5.3
CVE-2025-40935
- EPSS 0.05%
- Veröffentlicht 09.12.2025 10:44:34
- Zuletzt bearbeitet 09.12.2025 18:36:53
- Quelle productcert@siemens.com
- CVE-Watchlists
- Unerledigt
A vulnerability has been identified in RUGGEDCOM RMC8388 V5.X (All versions < V5.10.1), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.10.1), RUGGEDCOM RS416v2 V5.X (All versions < V5.10.1), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.10.1), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.10.1), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.10.1), RUGGEDCOM RSG2100P (32M) V5.X (All versions < V5.10.1), RUGGEDCOM RSG2288 V5.X (All versions < V5.10.1), RUGGEDCOM RSG2300 V5.X (All versions < V5.10.1), RUGGEDCOM RSG2300P V5.X (All versions < V5.10.1), RUGGEDCOM RSG2488 V5.X (All versions < V5.10.1), RUGGEDCOM RSG907R (All versions < V5.10.1), RUGGEDCOM RSG908C (All versions < V5.10.1), RUGGEDCOM RSG909R (All versions < V5.10.1), RUGGEDCOM RSG910C (All versions < V5.10.1), RUGGEDCOM RSG920P V5.X (All versions < V5.10.1), RUGGEDCOM RSL910 (All versions < V5.10.1), RUGGEDCOM RST2228 (All versions < V5.10.1), RUGGEDCOM RST2228P (All versions < V5.10.1), RUGGEDCOM RST916C (All versions < V5.10.1), RUGGEDCOM RST916P (All versions < V5.10.1). Affected devices do not properly validate input during the TLS certificate upload process of the web service. This could allow an authenticated remote attacker to trigger a device crash and reboot, leading to a temporary Denial of Service on the device.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerSiemens
≫
Produkt
RUGGEDCOM RMC8388 V5.X
Default Statusunknown
Version <
V5.10.1
Version
0
Status
affected
HerstellerSiemens
≫
Produkt
RUGGEDCOM RS416Pv2 V5.X
Default Statusunknown
Version <
V5.10.1
Version
0
Status
affected
HerstellerSiemens
≫
Produkt
RUGGEDCOM RS416v2 V5.X
Default Statusunknown
Version <
V5.10.1
Version
0
Status
affected
HerstellerSiemens
≫
Produkt
RUGGEDCOM RS900 (32M) V5.X
Default Statusunknown
Version <
V5.10.1
Version
0
Status
affected
HerstellerSiemens
≫
Produkt
RUGGEDCOM RS900G (32M) V5.X
Default Statusunknown
Version <
V5.10.1
Version
0
Status
affected
HerstellerSiemens
≫
Produkt
RUGGEDCOM RSG2100 (32M) V5.X
Default Statusunknown
Version <
V5.10.1
Version
0
Status
affected
HerstellerSiemens
≫
Produkt
RUGGEDCOM RSG2100P (32M) V5.X
Default Statusunknown
Version <
V5.10.1
Version
0
Status
affected
HerstellerSiemens
≫
Produkt
RUGGEDCOM RSG2288 V5.X
Default Statusunknown
Version <
V5.10.1
Version
0
Status
affected
HerstellerSiemens
≫
Produkt
RUGGEDCOM RSG2300 V5.X
Default Statusunknown
Version <
V5.10.1
Version
0
Status
affected
HerstellerSiemens
≫
Produkt
RUGGEDCOM RSG2300P V5.X
Default Statusunknown
Version <
V5.10.1
Version
0
Status
affected
HerstellerSiemens
≫
Produkt
RUGGEDCOM RSG2488 V5.X
Default Statusunknown
Version <
V5.10.1
Version
0
Status
affected
HerstellerSiemens
≫
Produkt
RUGGEDCOM RSG907R
Default Statusunknown
Version <
V5.10.1
Version
0
Status
affected
HerstellerSiemens
≫
Produkt
RUGGEDCOM RSG908C
Default Statusunknown
Version <
V5.10.1
Version
0
Status
affected
HerstellerSiemens
≫
Produkt
RUGGEDCOM RSG909R
Default Statusunknown
Version <
V5.10.1
Version
0
Status
affected
HerstellerSiemens
≫
Produkt
RUGGEDCOM RSG910C
Default Statusunknown
Version <
V5.10.1
Version
0
Status
affected
HerstellerSiemens
≫
Produkt
RUGGEDCOM RSG920P V5.X
Default Statusunknown
Version <
V5.10.1
Version
0
Status
affected
HerstellerSiemens
≫
Produkt
RUGGEDCOM RSL910
Default Statusunknown
Version <
V5.10.1
Version
0
Status
affected
HerstellerSiemens
≫
Produkt
RUGGEDCOM RST2228
Default Statusunknown
Version <
V5.10.1
Version
0
Status
affected
HerstellerSiemens
≫
Produkt
RUGGEDCOM RST2228P
Default Statusunknown
Version <
V5.10.1
Version
0
Status
affected
HerstellerSiemens
≫
Produkt
RUGGEDCOM RST916C
Default Statusunknown
Version <
V5.10.1
Version
0
Status
affected
HerstellerSiemens
≫
Produkt
RUGGEDCOM RST916P
Default Statusunknown
Version <
V5.10.1
Version
0
Status
affected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.168 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| productcert@siemens.com | 4.3 | 2.8 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
|
| productcert@siemens.com | 5.3 | 0 | 0 |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.