \u003c V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions \u003c V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions \u003c V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions \u003c V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions \u003c V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions \u003c V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions \u003c V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions \u003c V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions \u003c V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions \u003c V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions \u003c V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions \u003c V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions \u003c V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions \u003c V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions \u003c V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions \u003c V8.2). Affected devices improperly manage access control for read-only users. This could allow an attacker to cause a temporary denial of service condition." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-12T12:49:58.734Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-354112.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2024-50558", "datePublished": "2024-11-12T12:49:58.734Z", "dateReserved": "2024-10-24T11:01:04.416Z", "dateUpdated": "2024-11-12T14:50:58.351Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-50572
Vulnerability from cvelistv5
8.6 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: 0 < V8.2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:siemens:scalance_m874-3_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m874-3_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_m816-1_\\(annex_a\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_m816-1_\\(annex_b\\)_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m816-1_\\(annex_b\\)_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_s615_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_s615_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_s615_eec_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_s615_eec_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_mum856-1_\\(row\\)_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_mum856-1_\\(row\\)_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_mum856-1_\\(eu\\)_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_mum856-1_\\(eu\\)_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_mum856-1_\\(cn\\)_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_mum856-1_\\(cn\\)_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_mum856-1_\\(b1\\)_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_mum856-1_\\(b1\\)_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_mum856-1_\\(a1\\)_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_mum856-1_\\(a1\\)_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_mum853-1_\\(a1\\)_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_mum853-1_\\(a1\\)_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_mum853-1_\\(b1\\)_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_mum853-1_\\(b1\\)_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_mum853-1_\\(eu\\)_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_mum853-1_\\(eu\\)_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_m876-4_\\(eu\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_m876-4_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m876-4_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_m876-3_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m876-3_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_m812-1_\\(annex_a\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_m812-1_\\(annex_b\\)_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m812-1_\\(annex_b\\)_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:scalance_m804pb_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m804pb_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_rm1224_lte\\(4g\\)_eu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ruggedcom_rm1224_lte\\(4g\\)_nam_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_rm1224_lte\\(4g\\)_nam_firmware", "vendor": "siemens", "versions": [ { "lessThan": "8.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-50572", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-20T16:51:10.879106Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-20T16:51:19.040Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3 3G-Router (CN)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (A1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (B1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (A1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (B1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (CN)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 EEC LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions \u003c V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions \u003c V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions \u003c V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions \u003c V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions \u003c V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions \u003c V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions \u003c V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions \u003c V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions \u003c V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions \u003c V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions \u003c V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions \u003c V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions \u003c V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions \u003c V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions \u003c V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions \u003c V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions \u003c V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions \u003c V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions \u003c V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions \u003c V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions \u003c V8.2). Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "cvssV4_0": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-12T12:50:08.911Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-354112.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2024-50572", "datePublished": "2024-11-12T12:50:08.911Z", "dateReserved": "2024-10-24T13:47:50.881Z", "dateUpdated": "2024-11-20T16:51:19.040Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-50561
Vulnerability from cvelistv5
5.1 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: 0 < V8.2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-50561", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T14:49:22.927445Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T14:49:34.376Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3 3G-Router (CN)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (A1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (B1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (A1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (B1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (CN)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 EEC LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions \u003c V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions \u003c V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions \u003c V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions \u003c V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions \u003c V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions \u003c V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions \u003c V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions \u003c V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions \u003c V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions \u003c V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions \u003c V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions \u003c V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions \u003c V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions \u003c V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions \u003c V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions \u003c V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions \u003c V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions \u003c V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions \u003c V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions \u003c V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions \u003c V8.2). Affected devices do not properly sanitize the filenames before uploading. This could allow an authenticated remote attacker to compromise of integrity of the system." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "cvssV4_0": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", "version": "4.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-12T12:50:06.660Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-354112.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2024-50561", "datePublished": "2024-11-12T12:50:06.660Z", "dateReserved": "2024-10-24T11:37:28.688Z", "dateUpdated": "2024-11-12T14:49:34.376Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44321
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf | ||
https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf | ||
https://cert-portal.siemens.com/productcert/html/ssa-699386.html | ||
https://cert-portal.siemens.com/productcert/html/ssa-180704.html | ||
https://cert-portal.siemens.com/productcert/html/ssa-602936.html | ||
https://cert-portal.siemens.com/productcert/html/ssa-353002.html | ||
