5.1
CVE-2024-50559
- EPSS 0.05%
- Published 12.11.2024 13:15:12
- Last modified 13.11.2024 19:56:31
- Source productcert@siemens.com
- Teams watchlist Login
- Open Login
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2). Affected devices do not properly validate the filenames of the certificate. This could allow an authenticated remote attacker to append arbitrary values which will lead to compromise of integrity of the system.
Data is provided by the National Vulnerability Database (NVD)
Siemens ≫ Ruggedcom Rm1224 Lte(4g) Eu Firmware Version < 8.2
Siemens ≫ Ruggedcom Rm1224 Lte(4g) Nam Firmware Version < 8.2
Siemens ≫ Scalance M804pb Firmware Version < 8.2
Siemens ≫ Scalance M812-1 (annex A) Firmware Version < 8.2
Siemens ≫ Scalance M812-1 (annex B) Firmware Version < 8.2
Siemens ≫ Scalance M816-1 (annex A) Firmware Version < 8.2
Siemens ≫ Scalance M816-1 (annex B) Firmware Version < 8.2
Siemens ≫ Scalance M826-2 Firmware Version < 8.2
Siemens ≫ Scalance M874-2 Firmware Version < 8.2
Siemens ≫ Scalance M874-3 Firmware Version < 8.2
Siemens ≫ Scalance M874-3 (cn) Firmware Version < 8.2
Siemens ≫ Scalance M876-3 Firmware Version < 8.2
Siemens ≫ Scalance M876-3 (rok) Firmware Version < 8.2
Siemens ≫ Scalance M876-4 Firmware Version < 8.2
Siemens ≫ Scalance M876-4 (eu) Firmware Version < 8.2
Siemens ≫ Scalance M876-4 (nam) Firmware Version < 8.2
Siemens ≫ Scalance Mum853-1 (a1) Firmware Version < 8.2
Siemens ≫ Scalance Mum853-1 (b1) Firmware Version < 8.2
Siemens ≫ Scalance Mum853-1 (eu) Firmware Version < 8.2
Siemens ≫ Scalance Mum856-1 (a1) Firmware Version < 8.2
Siemens ≫ Scalance Mum856-1 (b1) Firmware Version < 8.2
Siemens ≫ Scalance Mum856-1 (cn) Firmware Version < 8.2
Siemens ≫ Scalance Mum856-1 (eu) Firmware Version < 8.2
Siemens ≫ Scalance Mum856-1 (row) Firmware Version < 8.2
Siemens ≫ Scalance S615 Eec Firmware Version < 8.2
Siemens ≫ Scalance S615 Firmware Version < 8.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.05% | 0.145 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 4.3 | 2.8 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
|
productcert@siemens.com | 5.1 | 0 | 0 |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
productcert@siemens.com | 4.3 | 2.8 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
|
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.