6.7
CVE-2021-37209
- EPSS 0.09%
- Veröffentlicht 08.03.2022 12:15:10
- Zuletzt bearbeitet 12.08.2025 12:15:27
- Quelle productcert@siemens.com
- Teams Watchlist Login
- Unerledigt Login
A vulnerability has been identified in RUGGEDCOM i800 (All versions < V4.3.8), RUGGEDCOM i801 (All versions < V4.3.8), RUGGEDCOM i802 (All versions < V4.3.8), RUGGEDCOM i803 (All versions < V4.3.8), RUGGEDCOM M2100 (All versions < V4.3.8), RUGGEDCOM M2200 (All versions < V4.3.8), RUGGEDCOM M969 (All versions < V4.3.8), RUGGEDCOM RMC30 (All versions < V4.3.8), RUGGEDCOM RMC8388 V4.X (All versions < V4.3.8), RUGGEDCOM RMC8388 V5.X (All versions < V5.7.0), RUGGEDCOM RP110 (All versions < V4.3.8), RUGGEDCOM RS1600 (All versions < V4.3.8), RUGGEDCOM RS1600F (All versions < V4.3.8), RUGGEDCOM RS1600T (All versions < V4.3.8), RUGGEDCOM RS400 (All versions < V4.3.8), RUGGEDCOM RS401 (All versions < V4.3.8), RUGGEDCOM RS416 (All versions < V4.3.8), RUGGEDCOM RS416P (All versions < V4.3.8), RUGGEDCOM RS416Pv2 V4.X (All versions < V4.3.8), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.7.0), RUGGEDCOM RS416v2 V4.X (All versions < V4.3.8), RUGGEDCOM RS416v2 V5.X (All versions < V5.7.0), RUGGEDCOM RS8000 (All versions < V4.3.8), RUGGEDCOM RS8000A (All versions < V4.3.8), RUGGEDCOM RS8000H (All versions < V4.3.8), RUGGEDCOM RS8000T (All versions < V4.3.8), RUGGEDCOM RS900 (All versions < V4.3.8), RUGGEDCOM RS900 (32M) V4.X (All versions < V4.3.8), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.7.0), RUGGEDCOM RS900G (All versions < V4.3.8), RUGGEDCOM RS900G (32M) V4.X (All versions < V4.3.8), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.7.0), RUGGEDCOM RS900GP (All versions < V4.3.8), RUGGEDCOM RS900L (All versions < V4.3.8), RUGGEDCOM RS900M-GETS-C01 (All versions < V4.3.8), RUGGEDCOM RS900M-GETS-XX (All versions < V4.3.8), RUGGEDCOM RS900M-STND-C01 (All versions < V4.3.8), RUGGEDCOM RS900M-STND-XX (All versions < V4.3.8), RUGGEDCOM RS900W (All versions < V4.3.8), RUGGEDCOM RS910 (All versions < V4.3.8), RUGGEDCOM RS910L (All versions < V4.3.8), RUGGEDCOM RS910W (All versions < V4.3.8), RUGGEDCOM RS920L (All versions < V4.3.8), RUGGEDCOM RS920W (All versions < V4.3.8), RUGGEDCOM RS930L (All versions < V4.3.8), RUGGEDCOM RS930W (All versions < V4.3.8), RUGGEDCOM RS940G (All versions < V4.3.8), RUGGEDCOM RS969 (All versions < V4.3.8), RUGGEDCOM RSG2100 (All versions < V4.3.8), RUGGEDCOM RSG2100 (32M) V4.X (All versions < V4.3.8), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.7.0), RUGGEDCOM RSG2100P (All versions < V4.3.8), RUGGEDCOM RSG2100P (32M) V4.X (All versions < V4.3.8), RUGGEDCOM RSG2100P (32M) V5.X (All versions < V5.7.0), RUGGEDCOM RSG2200 (All versions < V4.3.8), RUGGEDCOM RSG2288 