https://cert-portal.siemens.com/productcert/html/ssa-087301.html |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: 0 < V8.1 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.947Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-180704.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-353002.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router family", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router family", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3 3G-Router (CN)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (A1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (B1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (A1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (B1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (CN)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 EEC LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (SC, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3LD (SC, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3LD (SC, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB208 (E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB208 (PN)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (SC, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (SC, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (ST, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3LD (SC, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3LD (SC, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB216 (E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB216 (PN)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2 (SC)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2 (ST/BFOC)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE EEC (54 V DC)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP EEC", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G (EIP DEF.)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G EEC", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208EEC", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G (EIP def.)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G EEC", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G PoE", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-3G PoE", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-3G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G (EIP Def.)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G EEC", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216EEC", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G (EIP Def.)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G EEC", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204 DNA", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA DNA", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208 (Ethernet/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208EEC", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208PoE EEC", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216 (Ethernet/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216EEC", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216POE EEC", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324WG (24 x FE, AC 230V)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324WG (24 X FE, DC 24V)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR326-2C PoE WG", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR326-2C PoE WG (without UL)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (28xGE, AC 230V)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (28xGE, DC 24V)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC206-2", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC206-2SFP", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC208", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC216-4C", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Affected devices do not properly validate the length of inputs when performing certain configuration changes in the web interface allowing an authenticated attacker to cause a denial of service condition. The device needs to be restarted for the web interface to become available again." } ], "metrics": [ { "cvssV3_1": { "baseScore": 2.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" } }, { "cvssV4_0": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-13T07:52:20.955Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-180704.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-353002.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-087301.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2023-44321", "datePublished": "2023-11-14T11:04:02.880Z", "dateReserved": "2023-09-28T16:18:45.648Z", "dateUpdated": "2024-08-13T07:52:20.955Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44373
Vulnerability from cvelistv5
9.4 (Critical) - CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf | ||
https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf | ||
https://cert-portal.siemens.com/productcert/html/ssa-699386.html | ||
https://cert-portal.siemens.com/productcert/html/ssa-180704.html | ||
https://cert-portal.siemens.com/productcert/html/ssa-602936.html | ||
https://cert-portal.siemens.com/productcert/html/ssa-690517.html | ||
https://cert-portal.siemens.com/productcert/html/ssa-721642.html |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: 0 < V8.0 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:07:32.915Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-180704.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 EEC LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAB762-1", "vendor": "Siemens", "versions": [ { "lessThan": "V2.4.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM763-1", "vendor": "Siemens", "versions": [ { "lessThan": "V2.4.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM763-1 (ME)", "vendor": "Siemens", "versions": [ { "lessThan": "V2.4.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM763-1 (US)", "vendor": "Siemens", "versions": [ { "lessThan": "V2.4.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V2.4.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (ME)", "vendor": "Siemens", "versions": [ { "lessThan": "V2.4.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (US)", "vendor": "Siemens", "versions": [ { "lessThan": "V2.4.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V2.4.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (ME)", "vendor": "Siemens", "versions": [ { "lessThan": "V2.4.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (US)", "vendor": "Siemens", "versions": [ { "lessThan": "V2.4.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUB762-1", "vendor": "Siemens", "versions": [ { "lessThan": "V2.4.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUB762-1", "vendor": "Siemens", "versions": [ { "lessThan": "V2.4.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1", "vendor": "Siemens", "versions": [ { "lessThan": "V2.4.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1", "vendor": "Siemens", "versions": [ { "lessThan": "V2.4.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1 (US)", "vendor": "Siemens", "versions": [ { "lessThan": "V2.4.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1 (US)", "vendor": "Siemens", "versions": [ { "lessThan": "V2.4.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V2.4.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (ME)", "vendor": "Siemens", "versions": [ { "lessThan": "V2.4.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (US)", "vendor": "Siemens", "versions": [ { "lessThan": "V2.4.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions \u003c V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions \u003c V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions \u003c V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions \u003c V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions \u003c V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions \u003c V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions \u003c V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions \u003c V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions \u003c V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions \u003c V8.0), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions \u003c V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions \u003c V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions \u003c V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions \u003c V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions \u003c V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions \u003c V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions \u003c V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions \u003c V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions \u003c V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions \u003c V8.0), SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) (All versions \u003c V2.4.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions \u003c V2.4.0), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions \u003c V2.4.0), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions \u003c V2.4.0), SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0) (All versions \u003c V2.4.0), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions \u003c V2.4.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions \u003c V2.4.0), SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0) (All versions \u003c V2.4.0), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions \u003c V2.4.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions \u003c V2.4.0), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) (All versions \u003c V2.4.0), SCALANCE WUB762-1 (6GK5762-1AJ00-2AA0) (All versions \u003c V2.4.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions \u003c V2.4.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions \u003c V2.4.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions \u003c V2.4.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions \u003c V2.4.0), SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0) (All versions \u003c V2.4.0), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions \u003c V2.4.0), SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0) (All versions \u003c V2.4.0). Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. Follow-up of CVE-2022-36323." } ], "metrics": [ { "cvssV3_1": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" } }, { "cvssV4_0": { "baseScore": 9.4, "baseSeverity": "CRITICAL", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H", "version": "4.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-10T09:35:30.906Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-180704.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-721642.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2023-44373", "datePublished": "2023-11-14T11:04:09.777Z", "dateReserved": "2023-09-28T16:33:17.228Z", "dateUpdated": "2024-09-10T09:35:30.906Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44374
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf | ||
https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf | ||
https://cert-portal.siemens.com/productcert/html/ssa-699386.html | ||
https://cert-portal.siemens.com/productcert/html/ssa-180704.html | ||
