7.5
CVE-2024-38278
- EPSS 0.07%
- Veröffentlicht 09.07.2024 12:15:15
- Zuletzt bearbeitet 12.08.2025 12:15:31
- Quelle productcert@siemens.com
- Teams Watchlist Login
- Unerledigt Login
A vulnerability has been identified in RUGGEDCOM RMC8388 V5.X (All versions < V5.9.0), RUGGEDCOM RMC8388NC V5.X (All versions < V5.9.0), RUGGEDCOM RS416NCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416PNCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416v2 V5.X (All versions < V5.9.0), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.9.0), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.9.0), RUGGEDCOM RS900GNC(32M) V5.X (All versions < V5.9.0), RUGGEDCOM RS900NC(32M) V5.X (All versions < V5.9.0), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.9.0), RUGGEDCOM RSG2100NC(32M) V5.X (All versions < V5.9.0), RUGGEDCOM RSG2100P (32M) V5.X (All versions < V5.9.0), RUGGEDCOM RSG2100PNC (32M) V5.X (All versions < V5.9.0), RUGGEDCOM RSG2288 V5.X (All versions < V5.9.0), RUGGEDCOM RSG2288NC V5.X (All versions < V5.9.0), RUGGEDCOM RSG2300 V5.X (All versions < V5.9.0), RUGGEDCOM RSG2300NC V5.X (All versions < V5.9.0), RUGGEDCOM RSG2300P V5.X (All versions < V5.9.0), RUGGEDCOM RSG2300PNC V5.X (All versions < V5.9.0), RUGGEDCOM RSG2488 V5.X (All versions < V5.9.0), RUGGEDCOM RSG2488NC V5.X (All versions < V5.9.0), RUGGEDCOM RSG907R (All versions < V5.9.0), RUGGEDCOM RSG908C (All versions < V5.9.0), RUGGEDCOM RSG909R (All versions < V5.9.0), RUGGEDCOM RSG910C (All versions < V5.9.0), RUGGEDCOM RSG920P V5.X (All versions < V5.9.0), RUGGEDCOM RSG920PNC V5.X (All versions < V5.9.0), RUGGEDCOM RSL910 (All versions < V5.9.0), RUGGEDCOM RSL910NC (All versions < V5.9.0), RUGGEDCOM RST2228 (All versions < V5.9.0), RUGGEDCOM RST2228P (All versions < V5.9.0), RUGGEDCOM RST916C (All versions < V5.9.0), RUGGEDCOM RST916P (All versions < V5.9.0). The affected products with IP forwarding enabled wrongly make available certain remote services in non-managed VLANs, even if these services are not intentionally activated. An attacker could leverage this vulnerability to create a remote shell to the affected system.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Herstellersiemens
≫
Produkt
ruggedcom_ros_rmc8388
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rmc8388nc
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rs416ncv2
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rs416pncv2
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rs416pv2
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rs416v2
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rs900
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rs900g
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rs900gnc
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rs900nc
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rsg2100
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rsg2100nc
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rsg2288
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rsg2288nc
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rsg2300
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rsg2300nc
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rsg2300p
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rsg2300pnc
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rsg2488
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rsg2488nc
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rsg907r
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rsg908c
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rsg909r
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rsg910c
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rsg920p
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rsg920pnc
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rsl910
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rsl910nc
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rst2228
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rst2228p
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rst916c
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Herstellersiemens
≫
Produkt
ruggedcom_ros_rst916p
Default Statusunknown
Version <
5.9.0
Version
0
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.07% | 0.224 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
productcert@siemens.com | 7.5 | 0 | 0 |
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
productcert@siemens.com | 6.6 | 0.7 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
|
CWE-266 Incorrect Privilege Assignment
A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.