V4.X (All versions < V4.3.8), RUGGEDCOM RSG2288 V5.X (All versions < V5.7.0), RUGGEDCOM RSG2300 V4.X (All versions < V4.3.8), RUGGEDCOM RSG2300 V5.X (All versions < V5.7.0), RUGGEDCOM RSG2300P V4.X (All versions < V4.3.8), RUGGEDCOM RSG2300P V5.X (All versions < V5.7.0), RUGGEDCOM RSG2488 V4.X (All versions < V4.3.8), RUGGEDCOM RSG2488 V5.X (All versions < V5.7.0), RUGGEDCOM RSG907R (All versions < V5.7.0), RUGGEDCOM RSG908C (All versions < V5.7.0), RUGGEDCOM RSG909R (All versions < V5.7.0), RUGGEDCOM RSG910C (All versions < V5.7.0), RUGGEDCOM RSG920P V4.X (All versions < V4.3.8), RUGGEDCOM RSG920P V5.X (All versions < V5.7.0), RUGGEDCOM RSL910 (All versions < V5.7.0), RUGGEDCOM RST2228 (All versions < V5.7.0), RUGGEDCOM RST2228P (All versions < V5.7.0), RUGGEDCOM RST916C (All versions < V5.7.0), RUGGEDCOM RST916P (All versions < V5.7.0). The SSH server on affected devices is configured to offer weak ciphers by default. This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data passed over the connection between legitimate clients and the affected device.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Siemens ≫ Ruggedcom Ros
Siemens ≫ Ruggedcom I800 Version-
Siemens ≫ Ruggedcom I801 Version-
Siemens ≫ Ruggedcom I802 Version-
Siemens ≫ Ruggedcom I803 Version-
Siemens ≫ Ruggedcom M2100 Version-
Siemens ≫ Ruggedcom M2200 Version-
Siemens ≫ Ruggedcom M969 Version-
Siemens ≫ Ruggedcom Rmc Version-
Siemens ≫ Ruggedcom Rmc20 Version-
Siemens ≫ Ruggedcom Rmc30 Version-
Siemens ≫ Ruggedcom Rmc40 Version-
Siemens ≫ Ruggedcom Rmc41 Version-
Siemens ≫ Ruggedcom Rmc8388 Version-
Siemens ≫ Ruggedcom Rp110 Version-
Siemens ≫ Ruggedcom Rs400 Version-
Siemens ≫ Ruggedcom Rs401 Version-
Siemens ≫ Ruggedcom Rs416 Version-
Siemens ≫ Ruggedcom Rs416v2 Version-
Siemens ≫ Ruggedcom Rs8000 Version-
Siemens ≫ Ruggedcom Rs8000a Version-
Siemens ≫ Ruggedcom Rs8000h Version-
Siemens ≫ Ruggedcom Rs8000t Version-
Siemens ≫ Ruggedcom Rs900 Version-
Siemens ≫ Ruggedcom Rs900g Version-
Siemens ≫ Ruggedcom Rs900gp Version-
Siemens ≫ Ruggedcom Rs900l Version-
Siemens ≫ Ruggedcom Rs900w Version-
Siemens ≫ Ruggedcom Rs910 Version-
Siemens ≫ Ruggedcom Rs910l Version-
Siemens ≫ Ruggedcom Rs910w Version-
Siemens ≫ Ruggedcom Rs920l Version-
Siemens ≫ Ruggedcom Rs920w Version-
Siemens ≫ Ruggedcom Rs930l Version-
Siemens ≫ Ruggedcom Rs930w Version-
Siemens ≫ Ruggedcom Rs940g Version-
Siemens ≫ Ruggedcom Rs969 Version-
Siemens ≫ Ruggedcom Rsg2100 Version-
Siemens ≫ Ruggedcom Rsg2100p Version-
Siemens ≫ Ruggedcom Rsg2200 Version-
Siemens ≫ Ruggedcom Rsg2288 Version-
Siemens ≫ Ruggedcom Rsg2300 Version-
Siemens ≫ Ruggedcom Rsg2300p Version-
Siemens ≫ Ruggedcom Rsg2488 Version-
Siemens ≫ Ruggedcom Rsg907r Version-
Siemens ≫ Ruggedcom Rsg908c Version-
Siemens ≫ Ruggedcom Rsg909r Version-
Siemens ≫ Ruggedcom Rsg910c Version-
Siemens ≫ Ruggedcom Rsg920p Version-
Siemens ≫ Ruggedcom Rsl910 Version-
Siemens ≫ Ruggedcom Rst2228 Version-
Siemens ≫ Ruggedcom Rst2228p Version-
Siemens ≫ Ruggedcom Rst916c Version-
Siemens ≫ Ruggedcom Rst916p Version-
Siemens ≫ Ruggedcom I801 Version-
Siemens ≫ Ruggedcom I802 Version-
Siemens ≫ Ruggedcom I803 Version-
Siemens ≫ Ruggedcom M2100 Version-
Siemens ≫ Ruggedcom M2200 Version-
Siemens ≫ Ruggedcom M969 Version-
Siemens ≫ Ruggedcom Rmc Version-
Siemens ≫ Ruggedcom Rmc20 Version-
Siemens ≫ Ruggedcom Rmc30 Version-
Siemens ≫ Ruggedcom Rmc40 Version-
Siemens ≫ Ruggedcom Rmc41 Version-
Siemens ≫ Ruggedcom Rmc8388 Version-
Siemens ≫ Ruggedcom Rp110 Version-
Siemens ≫ Ruggedcom Rs400 Version-
Siemens ≫ Ruggedcom Rs401 Version-
Siemens ≫ Ruggedcom Rs416 Version-
Siemens ≫ Ruggedcom Rs416v2 Version-
Siemens ≫ Ruggedcom Rs8000 Version-
Siemens ≫ Ruggedcom Rs8000a Version-
Siemens ≫ Ruggedcom Rs8000h Version-
Siemens ≫ Ruggedcom Rs8000t Version-
Siemens ≫ Ruggedcom Rs900 Version-
Siemens ≫ Ruggedcom Rs900g Version-
Siemens ≫ Ruggedcom Rs900gp Version-
Siemens ≫ Ruggedcom Rs900l Version-
Siemens ≫ Ruggedcom Rs900w Version-
Siemens ≫ Ruggedcom Rs910 Version-
Siemens ≫ Ruggedcom Rs910l Version-
Siemens ≫ Ruggedcom Rs910w Version-
Siemens ≫ Ruggedcom Rs920l Version-
Siemens ≫ Ruggedcom Rs920w Version-
Siemens ≫ Ruggedcom Rs930l Version-
Siemens ≫ Ruggedcom Rs930w Version-
Siemens ≫ Ruggedcom Rs940g Version-
Siemens ≫ Ruggedcom Rs969 Version-
Siemens ≫ Ruggedcom Rsg2100 Version-
Siemens ≫ Ruggedcom Rsg2100p Version-
Siemens ≫ Ruggedcom Rsg2200 Version-
Siemens ≫ Ruggedcom Rsg2288 Version-
Siemens ≫ Ruggedcom Rsg2300 Version-
Siemens ≫ Ruggedcom Rsg2300p Version-
Siemens ≫ Ruggedcom Rsg2488 Version-
Siemens ≫ Ruggedcom Rsg907r Version-
Siemens ≫ Ruggedcom Rsg908c Version-
Siemens ≫ Ruggedcom Rsg909r Version-
Siemens ≫ Ruggedcom Rsg910c Version-
Siemens ≫ Ruggedcom Rsg920p Version-
Siemens ≫ Ruggedcom Rsl910 Version-
Siemens ≫ Ruggedcom Rst2228 Version-
Siemens ≫ Ruggedcom Rst2228p Version-
Siemens ≫ Ruggedcom Rst916c Version-
Siemens ≫ Ruggedcom Rst916p Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.09% | 0.266 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 4 | 8 | 2.9 |
AV:N/AC:L/Au:S/C:P/I:N/A:N
|
nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
productcert@siemens.com | 6.7 | 1.2 | 5.5 |
CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H
|
CWE-311 Missing Encryption of Sensitive Data
The product does not encrypt sensitive or critical information before storage or transmission.
CWE-326 Inadequate Encryption Strength
The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.