https://cert-portal.siemens.com/productcert/html/ssa-690517.html |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: 0 < V8.0 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:07:33.316Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-180704.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 EEC LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAB762-1", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM763-1", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM763-1 (ME)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM763-1 (US)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (ME)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (US)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (ME)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (US)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUB762-1", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUB762-1", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1 (US)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1 (US)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (ME)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (US)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions \u003c V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions \u003c V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions \u003c V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions \u003c V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions \u003c V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions \u003c V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions \u003c V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions \u003c V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions \u003c V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions \u003c V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions \u003c V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions \u003c V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions \u003c V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions \u003c V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions \u003c V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions \u003c V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions \u003c V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions \u003c V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions \u003c V8.0), SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) (All versions), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions), SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0) (All versions), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions), SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0) (All versions), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) (All versions), SCALANCE WUB762-1 (6GK5762-1AJ00-2AA0) (All versions), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions), SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0) (All versions), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions), SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0) (All versions). Affected devices allow to change the password, but insufficiently check which password is to be changed. With this an authenticated attacker could, under certain conditions, be able to change the password of another, potential admin user allowing her to escalate her privileges." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-567", "description": "CWE-567: Unsynchronized Access to Shared Data in a Multithreaded Context", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-10T09:36:11.583Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-180704.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2023-44374", "datePublished": "2023-11-14T11:04:13.329Z", "dateReserved": "2023-09-28T16:33:17.228Z", "dateUpdated": "2024-09-10T09:36:11.583Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46140
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: All versions < V7.2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:24:03.297Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-413565.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router (Annex A)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router (Annex B)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router (Annex A)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router (Annex B)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (EVDO)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC622-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC626-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC632-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC636-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC642-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC646-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-2 EEC M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-2 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-2IA M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W721-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W721-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W722-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W722-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W722-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45 (USA)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W738-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W738-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W761-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W761-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45 (USA)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12 EEC (USA)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2IA RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2IA RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM763-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (US)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (US)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (US)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (SC, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3LD (SC, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3LD (SC, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB208 (E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB208 (PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (SC, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (SC, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (ST, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3LD (SC, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3LD (SC, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB216 (E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB216 (PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2 (SC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2 (ST/BFOC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE EEC (54 V DC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G (EIP DEF.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G (EIP def.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G PoE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-3G PoE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-3G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G (EIP Def.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G (EIP Def.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204 DNA", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA DNA", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-4C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-4C (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-8C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-8C (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM416-4C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM416-4C (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208 (Ethernet/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208PoE EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216 (Ethernet/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216POE EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324WG (24 x FE, AC 230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324WG (24 X FE, DC 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR326-2C PoE WG", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR326-2C PoE WG (without UL)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (28xGE, AC 230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (28xGE, DC 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 1x230V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 1x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 24V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 24V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 2x230V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 2x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 1x230V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 1x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 24V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 24V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 2x230V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 2x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (2HR2, L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (2HR2)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2, L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC206-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC206-2SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC216-4C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Affected devices use a weak encryption scheme to encrypt the debug zip file. This could allow an authenticated attacker to decrypt the contents of the file and retrieve debug information about the system." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-327", "description": "CWE-327: Use of a Broken or Risky Cryptographic Algorithm", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-10T10:21:07.520Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-413565.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-46140", "datePublished": "2022-12-13T00:00:00", "dateReserved": "2022-11-28T00:00:00", "dateUpdated": "2024-08-03T14:24:03.297Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44319
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf | ||
https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf | ||
https://cert-portal.siemens.com/productcert/html/ssa-699386.html | ||
https://cert-portal.siemens.com/productcert/html/ssa-180704.html | ||
https://cert-portal.siemens.com/productcert/html/ssa-602936.html | ||
https://cert-portal.siemens.com/productcert/html/ssa-690517.html |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: 0 < V8.0 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:52.078Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-180704.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 EEC LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAB762-1", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM763-1", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM763-1 (ME)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM763-1 (US)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (ME)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (US)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (ME)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (US)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUB762-1", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUB762-1", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1 (US)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1 (US)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (ME)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (US)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions \u003c V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions \u003c V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions \u003c V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions \u003c V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions \u003c V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions \u003c V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions \u003c V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions \u003c V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions \u003c V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions \u003c V8.0), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions \u003c V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions \u003c V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions \u003c V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions \u003c V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions \u003c V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions \u003c V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions \u003c V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions \u003c V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions \u003c V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions \u003c V8.0), SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) (All versions), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions), SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0) (All versions), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions), SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0) (All versions), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) (All versions), SCALANCE WUB762-1 (6GK5762-1AJ00-2AA0) (All versions), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions), SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0) (All versions), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions), SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0) (All versions). Affected devices use a weak checksum algorithm to protect the configuration backup that an administrator can export from the device. This could allow an authenticated attacker with administrative privileges or an attacker that tricks a legitimate administrator to upload a modified configuration file to change the configuration of an affected device." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-328", "description": "CWE-328: Use of Weak Hash", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-10T09:34:51.775Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-180704.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2023-44319", "datePublished": "2023-11-14T11:03:56.130Z", "dateReserved": "2023-09-28T16:18:45.648Z", "dateUpdated": "2024-09-10T09:34:51.775Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34821
