cnvd-2021-77598
Vulnerability from cnvd
Title: Siemens RUGGEDCOM ROX设备拒绝服务漏洞
Description:
ROX-based VPN端点和防火墙设备用于连接在恶劣环境中运行的设备,如电力设施变电站和交通控制柜。
Siemens RUGGEDCOM ROX设备存在拒绝服务漏洞,该漏洞源于受影响的设备在不检查文件上是否有足够空间可用的情况下进行数据写入导致转储崩溃。攻击者可利用此漏洞造成永久拒绝服务。
Severity: 高
Patch Name: Siemens RUGGEDCOM ROX设备拒绝服务漏洞的补丁
Patch Description:
ROX-based VPN端点和防火墙设备用于连接在恶劣环境中运行的设备,如电力设施变电站和交通控制柜。
Siemens RUGGEDCOM ROX设备存在拒绝服务漏洞,该漏洞源于受影响的设备在不检查文件上是否有足够空间可用的情况下进行数据写入导致转储崩溃。攻击者可利用此漏洞造成永久拒绝服务。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
厂商已发布了漏洞修复程序,请及时关注更新: https://cert-portal.siemens.com/productcert/pdf/ssa-173565.pdf
Reference: https://cert-portal.siemens.com/productcert/pdf/ssa-173565.pdf
Impacted products
Name | ['Siemens RUGGEDCOM ROX RX5000 < V2.14.1', 'Siemens RUGGEDCOM ROX MX5000 <V2.14.1', 'Siemens RUGGEDCOM ROX RX1400 <V2.14.1', 'Siemens RUGGEDCOM ROX RX1500 <V2.14.1', 'Siemens RUGGEDCOM ROX RX1501 <V2.14.1', 'Siemens RUGGEDCOM ROX RX1510 <V2.14.1', 'Siemens RUGGEDCOM ROX RX1511 <V2.14.1', 'Siemens RUGGEDCOM ROX RX1512 <V2.14.1', 'Siemens RUGGEDCOM ROX RX1524 <V2.14.1', 'Siemens RUGGEDCOM ROX RX1536 <V2.14.1'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2021-41546", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2021-41546" } }, "description": "ROX-based VPN\u7aef\u70b9\u548c\u9632\u706b\u5899\u8bbe\u5907\u7528\u4e8e\u8fde\u63a5\u5728\u6076\u52a3\u73af\u5883\u4e2d\u8fd0\u884c\u7684\u8bbe\u5907\uff0c\u5982\u7535\u529b\u8bbe\u65bd\u53d8\u7535\u7ad9\u548c\u4ea4\u901a\u63a7\u5236\u67dc\u3002\n\nSiemens RUGGEDCOM ROX\u8bbe\u5907\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u53d7\u5f71\u54cd\u7684\u8bbe\u5907\u5728\u4e0d\u68c0\u67e5\u6587\u4ef6\u4e0a\u662f\u5426\u6709\u8db3\u591f\u7a7a\u95f4\u53ef\u7528\u7684\u60c5\u51b5\u4e0b\u8fdb\u884c\u6570\u636e\u5199\u5165\u5bfc\u81f4\u8f6c\u50a8\u5d29\u6e83\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u6b64\u6f0f\u6d1e\u9020\u6210\u6c38\u4e45\u62d2\u7edd\u670d\u52a1\u3002", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://cert-portal.siemens.com/productcert/pdf/ssa-173565.pdf", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2021-77598", "openTime": "2021-10-15", "patchDescription": "ROX-based VPN\u7aef\u70b9\u548c\u9632\u706b\u5899\u8bbe\u5907\u7528\u4e8e\u8fde\u63a5\u5728\u6076\u52a3\u73af\u5883\u4e2d\u8fd0\u884c\u7684\u8bbe\u5907\uff0c\u5982\u7535\u529b\u8bbe\u65bd\u53d8\u7535\u7ad9\u548c\u4ea4\u901a\u63a7\u5236\u67dc\u3002\r\n\r\nSiemens RUGGEDCOM ROX\u8bbe\u5907\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u53d7\u5f71\u54cd\u7684\u8bbe\u5907\u5728\u4e0d\u68c0\u67e5\u6587\u4ef6\u4e0a\u662f\u5426\u6709\u8db3\u591f\u7a7a\u95f4\u53ef\u7528\u7684\u60c5\u51b5\u4e0b\u8fdb\u884c\u6570\u636e\u5199\u5165\u5bfc\u81f4\u8f6c\u50a8\u5d29\u6e83\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u6b64\u6f0f\u6d1e\u9020\u6210\u6c38\u4e45\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Siemens RUGGEDCOM ROX\u8bbe\u5907\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "Siemens RUGGEDCOM ROX RX5000 \u003c V2.14.1", "Siemens RUGGEDCOM ROX MX5000 \u003cV2.14.1", "Siemens RUGGEDCOM ROX RX1400 \u003cV2.14.1", "Siemens RUGGEDCOM ROX RX1500 \u003cV2.14.1", "Siemens RUGGEDCOM ROX RX1501 \u003cV2.14.1", "Siemens RUGGEDCOM ROX RX1510 \u003cV2.14.1", "Siemens RUGGEDCOM ROX RX1511 \u003cV2.14.1", "Siemens RUGGEDCOM ROX RX1512 \u003cV2.14.1", "Siemens RUGGEDCOM ROX RX1524 \u003cV2.14.1", "Siemens RUGGEDCOM ROX RX1536 \u003cV2.14.1" ] }, "referenceLink": "https://cert-portal.siemens.com/productcert/pdf/ssa-173565.pdf", "serverity": "\u9ad8", "submitTime": "2021-10-15", "title": "Siemens RUGGEDCOM ROX\u8bbe\u5907\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…