Page 3 of 13 results (0.005 seconds)

CVSS: 6.7EPSS: 0%CPEs: 54EXPL: 0

A vulnerability has been identified in RUGGEDCOM i800 (All versions < V4.3.8), RUGGEDCOM i801 (All versions < V4.3.8), RUGGEDCOM i802 (All versions < V4.3.8), RUGGEDCOM i803 (All versions < V4.3.8), RUGGEDCOM M2100 (All versions < V4.3.8), RUGGEDCOM M2200 (All versions < V4.3.8), RUGGEDCOM M969 (All versions < V4.3.8), RUGGEDCOM RMC30 (All versions < V4.3.8), RUGGEDCOM RMC8388 V4.X (All versions < V4.3.8), RUGGEDCOM RMC8388 V5.X (All versions < V5.7.0), RUGGEDCOM RP110 (All versions < V4.3.8), RUGGEDCOM RS1600 (All versions < V4.3.8), RUGGEDCOM RS1600F (All versions < V4.3.8), RUGGEDCOM RS1600T (All versions < V4.3.8), RUGGEDCOM RS400 (All versions < V4.3.8), RUGGEDCOM RS401 (All versions < V4.3.8), RUGGEDCOM RS416 (All versions < V4.3.8), RUGGEDCOM RS416P (All versions < V4.3.8), RUGGEDCOM RS416Pv2 V4.X (All versions < V4.3.8), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.7.0), RUGGEDCOM RS416v2 V4.X (All versions < V4.3.8), RUGGEDCOM RS416v2 V5.X (All versions < V5.7.0), RUGGEDCOM RS8000 (All versions < V4.3.8), RUGGEDCOM RS8000A (All versions < V4.3.8), RUGGEDCOM RS8000H (All versions < V4.3.8), RUGGEDCOM RS8000T (All versions < V4.3.8), RUGGEDCOM RS900 (All versions < V4.3.8), RUGGEDCOM RS900 (32M) V4.X (All versions < V4.3.8), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.7.0), RUGGEDCOM RS900G (All versions < V4.3.8), RUGGEDCOM RS900G (32M) V4.X (All versions < V4.3.8), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.7.0), RUGGEDCOM RS900GP (All versions < V4.3.8), RUGGEDCOM RS900L (All versions < V4.3.8), RUGGEDCOM RS900M-GETS-C01 (All versions < V4.3.8), RUGGEDCOM RS900M-GETS-XX (All versions < V4.3.8), RUGGEDCOM RS900M-STND-C01 (All versions < V4.3.8), RUGGEDCOM RS900M-STND-XX (All versions < V4.3.8), RUGGEDCOM RS900W (All versions < V4.3.8), RUGGEDCOM RS910 (All versions < V4.3.8), RUGGEDCOM RS910L (All versions < V4.3.8), RUGGEDCOM RS910W (All versions < V4.3.8), RUGGEDCOM RS920L (All versions < V4.3.8), RUGGEDCOM RS920W (All versions < V4.3.8), RUGGEDCOM RS930L (All versions < V4.3.8), RUGGEDCOM RS930W (All versions < V4.3.8), RUGGEDCOM RS940G (All versions < V4.3.8), RUGGEDCOM RS969 (All versions < V4.3.8), RUGGEDCOM RSG2100 (All versions < V4.3.8), RUGGEDCOM RSG2100 (32M) V4.X (All versions < V4.3.8), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.7.0), RUGGEDCOM RSG2100P (All versions < V4.3.8), RUGGEDCOM RSG2200 (All versions < V4.3.8), RUGGEDCOM RSG2288 V4.X (All versions < V4.3.8), RUGGEDCOM RSG2288 V5.X (All versions < V5.7.0), RUGGEDCOM RSG2300 V4.X (All versions < V4.3.8), RUGGEDCOM RSG2300 V5.X (All versions < V5.7.0), RUGGEDCOM RSG2300P V4.X (All versions < V4.3.8), RUGGEDCOM RSG2300P V5.X (All versions < V5.7.0), RUGGEDCOM RSG2488 V4.X (All versions < V4.3.8), RUGGEDCOM RSG2488 V5.X (All versions < V5.7.0), RUGGEDCOM RSG907R (All versions < V5.7.0), RUGGEDCOM RSG908C (All versions < V5.7.0), RUGGEDCOM RSG909R (All versions < V5.7.0), RUGGEDCOM RSG910C (All versions < V5.7.0), RUGGEDCOM RSG920P V4.X (All versions < V4.3.8), RUGGEDCOM RSG920P V5.X (All versions < V5.7.0), RUGGEDCOM RSL910 (All versions < V5.7.0), RUGGEDCOM RST2228 (All versions < V5.7.0), RUGGEDCOM RST2228P (All versions < V5.7.0), RUGGEDCOM RST916C (All versions < V5.7.0), RUGGEDCOM