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: All versions < V7.2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:10.733Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-517377.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-413565.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router (Annex A)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router (Annex B)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router (Annex A)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router (Annex B)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (EVDO)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC622-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC622-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC626-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC626-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC632-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC632-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC636-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC636-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC642-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC642-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC646-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC646-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM763-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (US)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (US)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (US)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 1242-7 V2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.3.46" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 1243-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.3.46" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 1243-7 LTE EU", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.3.46" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 1243-7 LTE US", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.3.46" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 1243-8 IRC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.3.46" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 1542SP-1 IRC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.0 \u003c V2.2.28" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 1543-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0.22" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 1543SP-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.0 \u003c V2.2.28" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.0 \u003c V2.2.28" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200SP CP 1543SP-1 ISEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.0 \u003c V2.2.28" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.0 \u003c V2.2.28" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET CP 1242-7 V2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.3.46" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET CP 1543-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0.22" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS S7-1200 CP 1243-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.3.46" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS S7-1200 CP 1243-1 RAIL", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.3.46" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (All versions \u003c V7.2), RUGGEDCOM RM1224 LTE(4G) NAM (All versions \u003c V7.2), SCALANCE M804PB (All versions \u003c V7.2), SCALANCE M812-1 ADSL-Router (Annex A) (All versions \u003c V7.2), SCALANCE M812-1 ADSL-Router (Annex B) (All versions \u003c V7.2), SCALANCE M816-1 ADSL-Router (Annex A) (All versions \u003c V7.2), SCALANCE M816-1 ADSL-Router (Annex B) (All versions \u003c V7.2), SCALANCE M826-2 SHDSL-Router (All versions \u003c V7.2), SCALANCE M874-2 (All versions \u003c V7.2), SCALANCE M874-3 (All versions \u003c V7.2), SCALANCE M876-3 (EVDO) (All versions \u003c V7.2), SCALANCE M876-3 (ROK) (All versions \u003c V7.2), SCALANCE M876-4 (All versions \u003c V7.2), SCALANCE M876-4 (EU) (All versions \u003c V7.2), SCALANCE M876-4 (NAM) (All versions \u003c V7.2), SCALANCE MUM853-1 (EU) (All versions \u003c V7.2), SCALANCE MUM856-1 (EU) (All versions \u003c V7.2), SCALANCE MUM856-1 (RoW) (All versions \u003c V7.2), SCALANCE S615 (All versions \u003c V7.2), SCALANCE S615 EEC (All versions \u003c V7.2), SCALANCE SC622-2C (All versions \u003c V2.3), SCALANCE SC622-2C (All versions \u003e= V2.3 \u003c V3.0), SCALANCE SC626-2C (All versions \u003c V2.3), SCALANCE SC626-2C (All versions \u003e= V2.3 \u003c V3.0), SCALANCE SC632-2C (All versions \u003c V2.3), SCALANCE SC632-2C (All versions \u003e= V2.3 \u003c V3.0), SCALANCE SC636-2C (All versions \u003c V2.3), SCALANCE SC636-2C (All versions \u003e= V2.3 \u003c V3.0), SCALANCE SC642-2C (All versions \u003c V2.3), SCALANCE SC642-2C (All versions \u003e= V2.3 \u003c V3.0), SCALANCE SC646-2C (All versions \u003c V2.3), SCALANCE SC646-2C (All versions \u003e= V2.3 \u003c V3.0), SCALANCE WAM763-1 (All versions), SCALANCE WAM766-1 (EU) (All versions), SCALANCE WAM766-1 (US) (All versions), SCALANCE WAM766-1 EEC (EU) (All versions), SCALANCE WAM766-1 EEC (US) (All versions), SCALANCE WUM763-1 (All versions), SCALANCE WUM763-1 (All versions), SCALANCE WUM766-1 (EU) (All versions), SCALANCE WUM766-1 (US) (All versions), SIMATIC CP 1242-7 V2 (All versions \u003c V3.3.46), SIMATIC CP 1243-1 (All versions \u003c V3.3.46), SIMATIC CP 1243-7 LTE EU (All versions \u003c V3.3.46), SIMATIC CP 1243-7 LTE US (All versions \u003c V3.3.46), SIMATIC CP 1243-8 IRC (All versions \u003c V3.3.46), SIMATIC CP 1542SP-1 IRC (All versions \u003e= V2.0 \u003c V2.2.28), SIMATIC CP 1543-1 (All versions \u003c V3.0.22), SIMATIC CP 1543SP-1 (All versions \u003e= V2.0 \u003c V2.2.28), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (All versions \u003e= V2.0 \u003c V2.2.28), SIPLUS ET 200SP CP 1543SP-1 ISEC (All versions \u003e= V2.0 \u003c V2.2.28), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (All versions \u003e= V2.0 \u003c V2.2.28), SIPLUS NET CP 1242-7 V2 (All versions \u003c V3.3.46), SIPLUS NET CP 1543-1 (All versions \u003c V3.0.22), SIPLUS S7-1200 CP 1243-1 (All versions \u003c V3.3.46), SIPLUS S7-1200 CP 1243-1 RAIL (All versions \u003c V3.3.46). By injecting code to specific configuration options for OpenVPN, an attacker could execute arbitrary code with elevated privileges." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-10T10:20:57.022Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-517377.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-413565.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-34821", "datePublished": "2022-07-12T00:00:00", "dateReserved": "2022-06-29T00:00:00", "dateUpdated": "2024-08-03T09:22:10.733Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41978
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: 0 < V8.1 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-41978", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-13T13:28:57.409070Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-13T13:29:07.876Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router family", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router family", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3 3G-Router (CN)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (A1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (B1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (A1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (B1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (CN)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 EEC LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions \u003c V8.1), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions \u003c V8.1), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions \u003c V8.1), SCALANCE M812-1 ADSL-Router family (All versions \u003c V8.1), SCALANCE M816-1 ADSL-Router family (All versions \u003c V8.1), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions \u003c V8.1), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions \u003c V8.1), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions \u003c V8.1), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions \u003c V8.1), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions \u003c V8.1), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions \u003c V8.1), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions \u003c V8.1), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions \u003c V8.1), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions \u003c V8.1), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions \u003c V8.1), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions \u003c V8.1), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions \u003c V8.1), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions \u003c V8.1), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions \u003c V8.1). Affected devices insert sensitive information about the generation of 2FA tokens into log files. This could allow an authenticated remote attacker to forge 2FA tokens of other users." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" } }, { "cvssV4_0": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532: Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-13T07:54:39.417Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-087301.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2024-41978", "datePublished": "2024-08-13T07:54:39.417Z", "dateReserved": "2024-07-25T11:00:11.939Z", "dateUpdated": "2024-08-13T13:29:07.876Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-50559
Vulnerability from cvelistv5
