8.8
CVE-2024-41976
- EPSS 0.94%
- Published 13.08.2024 08:15:15
- Last modified 23.08.2024 18:40:16
- Source productcert@siemens.com
- Teams watchlist Login
- Open Login
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.1), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.1), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.1), SCALANCE M812-1 ADSL-Router family (All versions < V8.1), SCALANCE M816-1 ADSL-Router family (All versions < V8.1), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.1), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.1), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.1), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.1), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.1), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.1), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.1), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.1), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.1), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.1), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.1), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.1), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.1), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.1), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.1), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.1), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.1), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.1), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.1). Affected devices do not properly validate input in specific VPN configuration fields. This could allow an authenticated remote attacker to execute arbitrary code on the device.
Data is provided by the National Vulnerability Database (NVD)
Siemens ≫ Ruggedcom Rm1224 Lte(4g) Eu Firmware Version < 8.1
Siemens ≫ Ruggedcom Rm1224 Lte(4g) Nam Firmware Version < 8.1
Siemens ≫ Scalance M804pb Firmware Version < 8.1
Siemens ≫ Scalance M826-2 Shdsl-router Firmware Version < 8.1
Siemens ≫ Scalance M874-2 Firmware Version < 8.1
Siemens ≫ Scalance M874-3 Firmware Version < 8.1
Siemens ≫ Scalance M876-3 Firmware Version < 8.1
Siemens ≫ Scalance M876-4 Firmware Version < 8.1
Siemens ≫ Scalance M874-3 3g-router (cn) Firmware Version < 8.1
Siemens ≫ Scalance M876-3 (rok) Firmware Version < 8.1
Siemens ≫ Scalance M876-4 (eu) Firmware Version < 8.1
Siemens ≫ Scalance M876-4 (nam) Firmware Version < 8.1
Siemens ≫ Scalance Mum853-1 (a1) Firmware Version < 8.1
Siemens ≫ Scalance Mum853-1 (b1) Firmware Version < 8.1
Siemens ≫ Scalance Mum853-1 (eu) Firmware Version < 8.1
Siemens ≫ Scalance Mum856-1 (a1) Firmware Version < 8.1
Siemens ≫ Scalance Mum856-1 (b1) Firmware Version < 8.1
Siemens ≫ Scalance Mum856-1 (cn) Firmware Version < 8.1
Siemens ≫ Scalance Mum856-1 (eu) Firmware Version < 8.1
Siemens ≫ Scalance Mum856-1 (row) Firmware Version < 8.1
Siemens ≫ Scalance S615 Eec Lan-router Firmware Version < 8.1
Siemens ≫ Scalance S615 Lan-router Firmware Version < 8.1
Siemens ≫ Scalance M812-1 (annex A) Firmware Version < 8.1
Siemens ≫ Scalance M812-1 (annex B) Firmware Version < 8.1
Siemens ≫ Scalance M816-1 (annex A) Firmware Version < 8.1
Siemens ≫ Scalance M816-1 (annex B) Firmware Version < 8.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.94% | 0.754 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
productcert@siemens.com | 8.6 | 0 | 0 |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
productcert@siemens.com | 7.2 | 1.2 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.