RST916P (All versions < V5.7.0). The SSH server on affected devices is configured to offer weak ciphers by default. This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data passed over the connection between legitimate clients and the affected device. Se ha identificado una vulnerabilidad en RUGGEDCOM ROS M2100, RUGGEDCOM ROS M2200, RUGGEDCOM ROS M969, RUGGEDCOM ROS RMC, RUGGEDCOM ROS RMC20, RUGGEDCOM ROS RMC30, RUGGEDCOM ROS RMC30 V4. X, RUGGEDCOM ROS RMC40, RUGGEDCOM ROS RMC41, RUGGEDCOM ROS RMC8388, RUGGEDCOM ROS RMC8388 V4.X, RUGGEDCOM ROS RMC8388 V5.X, RUGGEDCOM ROS RP110, RUGGEDCOM ROS RP110 V4.X, RUGGEDCOM ROS RS1600 V4. X, RUGGEDCOM ROS RS1600F V4.X, RUGGEDCOM ROS RS1600T V4.X, RUGGEDCOM ROS RS400, RUGGEDCOM ROS RS400 V4.X, RUGGEDCOM ROS RS401, RUGGEDCOM ROS RS401 V4.X, RUGGEDCOM ROS RS416, RUGGEDCOM ROS RS416Pv2 V4. • https://cert-portal.siemens.com/productcert/pdf/ssa-764417.pdf • CWE-311: Missing Encryption of Sensitive Data CWE-326: Inadequate Encryption Strength •

CVSS: 9.8EPSS: 0%CPEs: 117EXPL: 0

A vulnerability has been identified in RUGGEDCOM ROS M2100 (All versions < V4.3.7), RUGGEDCOM ROS M2200 (All versions < V4.3.7), RUGGEDCOM ROS M969 (All versions < V4.3.7), RUGGEDCOM ROS RMC (All versions < V4.3.7), RUGGEDCOM ROS RMC20 (All versions < V4.3.7), RUGGEDCOM ROS RMC30 (All versions < V4.3.7), RUGGEDCOM ROS RMC40 (All versions < V4.3.7), RUGGEDCOM ROS RMC41 (All versions < V4.3.7), RUGGEDCOM ROS RMC8388 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RMC8388 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RP110 (All versions < V4.3.7), RUGGEDCOM ROS RS400 (All versions < V4.3.7), RUGGEDCOM ROS RS401 (All versions < V4.3.7), RUGGEDCOM ROS RS416 (All versions < V4.3.7), RUGGEDCOM ROS RS416v2 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RS416v2 V5.X (All versions < 5.5.4), RUGGEDCOM ROS RS8000 (All versions < V4.3.7), RUGGEDCOM ROS RS8000A (All versions < V4.3.7), RUGGEDCOM ROS RS8000H (All versions < V4.3.7), RUGGEDCOM ROS RS8000T (All versions < V4.3.7), RUGGEDCOM ROS RS900 (32M) V4.X (All versions < V4.3.7), RUGGEDCOM ROS RS900 (32M) V5.X (All versions < V5.5.4), RUGGEDCOM ROS RS900G (All versions < V4.3.7), RUGGEDCOM ROS RS900G (32M) V4.X (All versions < V4.3.7), RUGGEDCOM ROS RS900G (32M) V5.X (All versions < V5.5.4), RUGGEDCOM ROS RS900GP (All versions < V4.3.7), RUGGEDCOM ROS RS900L (All versions < V4.3.7), RUGGEDCOM ROS RS900W (All versions < V4.3.7), RUGGEDCOM ROS RS910 (All versions < V4.3.7), RUGGEDCOM ROS RS910L (All versions < V4.3.7), RUGGEDCOM ROS RS910W (All versions < V4.3.7), RUGGEDCOM ROS RS920L (All versions < V4.3.7), RUGGEDCOM ROS RS920W (All versions < V4.3.7), RUGGEDCOM ROS RS930L (All versions < V4.3.7), RUGGEDCOM ROS RS930W (All versions < V4.3.7), RUGGEDCOM ROS RS940G (All versions < V4.3.7), RUGGEDCOM ROS RS969 (All versions < V4.3.7), RUGGEDCOM ROS RSG2100 (32M) V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2100 (32M) V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2100 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2100P (All versions < V4.3.7), RUGGEDCOM ROS RSG2100P (32M) V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2100P (32M) V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2200 (All versions < V4.3.7), RUGGEDCOM ROS RSG2288 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2288 