5.1 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: 0 < V8.2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-50559", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T14:50:16.703540Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T14:50:27.518Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3 3G-Router (CN)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (A1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (B1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (A1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (B1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (CN)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 EEC LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions \u003c V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions \u003c V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions \u003c V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions \u003c V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions \u003c V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions \u003c V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions \u003c V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions \u003c V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions \u003c V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions \u003c V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions \u003c V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions \u003c V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions \u003c V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions \u003c V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions \u003c V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions \u003c V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions \u003c V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions \u003c V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions \u003c V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions \u003c V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions \u003c V8.2). Affected devices do not properly validate the filenames of the certificate. This could allow an authenticated remote attacker to append arbitrary values which will lead to compromise of integrity of the system." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "cvssV4_0": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", "version": "4.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-12T12:50:01.376Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-354112.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2024-50559", "datePublished": "2024-11-12T12:50:01.376Z", "dateReserved": "2024-10-24T11:01:04.416Z", "dateUpdated": "2024-11-12T14:50:27.518Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-50560
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: 0 < V8.2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-50560", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T14:49:48.660026Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T14:50:02.465Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3 3G-Router (CN)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (A1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (B1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (A1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (B1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (CN)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 EEC LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions \u003c V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions \u003c V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions \u003c V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions \u003c V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions \u003c V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions \u003c V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions \u003c V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions \u003c V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions \u003c V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions \u003c V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions \u003c V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions \u003c V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions \u003c V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions \u003c V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions \u003c V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions \u003c V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions \u003c V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions \u003c V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions \u003c V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions \u003c V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions \u003c V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions \u003c V8.2). Affected devices truncates usernames longer than 15 characters when accessed via SSH or Telnet. This could allow an attacker to compromise system integrity." } ], "metrics": [ { "cvssV3_1": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "cvssV4_0": { "baseScore": 2.3, "baseSeverity": "LOW", "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", "version": "4.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-12T12:50:04.034Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-354112.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2024-50560", "datePublished": "2024-11-12T12:50:04.034Z", "dateReserved": "2024-10-24T11:37:28.687Z", "dateUpdated": "2024-11-12T14:50:02.465Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44318
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf | ||
https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf | ||
https://cert-portal.siemens.com/productcert/html/ssa-180704.html | ||
https://cert-portal.siemens.com/productcert/html/ssa-353002.html | ||
https://cert-portal.siemens.com/productcert/html/ssa-690517.html |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: All versions |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.959Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-180704.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-353002.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 EEC LAN-Router", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 LAN-Router", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAB762-1", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM763-1", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM763-1 (ME)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM763-1 (US)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (ME)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (US)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (ME)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (US)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUB762-1", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUB762-1", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1 (US)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1 (US)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (ME)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (US)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (SC, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3LD (SC, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3LD (SC, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB208 (E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB208 (PN)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (SC, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (SC, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (ST, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3LD (SC, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3LD (SC, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB216 (E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB216 (PN)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2 (SC)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2 (ST/BFOC)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE EEC (54 V DC)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP EEC", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G (EIP DEF.)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G EEC", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208EEC", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G (EIP def.)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G EEC", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G PoE", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-3G PoE", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-3G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G (EIP Def.)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G EEC", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216EEC", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G (EIP Def.)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G EEC", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204 DNA", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA DNA", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208 (Ethernet/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208EEC", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208PoE EEC", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216 (Ethernet/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216EEC", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216POE EEC", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324WG (24 x FE, AC 230V)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324WG (24 X FE, DC 24V)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR326-2C PoE WG", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR326-2C PoE WG (without UL)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (28xGE, AC 230V)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (28xGE, DC 24V)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC206-2", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC206-2SFP", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC208", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC216-4C", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Affected devices use a hardcoded key to obfuscate the configuration backup that an administrator can export from the device. This could allow an authenticated attacker with administrative privileges or an attacker that obtains a configuration backup to extract configuration information from the exported file." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:U/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-321", "description": "CWE-321: Use of Hard-coded Cryptographic Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-10T09:34:16.175Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-180704.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-353002.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2023-44318", "datePublished": "2023-11-14T11:03:52.696Z", "dateReserved": "2023-09-28T16:18:45.648Z", "dateUpdated": "2024-09-10T09:34:16.175Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-36325
