7.4
CVE-2023-36749
- EPSS 0.08%
- Veröffentlicht 11.07.2023 10:15:11
- Zuletzt bearbeitet 21.11.2024 08:10:30
- Quelle productcert@siemens.com
- Teams Watchlist Login
- Unerledigt Login
A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.16.0), RUGGEDCOM ROX MX5000RE (All versions < V2.16.0), RUGGEDCOM ROX RX1400 (All versions < V2.16.0), RUGGEDCOM ROX RX1500 (All versions < V2.16.0), RUGGEDCOM ROX RX1501 (All versions < V2.16.0), RUGGEDCOM ROX RX1510 (All versions < V2.16.0), RUGGEDCOM ROX RX1511 (All versions < V2.16.0), RUGGEDCOM ROX RX1512 (All versions < V2.16.0), RUGGEDCOM ROX RX1524 (All versions < V2.16.0), RUGGEDCOM ROX RX1536 (All versions < V2.16.0), RUGGEDCOM ROX RX5000 (All versions < V2.16.0). The webserver of the affected devices support insecure TLS 1.0 protocol. An attacker could achieve a man-in-the-middle attack and compromise confidentiality and integrity of data.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Siemens ≫ Ruggedcom Rox Mx5000 Firmware Version < 2.16.0
Siemens ≫ Ruggedcom Rox Mx5000re Firmware Version < 2.16.0
Siemens ≫ Ruggedcom Rox Rx1400 Firmware Version < 2.16.0
Siemens ≫ Ruggedcom Rox Rx1500 Firmware Version < 2.16.0
Siemens ≫ Ruggedcom Rox Rx1501 Firmware Version < 2.16.0
Siemens ≫ Ruggedcom Rox Rx1510 Firmware Version < 2.16.0
Siemens ≫ Ruggedcom Rox Rx1511 Firmware Version < 2.16.0
Siemens ≫ Ruggedcom Rox Rx1512 Firmware Version < 2.16.0
Siemens ≫ Ruggedcom Rox Rx1524 Firmware Version < 2.16.0
Siemens ≫ Ruggedcom Rox Rx1536 Firmware Version < 2.16.0
Siemens ≫ Ruggedcom Rox Rx5000 Firmware Version < 2.16.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.08% | 0.254 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.4 | 2.2 | 5.2 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
|
productcert@siemens.com | 7.4 | 2.2 | 5.2 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
|
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
The product uses a broken or risky cryptographic algorithm or protocol.