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2300 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2300 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2300P V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2300P V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2488 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2488 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG900 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG900 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG900C (All versions < V5.5.4), RUGGEDCOM ROS RSG900G V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG900G V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG900R (All versions < V5.5.4), RUGGEDCOM ROS RSG920P V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG920P V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSL910 (All versions < V5.5.4), RUGGEDCOM ROS RST2228 (All versions < V5.5.4), RUGGEDCOM ROS RST916C (All versions < V5.5.4), RUGGEDCOM ROS RST916P (All versions < V5.5.4), RUGGEDCOM ROS i800 (All versions < V4.3.7), RUGGEDCOM ROS i801 (All versions < V4.3.7), RUGGEDCOM ROS i802 (All versions < V4.3.7), RUGGEDCOM ROS i803 (All versions < V4.3.7). The DHCP client in affected devices fails to properly sanitize incoming DHCP packets. This could allow an unauthenticated remote attacker to cause memory to be overwritten, potentially allowing remote code execution. Se ha identificado una vulnerabilidad en RUGGEDCOM ROS M2100 (versiones &lt; V4.3.7), RUGGEDCOM ROS M2200 (versiones &lt; V4.3.7), RUGGEDCOM ROS M969 (versiones &lt; V4.3.7), RUGGEDCOM ROS RMC (versiones &lt; V4.3.7), RUGGEDCOM ROS RMC20 (versiones &lt; V4.3.7), RUGGEDCOM ROS RMC30 (versiones &lt; V4.3.7), RUGGEDCOM ROS RMC40 (versiones &lt; V4.3.7), RUGGEDCOM ROS RMC41 (versiones &lt; V4.3.7), RUGGEDCOM ROS RMC8388 V4.X (versiones &lt; V4.3.7), RUGGEDCOM ROS RMC8388 V5.X (versiones &lt; V5.5.4), RUGGEDCOM ROS RP110 (versiones &lt; V4.3.7), RUGGEDCOM ROS RS400 (versiones &lt; V4.3.7), RUGGEDCOM ROS RS401 (versiones &lt; V4.3.7), RUGGEDCOM ROS RS416 (versiones &lt; V4.3.7), RUGGEDCOM ROS RS416v2 V4.X (versiones &lt; V4.3.7), RUGGEDCOM ROS RS416v2 V5.X (All versions &lt; 5.5.4), RUGGEDCOM ROS RS8000 (versiones &lt; V4.3.7), RUGGEDCOM ROS RS8000A (versiones &lt; V4.3.7), RUGGEDCOM ROS RS8000H (versiones &lt; V4.3.7), RUGGEDCOM ROS RS8000T (versiones &lt; V4.3.7), RUGGEDCOM ROS RS900 (32M) V4.X (versiones &lt; V4.3.7), RUGGEDCOM ROS RS900 (32M) V5.X (versiones &lt; V5.5.4), RUGGEDCOM ROS RS900G (versiones &lt; V4.3.7), RUGGEDCOM ROS RS900G (32M) V4.X (versiones &lt; V4.3.7), RUGGEDCOM ROS RS900G (32M) V5.X (versiones &lt; V5.5.4), RUGGEDCOM ROS RS900GP (versiones &lt; V4.3.7), RUGGEDCOM ROS RS900L (versiones &lt; V4.3.7), RUGGEDCOM ROS RS900W (versiones &lt; V4.3.7), RUGGEDCOM ROS RS910 (versiones &lt; V4.3.7), RUGGEDCOM ROS RS910L (versiones &lt; V4.3.7), RUGGEDCOM ROS RS910W (versiones &lt; V4.3.7), RUGGEDCOM ROS RS920L (versiones &lt; V4.3.7), RUGGEDCOM ROS RS920W (versiones &lt; V4.3.7), RUGGEDCOM ROS RS930L (versiones &lt; V4.3.7), RUGGEDCOM ROS RS930W (versiones &lt; V4.3.7), RUGGEDCOM ROS RS940G (versiones &lt; V4.3.7), RUGGEDCOM ROS RS969 (versiones &lt; V4.3.7), RUGGEDCOM ROS RSG2100 (32M) V4.X (versiones &lt; V4.3.7), RUGGEDCOM ROS RSG2100 (32M) V5.X (versiones &lt; V5.5.4), RUGGEDCOM ROS RSG2100 V4.X (versiones &lt; V4.3.7), RUGGEDCOM ROS RSG2100P (versiones &lt; V4.3.7), RUGGEDCOM ROS RSG2100P (32M) V4.X (versiones &lt; V4.3.7), RUGGEDCOM ROS RSG2100P (32M) V5.X (versiones &lt; V5.5.4), RUGGEDCOM ROS RSG2200 (versiones &lt; V4.3.7), RUGGEDCOM ROS RSG2288 V4.X (versiones &lt; V4.3.7), RUGGEDCOM ROS RSG2288 V5.X (versiones &lt; V5.5.4), RUGGEDCOM ROS RSG2300 V4.X (versiones &lt; V4.3.7), RUGGEDCOM ROS RSG2300 V5.X (versiones &lt; V5.5.4), RUGGEDCOM ROS RSG2300P V4.X (versiones &lt; V4.3.7), RUGGEDCOM ROS RSG2300P V5.X (versiones &lt; V5.5.4), RUGGEDCOM ROS RSG2488 V4.X (versiones &lt; V4.3.7), RUGGEDCOM ROS RSG2488 V5.X (versiones &lt; V5.5.4), RUGGEDCOM ROS RSG900 V4.X (versiones &lt; V4.3.7), RUGGEDCOM ROS RSG900 V5.X (versiones &lt; V5.5.4), RUGGEDCOM ROS RSG900C (versiones &lt; V5.5.4), RUGGEDCOM ROS RSG900G V4.X (versiones &lt; V4.3.7), RUGGEDCOM ROS RSG900G V5.X (versiones &lt; V5.5.4), RUGGEDCOM ROS RSG900R (versiones &lt; V5.5.4), RUGGEDCOM ROS RSG920P V4.X (versiones &lt; V4.3.7), RUGGEDCOM ROS RSG920P V5.X (versiones &lt; V5.5.4), RUGGEDCOM ROS RSL910 (versiones &lt; V5.5.4), RUGGEDCOM ROS RST2228 (versiones &lt; V5.5.4), RUGGEDCOM ROS RST916C (versiones &lt; V5.5.4), RUGGEDCOM ROS RST916P (versiones &lt; V5.5.4), RUGGEDCOM ROS i800 (versiones &lt; V4.3.7), RUGGEDCOM ROS i801 (versiones &lt; V4.3.7), RUGGEDCOM ROS i802 (versiones &lt; V4.3.7), RUGGEDCOM ROS i803 (versiones &lt; V4.3.7). El cliente DHCP de los dispositivos afectados no sanea correctamente los paquetes DHCP entrantes. • https://cert-portal.siemens.com/productcert/pdf/ssa-373591.pdf • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •

CVSS: 8.8EPSS: 0%CPEs: 16EXPL: 0

A vulnerability has been identified in RUGGEDCOM ROS for RSL910 devices (All versions < ROS V5.0.1), RUGGEDCOM ROS for all other devices (All versions < ROS V4.3.4), SCALANCE XB-200/XC-200/XP-200/XR300-WG (All versions between V3.0 (including) and V3.0.2 (excluding)), SCALANCE XR-500/XM-400 (All versions between V6.1 (including) and V6.1.1 (excluding)). After initial configuration, the Ruggedcom Discovery Protocol (RCDP) is still able to writeto the device under certain conditions, potentially allowing users located in the adjacentnetwork of the targeted device to perform unauthorized administrative actions. Se identificó una vulnerabilidad en RUGGEDCOM ROS para los dispositivos RSL910 (todas las versiones anteriores a ROS V5.0.1), RUGGEDCOM ROS para todos los demás dispositivos (todas las versiones anteriores a ROS V4.3.4), SCALANCE XB-200/XC-200/XP-200/XR300-WG (Todas las versiones entre V3.0 (incluido) y V3.0.2 (excluyendo), SCALANCE XR-500/XM-400 (Todas las versiones entre V6.1 (incluido) y V6.1.1 (excluyendo). Después de la configuración inicial, el Ruggedcom Discovery Protocol (RCDP) aún puede escribir hacia el dispositivo bajo ciertas condiciones, esto potencialmente permite que los usuarios ubicados en la red adyacente del dispositivo destino realicen acciones administrativas no autorizadas. • http://www.securityfocus.com/bid/101041 http://www.securitytracker.com/id/1039463 http://www.securitytracker.com/id/1039464 https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-856721.pdf • CWE-20: Improper Input Validation CWE-665: Improper Initialization •