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: All versions < V7.1.2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:00:04.293Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-710008.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router (Annex A)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router (Annex B)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router (Annex A)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router (Annex B)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (EVDO)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC622-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3.1" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC626-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3.1" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC632-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3.1" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC636-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3.1" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC642-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3.1" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC646-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3.1" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-2 EEC M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-2 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-2IA M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W721-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W721-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W722-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W722-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W722-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45 (USA)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W738-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W738-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W761-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W761-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45 (USA)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12 EEC (USA)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2IA RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2IA RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM763-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (US)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (US)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (US)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (SC, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3LD (SC, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3LD (SC, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB208 (E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB208 (PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (SC, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (SC, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (ST, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3LD (SC, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3LD (SC, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB216 (E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB216 (PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2 (SC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2 (ST/BFOC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE EEC (54 V DC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G (EIP DEF.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G (EIP def.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G PoE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-3G PoE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-3G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G (EIP Def.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G (EIP Def.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204 DNA", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA DNA", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-4C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-4C (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-8C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-8C (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM416-4C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM416-4C (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208 (Ethernet/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208PoE EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216 (Ethernet/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216POE EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324WG (24 x FE, AC 230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324WG (24 X FE, DC 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR326-2C PoE WG", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR326-2C PoE WG (without UL)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (28xGE, AC 230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (28xGE, DC 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 1x230V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 1x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 24V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 24V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 2x230V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 2x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 1x230V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 1x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 24V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 24V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 2x230V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 2x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (2HR2, L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (2HR2)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2, L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC206-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC206-2SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC216-4C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Affected devices do not properly sanitize data introduced by an user when rendering the web interface. This could allow an authenticated remote attacker with administrative privileges to inject code and lead to a DOM-based XSS." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-80", "description": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-10T10:21:04.880Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-710008.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-36325", "datePublished": "2022-08-10T11:18:45", "dateReserved": "2022-07-20T00:00:00", "dateUpdated": "2024-08-03T10:00:04.293Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-36324
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: All versions < V7.1.2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:00:04.354Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-710008.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router (Annex A)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router (Annex B)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router (Annex A)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router (Annex B)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (EVDO)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.1.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC622-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3.1" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC626-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3.1" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC632-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3.1" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC636-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3.1" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC642-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3.1" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC646-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3.1" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-2 EEC M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-2 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-2IA M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W721-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W721-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W722-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W722-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W722-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45 (USA)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W738-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W738-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W761-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W761-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45 (USA)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12 EEC (USA)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2IA RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2IA RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM763-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (US)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (US)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (US)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (SC, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3LD (SC, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3LD (SC, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB208 (E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB208 (PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (SC, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (SC, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (ST, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3LD (SC, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3LD (SC, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB216 (E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB216 (PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2 (SC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2 (ST/BFOC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE EEC (54 V DC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G (EIP DEF.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G (EIP def.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G PoE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-3G PoE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-3G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G (EIP Def.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G (EIP Def.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204 DNA", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA DNA", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-4C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-4C (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-8C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-8C (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM416-4C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM416-4C (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208 (Ethernet/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208PoE EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216 (Ethernet/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216POE EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324WG (24 x FE, AC 230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324WG (24 X FE, DC 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR326-2C PoE WG", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR326-2C PoE WG (without UL)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (28xGE, AC 230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (28xGE, DC 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 1x230V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 1x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 24V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 24V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 2x230V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 2x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 1x230V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 1x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 24V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 24V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 2x230V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 2x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (2HR2, L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (2HR2)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2, L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC206-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC206-2SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC216-4C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Affected devices do not properly handle the renegotiation of SSL/TLS parameters. This could allow an unauthenticated remote attacker to bypass the TCP brute force prevention and lead to a denial of service condition for the duration of the attack." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770: Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-10T10:21:02.321Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-710008.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-36324", "datePublished": "2022-08-10T11:18:39", "dateReserved": "2022-07-20T00:00:00", "dateUpdated": "2024-08-03T10:00:04.354Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44317
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf | ||
https://cert-portal.siemens.com/productcert/pdf/ssa-068047.pdf | ||
https://cert-portal.siemens.com/productcert/html/ssa-699386.html | ||
https://cert-portal.siemens.com/productcert/html/ssa-068047.html | ||
https://cert-portal.siemens.com/productcert/html/ssa-602936.html | ||
https://cert-portal.siemens.com/productcert/html/ssa-690517.html |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: 0 < V7.2.2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:52.114Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-068047.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-068047.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 EEC LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V7.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAB762-1", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM763-1", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM763-1 (ME)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM763-1 (US)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (ME)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (US)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (ME)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (US)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUB762-1", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUB762-1", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1 (US)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1 (US)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (ME)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (US)", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions \u003c V7.2.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions \u003c V7.2.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions \u003c V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions \u003c V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions \u003c V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions \u003c V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions \u003c V7.2.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions \u003c V7.2.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions \u003c V7.2.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions \u003c V7.2.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions \u003c V7.2.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions \u003c V7.2.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions \u003c V7.2.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions \u003c V7.2.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions \u003c V7.2.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions \u003c V7.2.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions \u003c V7.2.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions \u003c V7.2.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions \u003c V7.2.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions \u003c V7.2.2), SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) (All versions), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions), SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0) (All versions), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions), SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0) (All versions), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) (All versions), SCALANCE WUB762-1 (6GK5762-1AJ00-2AA0) (All versions), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions), SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0) (All versions), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions), SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0) (All versions). Affected products do not properly validate the content of uploaded X509 certificates which could allow an attacker with administrative privileges to execute arbitrary code on the device." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-349", "description": "CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-10T09:34:14.430Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-068047.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-068047.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2023-44317", "datePublished": "2023-11-14T11:03:48.999Z", "dateReserved": "2023-09-28T16:18:45.647Z", "dateUpdated": "2024-09-10T09:34:14.430Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49691
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: 0 < V8.0 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:01:25.906Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-180704.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 EEC LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions \u003c V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions \u003c V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions \u003c V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions \u003c V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions \u003c V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions \u003c V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions \u003c V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions \u003c V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions \u003c V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions \u003c V8.0), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions \u003c V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions \u003c V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions \u003c V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions \u003c V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions \u003c V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions \u003c V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions \u003c V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions \u003c V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions \u003c V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions \u003c V8.0). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the handling of the DDNS configuration. This could allow malicious local administrators to issue commands on system level after a successful IP address update." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-13T07:53:58.093Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-180704.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2023-49691", "datePublished": "2023-12-12T11:27:24.588Z", "dateReserved": "2023-11-29T17:51:25.463Z", "dateUpdated": "2024-08-13T07:53:58.093Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46142
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: All versions < V7.2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:24:03.321Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-413565.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router (Annex A)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router (Annex B)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router (Annex A)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router (Annex B)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (EVDO)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V7.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC622-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC622-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC626-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC626-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC632-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC632-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC636-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC636-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC642-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC642-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC646-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE SC646-2C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.3 \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-2 EEC M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-2 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-2IA M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W721-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W721-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W722-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W722-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W722-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45 (USA)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W738-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W738-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W761-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W761-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45 (USA)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12 EEC (USA)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2IA RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2IA RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM763-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 (US)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WAM766-1 EEC (US)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM763-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE WUM766-1 (US)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (SC, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3LD (SC, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3LD (SC, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB208 (E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB208 (PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (SC, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (SC, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (ST, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3LD (SC, E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3LD (SC, PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB216 (E/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB216 (PN)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2 (SC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2 (ST/BFOC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE EEC (54 V DC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G (EIP DEF.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G (EIP def.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G PoE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-3G PoE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-3G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G (EIP Def.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G (EIP Def.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204 DNA", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA DNA", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-4C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-4C (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-8C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-8C (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM416-4C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM416-4C (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208 (Ethernet/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208PoE EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216 (Ethernet/IP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216POE EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324WG (24 x FE, AC 230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324WG (24 X FE, DC 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR326-2C PoE WG", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR326-2C PoE WG (without UL)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (28xGE, AC 230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (28xGE, DC 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 1x230V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 1x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 24V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 24V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 2x230V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 2x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 1x230V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 1x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 24V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 24V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 2x230V", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 2x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (2HR2, L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (2HR2)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2, L3 int.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.6" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC206-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC206-2SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC216-4C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Affected devices store the CLI user passwords encrypted in flash memory. Attackers with physical access to the device could retrieve the file and decrypt the CLI user passwords." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-257", "description": "CWE-257: Storing Passwords in a Recoverable Format", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-10T10:21:11.037Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-413565.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-46142", "datePublished": "2022-12-13T00:00:00", "dateReserved": "2022-11-28T00:00:00", "dateUpdated": "2024-08-03T14:24:03.321Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41976
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: 0 < V8.1 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:h:siemens:ruggedcom_rm1224_lte\\(4g\\)_eu:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_rm1224_lte\\(4g\\)_eu", "vendor": "siemens", "versions": [ { "lessThan": "v8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:ruggedcom_rm1224_lte\\(4g\\)_nam:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_rm1224_lte\\(4g\\)_nam", "vendor": "siemens", "versions": [ { "lessThan": "v8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:scalance_m804pb:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m804pb", "vendor": "siemens", "versions": [ { "lessThan": "v8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:scalance_m812-1_adsl-router:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m812-1_adsl-router", "vendor": "siemens", "versions": [ { "lessThan": "v8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:scalance_m816-1_adsl-router:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m816-1_adsl-router", "vendor": "siemens", "versions": [ { "lessThan": "v8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:scalance_m826-2_shdsl-router:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m826-2_shdsl-router", "vendor": "siemens", "versions": [ { "lessThan": "v8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:scalance_m874-2:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m874-2", "vendor": "siemens", "versions": [ { "lessThan": "v8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:scalance_m874-3:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m874-3", "vendor": "siemens", "versions": [ { "lessThan": "v8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:scalance_m874-3_3g-router_\\(cn\\):*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m874-3_3g-router_\\(cn\\)", "vendor": "siemens", "versions": [ { "lessThan": "v8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:scalance_m876-3:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m876-3", "vendor": "siemens", "versions": [ { "lessThan": "v8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:scalance_m876-3_\\(rok\\):*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m876-3_\\(rok\\)", "vendor": "siemens", "versions": [ { "lessThan": "v8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:scalance_m876-4:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m876-4", "vendor": "siemens", "versions": [ { "lessThan": "v8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:scalance_m876-4_\\(eu\\):*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m876-4_\\(eu\\)", "vendor": "siemens", "versions": [ { "lessThan": "v8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:scalance_m876-4_\\(nam\\):*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m876-4_\\(nam\\)", "vendor": "siemens", "versions": [ { "lessThan": "v8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:scalance_mum853-1_\\(a1\\):*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_mum853-1_\\(a1\\)", "vendor": "siemens", "versions": [ { "lessThan": "v8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:scalance_mum853-1_\\(b1\\):*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_mum853-1_\\(b1\\)", "vendor": "siemens", "versions": [ { "lessThan": "v8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:scalance_mum853-1_\\(eu\\):*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_mum853-1_\\(eu\\)", "vendor": "siemens", "versions": [ { "lessThan": "v8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:scalance_mum856-1_\\(a1\\):*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_mum856-1_\\(a1\\)", "vendor": "siemens", "versions": [ { "lessThan": "v8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:scalance_mum856-1_\\(b1\\):*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_mum856-1_\\(b1\\)", "vendor": "siemens", "versions": [ { "lessThan": "v8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:scalance_mum856-1_\\(cn\\):*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_mum856-1_\\(cn\\)", "vendor": "siemens", "versions": [ { "lessThan": "v8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:scalance_mum856-1_\\(eu\\):*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_mum856-1_\\(eu\\)", "vendor": "siemens", "versions": [ { "lessThan": "v8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:scalance_mum856-1_\\(row\\):*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_mum856-1_\\(row\\)", "vendor": "siemens", "versions": [ { "lessThan": "v8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:scalance_s615_eec_lan-router:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_s615_eec_lan-router", "vendor": "siemens", "versions": [ { "lessThan": "v8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:scalance_s615_lan-router:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_s615_lan-router", "vendor": "siemens", "versions": [ { "lessThan": "v8.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-41976", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-14T17:50:04.994530Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-14T18:17:16.011Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router family", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router family", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3 3G-Router (CN)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (A1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (B1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (A1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (B1)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (CN)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 EEC LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V8.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions \u003c V8.1), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions \u003c V8.1), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions \u003c V8.1), SCALANCE M812-1 ADSL-Router family (All versions \u003c V8.1), SCALANCE M816-1 ADSL-Router family (All versions \u003c V8.1), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions \u003c V8.1), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions \u003c V8.1), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions \u003c V8.1), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions \u003c V8.1), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions \u003c V8.1), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions \u003c V8.1), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions \u003c V8.1), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions \u003c V8.1), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions \u003c V8.1), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions \u003c V8.1), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions \u003c V8.1), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions \u003c V8.1), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions \u003c V8.1), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions \u003c V8.1), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions \u003c V8.1). Affected devices do not properly validate input in specific VPN configuration fields. This could allow an authenticated remote attacker to execute arbitrary code on the device." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:T/RC:C", "version": "3.1" } }, { "cvssV4_0": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-13T07:54:35.837Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-087301.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2024-41976", "datePublished": "2024-08-13T07:54:35.837Z", "dateReserved": "2024-07-25T11:00:11.939Z", "dateUpdated": "2024-08-14T18:17:16.011Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }