Vulnerabilites related to siemens - 6gk5876-3aa02-2ba2
var-202312-0199
Vulnerability from variot
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 (6GK5615-0AA00-2AA2) (All versions < V8.0), SCALANCE S615 EEC (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions < V3.0.2), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions), SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0) (All versions), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions), SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0) (All versions), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions), SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0) (All versions), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions), SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0) (All versions). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the handling of the DDNS configuration. This could allow malicious local administrators to issue commands on system level after a successful IP address update. 6gk6108-4am00-2ba2 firmware, 6gk6108-4am00-2da2 firmware, 6gk5804-0ap00-2aa2 Several Siemens products, such as firmware, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SCALANCE M-800, MUM-800 and S615 as well as RUGGEDCOM RM1224 are industrial routers.
Siemens SCALANCE M-800/S615 series has an operating system command injection vulnerability that allows an attacker to execute commands on the system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202312-0199", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "scalance m876-4", scope: "lt", trust: 1.8, vendor: "siemens", version: "v8.0", }, { model: "scalance m812-1 adsl-router", scope: "lt", trust: 1.2, vendor: "siemens", version: "v8.0", }, { model: "scalance m816-1 adsl-router", scope: "lt", trust: 1.2, vendor: "siemens", version: "v8.0", }, { model: "scalance m876-3", scope: "lt", trust: 1.2, vendor: "siemens", version: "v8.0", }, { model: "scalance mum856-1", scope: "lt", trust: 1.2, vendor: "siemens", version: "v8.0", }, { model: "6gk5826-2ab00-2ab2", scope: "lt", trust: 1, vendor: "siemens", version: "8.0", }, { model: "6gk5804-0ap00-2aa2", scope: "lt", trust: 1, vendor: "siemens", version: "8.0", }, { model: "6gk5853-2ea00-2da1", scope: "lt", trust: 1, vendor: "siemens", version: "8.0", }, { model: "6gk5874-2aa00-2aa2", scope: "lt", trust: 1, vendor: "siemens", version: "8.0", }, { model: "6gk5856-2ea00-3da1", scope: "lt", trust: 1, vendor: "siemens", version: "8.0", }, { model: "6gk5816-1aa00-2aa2", scope: "lt", trust: 1, vendor: "siemens", version: "8.0", }, { model: "6gk5876-4aa00-2ba2", scope: "lt", trust: 1, vendor: "siemens", version: "8.0", }, { model: "6gk5876-3aa02-2ba2", scope: "lt", trust: 1, vendor: "siemens", version: "8.0", }, { model: "6gk5876-4aa00-2da2", scope: "lt", trust: 1, vendor: "siemens", version: "8.0", }, { model: "6gk5856-2ea00-3aa1", scope: "lt", trust: 1, vendor: "siemens", version: "8.0", }, { model: "6gk5876-3aa02-2ea2", scope: "lt", trust: 1, vendor: "siemens", version: "8.0", }, { model: "6gk5812-1aa00-2aa2", scope: "lt", trust: 1, vendor: "siemens", version: "8.0", }, { model: "6gk5876-4aa10-2ba2", scope: "lt", trust: 1, vendor: "siemens", version: "8.0", }, { model: "6gk5816-1ba00-2aa2", scope: "lt", trust: 1, vendor: "siemens", version: "8.0", }, { model: "6gk6108-4am00-2ba2", scope: "lt", trust: 1, vendor: "siemens", version: "8.0", }, { model: "6gk5812-1ba00-2aa2", scope: "lt", trust: 1, vendor: "siemens", version: "8.0", }, { model: "6gk5874-3aa00-2aa2", scope: "lt", trust: 1, vendor: "siemens", version: "8.0", }, { model: "6gk5615-0aa01-2aa2", scope: "lt", trust: 1, vendor: "siemens", version: "8.0", }, { model: "6gk5615-0aa00-2aa2", scope: "lt", trust: 1, vendor: "siemens", version: "8.0", }, { model: "6gk6108-4am00-2da2", scope: "lt", trust: 1, vendor: "siemens", version: "8.0", }, { model: "6gk5856-2ea00-3aa1", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5812-1aa00-2aa2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5615-0aa01-2aa2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5615-0aa00-2aa2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5856-2ea00-3da1", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5876-3aa02-2ea2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5876-4aa00-2ba2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5812-1ba00-2aa2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5816-1ba00-2aa2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk6108-4am00-2da2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5826-2ab00-2ab2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5874-2aa00-2aa2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk6108-4am00-2ba2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5876-4aa10-2ba2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5876-3aa02-2ba2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5816-1aa00-2aa2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5876-4aa00-2da2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5853-2ea00-2da1", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5874-3aa00-2aa2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5804-0ap00-2aa2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "ruggedcom rm1224 lte eu", scope: "lt", trust: 0.6, vendor: "siemens", version: "v8.0", }, { model: "ruggedcom rm1224 lte nam", scope: "lt", trust: 0.6, vendor: "siemens", version: "v8.0", }, { model: "scalance m804pb", scope: "lt", trust: 0.6, vendor: "siemens", version: "v8.0", }, { model: "scalance m826-2 shdsl-router", scope: "lt", trust: 0.6, vendor: "siemens", version: "v8.0", }, { model: "scalance m874-2", scope: "lt", trust: 0.6, vendor: "siemens", version: "v8.0", }, { model: "scalance m874-3", scope: "lt", trust: 0.6, vendor: "siemens", version: "v8.0", }, { model: "scalance mum853-1", scope: "lt", trust: 0.6, vendor: "siemens", version: "v8.0", }, { model: "scalance s615", scope: "lt", trust: 0.6, vendor: "siemens", version: "v8.0", }, { model: "scalance s615 eec", scope: "lt", trust: 0.6, vendor: "siemens", version: "v8.0", }, ], sources: [ { db: "CNVD", id: "CNVD-2023-97258", }, { db: "JVNDB", id: "JVNDB-2023-019858", }, { db: "NVD", id: "CVE-2023-49691", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk6108-4am00-2ba2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "8.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk6108-4am00-2ba2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk6108-4am00-2da2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "8.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk6108-4am00-2da2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5804-0ap00-2aa2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "8.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5804-0ap00-2aa2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5812-1aa00-2aa2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "8.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5812-1aa00-2aa2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5812-1ba00-2aa2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "8.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5812-1ba00-2aa2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5816-1aa00-2aa2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "8.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5816-1aa00-2aa2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5816-1ba00-2aa2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "8.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5816-1ba00-2aa2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5826-2ab00-2ab2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "8.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5826-2ab00-2ab2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5874-2aa00-2aa2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "8.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5874-2aa00-2aa2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5874-3aa00-2aa2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "8.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5874-3aa00-2aa2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5876-3aa02-2ba2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "8.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5876-3aa02-2ba2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5876-3aa02-2ea2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "8.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5876-3aa02-2ea2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5876-4aa10-2ba2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "8.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5876-4aa10-2ba2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5876-4aa00-2ba2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "8.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5876-4aa00-2ba2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5876-4aa00-2da2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "8.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5876-4aa00-2da2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5853-2ea00-2da1_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "8.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5853-2ea00-2da1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5856-2ea00-3da1_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "8.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5856-2ea00-3da1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5856-2ea00-3aa1_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "8.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5856-2ea00-3aa1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5615-0aa00-2aa2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "8.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5615-0aa00-2aa2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5615-0aa01-2aa2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "8.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5615-0aa01-2aa2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2023-49691", }, ], }, cve: "CVE-2023-49691", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "MULTIPLE", author: "CNVD", availabilityImpact: "COMPLETE", baseScore: 8.3, confidentialityImpact: "COMPLETE", exploitabilityScore: 6.4, id: "CNVD-2023-97258", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.6, vectorString: "AV:N/AC:L/Au:M/C:C/I:C/A:C", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "LOCAL", author: "NVD", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", exploitabilityScore: 0.8, impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, { attackComplexity: "LOW", attackVector: "NETWORK", author: "productcert@siemens.com", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 1.2, impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Local", author: "NVD", availabilityImpact: "High", baseScore: 6.7, baseSeverity: "Medium", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2023-49691", impactScore: null, integrityImpact: "High", privilegesRequired: "High", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2023-49691", trust: 1.8, value: "MEDIUM", }, { author: "productcert@siemens.com", id: "CVE-2023-49691", trust: 1, value: "HIGH", }, { author: "CNVD", id: "CNVD-2023-97258", trust: 0.6, value: "HIGH", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2023-97258", }, { db: "JVNDB", id: "JVNDB-2023-019858", }, { db: "NVD", id: "CVE-2023-49691", }, { db: "NVD", id: "CVE-2023-49691", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 (6GK5615-0AA00-2AA2) (All versions < V8.0), SCALANCE S615 EEC (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions < V3.0.2), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions), SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0) (All versions), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions), SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0) (All versions), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions), SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0) (All versions), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions), SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0) (All versions). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the handling of the DDNS configuration. This could allow malicious local administrators to issue commands on system level after a successful IP address update. 6gk6108-4am00-2ba2 firmware, 6gk6108-4am00-2da2 firmware, 6gk5804-0ap00-2aa2 Several Siemens products, such as firmware, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SCALANCE M-800, MUM-800 and S615 as well as RUGGEDCOM RM1224 are industrial routers. \n\r\n\r\nSiemens SCALANCE M-800/S615 series has an operating system command injection vulnerability that allows an attacker to execute commands on the system", sources: [ { db: "NVD", id: "CVE-2023-49691", }, { db: "JVNDB", id: "JVNDB-2023-019858", }, { db: "CNVD", id: "CNVD-2023-97258", }, ], trust: 2.16, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2023-49691", trust: 3.2, }, { db: "SIEMENS", id: "SSA-180704", trust: 2.4, }, { db: "SIEMENS", id: "SSA-690517", trust: 1, }, { db: "SIEMENS", id: "SSA-602936", trust: 1, }, { db: "ICS CERT", id: "ICSA-23-348-14", trust: 0.8, }, { db: "ICS CERT", id: "ICSA-24-046-09", trust: 0.8, }, { db: "JVN", id: "JVNVU91198149", trust: 0.8, }, { db: "JVN", id: "JVNVU98271228", trust: 0.8, }, { db: "JVNDB", id: "JVNDB-2023-019858", trust: 0.8, }, { db: "CNVD", id: "CNVD-2023-97258", trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2023-97258", }, { db: "JVNDB", id: "JVNDB-2023-019858", }, { db: "NVD", id: "CVE-2023-49691", }, ], }, id: "VAR-202312-0199", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2023-97258", }, ], trust: 1.5, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2023-97258", }, ], }, last_update_date: "2024-06-12T20:03:27.408000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "Patch for Siemens SCALANCE M-800/S615 series operating system command injection vulnerability", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/500366", }, ], sources: [ { db: "CNVD", id: "CNVD-2023-97258", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-78", trust: 1, }, { problemtype: "OS Command injection (CWE-78) [ others ]", trust: 0.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2023-019858", }, { db: "NVD", id: "CVE-2023-49691", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.8, url: "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf", }, { trust: 1.6, url: "https://cert-portal.siemens.com/productcert/html/ssa-180704.html", }, { trust: 1, url: "https://cert-portal.siemens.com/productcert/html/ssa-602936.html", }, { trust: 1, url: "https://cert-portal.siemens.com/productcert/html/ssa-690517.html", }, { trust: 0.8, url: "https://jvn.jp/vu/jvnvu98271228/", }, { trust: 0.8, url: "https://jvn.jp/vu/jvnvu91198149/index.html", }, { trust: 0.8, url: "https://nvd.nist.gov/vuln/detail/cve-2023-49691", }, { trust: 0.8, url: "https://www.cisa.gov/news-events/ics-advisories/icsa-23-348-14", }, { trust: 0.8, url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-046-09", }, ], sources: [ { db: "CNVD", id: "CNVD-2023-97258", }, { db: "JVNDB", id: "JVNDB-2023-019858", }, { db: "NVD", id: "CVE-2023-49691", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2023-97258", }, { db: "JVNDB", id: "JVNDB-2023-019858", }, { db: "NVD", id: "CVE-2023-49691", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-12-14T00:00:00", db: "CNVD", id: "CNVD-2023-97258", }, { date: "2024-01-15T00:00:00", db: "JVNDB", id: "JVNDB-2023-019858", }, { date: "2023-12-12T12:15:15.990000", db: "NVD", id: "CVE-2023-49691", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-12-13T00:00:00", db: "CNVD", id: "CNVD-2023-97258", }, { date: "2024-02-19T06:58:00", db: "JVNDB", id: "JVNDB-2023-019858", }, { date: "2024-06-11T09:15:16.840000", db: "NVD", id: "CVE-2023-49691", }, ], }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "in multiple Siemens products OS Command injection vulnerability", sources: [ { db: "JVNDB", id: "JVNDB-2023-019858", }, ], trust: 0.8, }, }
var-202312-0198
Vulnerability from variot
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V7.2.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V7.2.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) (All versions < V7.2.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V7.2.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V7.2.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V7.2.2), SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) (All versions < V7.2.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V7.2.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V7.2.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V7.2.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V7.2.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V7.2.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V7.2.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V7.2.2), SCALANCE S615 (6GK5615-0AA00-2AA2) (All versions < V7.2.2), SCALANCE S615 EEC (6GK5615-0AA01-2AA2) (All versions < V7.2.2), SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions < V3.0.2). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the parsing of the IPSEC configuration. This could allow malicious local administrators to issue commands on system level after a new connection is established. 6gk6108-4am00-2ba2 firmware, 6gk6108-4am00-2da2 firmware, 6gk5804-0ap00-2aa2 Several Siemens products, such as firmware, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SCALANCE M-800, MUM-800 and S615 as well as RUGGEDCOM RM1224 are industrial routers
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202312-0198", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "scalance m876-4", scope: "lt", trust: 1.8, vendor: "siemens", version: "v7.2.2", }, { model: "scalance m812-1 adsl-router", scope: "lt", trust: 1.2, vendor: "siemens", version: "v7.2.2", }, { model: "scalance m816-1 adsl-router", scope: "lt", trust: 1.2, vendor: "siemens", version: "v7.2.2", }, { model: "scalance m876-3", scope: "lt", trust: 1.2, vendor: "siemens", version: "v7.2.2", }, { model: "scalance mum856-1", scope: "lt", trust: 1.2, vendor: "siemens", version: "v7.2.2", }, { model: "6gk5876-3aa02-2ba2", scope: "lt", trust: 1, vendor: "siemens", version: "7.2.2", }, { model: "6gk5804-0ap00-2aa2", scope: "lt", trust: 1, vendor: "siemens", version: "7.2.2", }, { model: "6gk6108-4am00-2ba2", scope: "lt", trust: 1, vendor: "siemens", version: "7.2.2", }, { model: "6gk5876-4aa10-2ba2", scope: "lt", trust: 1, vendor: "siemens", version: "7.2.2", }, { model: "6gk5874-2aa00-2aa2", scope: "lt", trust: 1, vendor: "siemens", version: "7.2.2", }, { model: "6gk5853-2ea00-2da1", scope: "lt", trust: 1, vendor: "siemens", version: "7.2.2", }, { model: "6gk6108-4am00-2da2", scope: "lt", trust: 1, vendor: "siemens", version: "7.2.2", }, { model: "6gk5615-0aa00-2aa2", scope: "lt", trust: 1, vendor: "siemens", version: "7.2.2", }, { model: "6gk5826-2ab00-2ab2", scope: "lt", trust: 1, vendor: "siemens", version: "7.2.2", }, { model: "6gk5816-1ba00-2aa2", scope: "lt", trust: 1, vendor: "siemens", version: "7.2.2", }, { model: "6gk5876-4aa00-2ba2", scope: "lt", trust: 1, vendor: "siemens", version: "7.2.2", }, { model: "6gk5876-4aa00-2da2", scope: "lt", trust: 1, vendor: "siemens", version: "7.2.2", }, { model: "6gk5812-1aa00-2aa2", scope: "lt", trust: 1, vendor: "siemens", version: "7.2.2", }, { model: "6gk5856-2ea00-3da1", scope: "lt", trust: 1, vendor: "siemens", version: "7.2.2", }, { model: "6gk5856-2ea00-3aa1", scope: "lt", trust: 1, vendor: "siemens", version: "7.2.2", }, { model: "6gk5812-1ba00-2aa2", scope: "lt", trust: 1, vendor: "siemens", version: "7.2.2", }, { model: "6gk5874-3aa00-2aa2", scope: "lt", trust: 1, vendor: "siemens", version: "7.2.2", }, { model: "6gk5876-3aa02-2ea2", scope: "lt", trust: 1, vendor: "siemens", version: "7.2.2", }, { model: "6gk5816-1aa00-2aa2", scope: "lt", trust: 1, vendor: "siemens", version: "7.2.2", }, { model: "6gk5615-0aa01-2aa2", scope: "lt", trust: 1, vendor: "siemens", version: "7.2.2", }, { model: "6gk5856-2ea00-3aa1", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5812-1aa00-2aa2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5615-0aa01-2aa2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5615-0aa00-2aa2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5856-2ea00-3da1", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5876-3aa02-2ea2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5876-4aa00-2ba2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5812-1ba00-2aa2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5816-1ba00-2aa2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk6108-4am00-2da2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5826-2ab00-2ab2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5874-2aa00-2aa2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk6108-4am00-2ba2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5876-4aa10-2ba2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5876-3aa02-2ba2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5816-1aa00-2aa2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5876-4aa00-2da2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5853-2ea00-2da1", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5874-3aa00-2aa2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "6gk5804-0ap00-2aa2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "ruggedcom rm1224 lte eu", scope: "lt", trust: 0.6, vendor: "siemens", version: "v7.2.2", }, { model: "ruggedcom rm1224 lte nam", scope: "lt", trust: 0.6, vendor: "siemens", version: "v7.2.2", }, { model: "scalance m804pb", scope: "lt", trust: 0.6, vendor: "siemens", version: "v7.2.2", }, { model: "scalance m826-2 shdsl-router", scope: "lt", trust: 0.6, vendor: "siemens", version: "v7.2.2", }, { model: "scalance m874-2", scope: "lt", trust: 0.6, vendor: "siemens", version: "v7.2.2", }, { model: "scalance m874-3", scope: "lt", trust: 0.6, vendor: "siemens", version: "v7.2.2", }, { model: "scalance mum853-1", scope: "lt", trust: 0.6, vendor: "siemens", version: "v7.2.2", }, { model: "scalance s615", scope: "lt", trust: 0.6, vendor: "siemens", version: "v7.2.2", }, { model: "scalance s615 eec", scope: "lt", trust: 0.6, vendor: "siemens", version: "v7.2.2", }, ], sources: [ { db: "CNVD", id: "CNVD-2023-97257", }, { db: "JVNDB", id: "JVNDB-2023-019857", }, { db: "NVD", id: "CVE-2023-49692", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk6108-4am00-2ba2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "7.2.2", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk6108-4am00-2ba2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk6108-4am00-2da2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "7.2.2", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk6108-4am00-2da2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5804-0ap00-2aa2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "7.2.2", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5804-0ap00-2aa2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5812-1aa00-2aa2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "7.2.2", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5812-1aa00-2aa2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5812-1ba00-2aa2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "7.2.2", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5812-1ba00-2aa2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5816-1aa00-2aa2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "7.2.2", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5816-1aa00-2aa2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5816-1ba00-2aa2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "7.2.2", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5816-1ba00-2aa2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5826-2ab00-2ab2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "7.2.2", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5826-2ab00-2ab2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5874-2aa00-2aa2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "7.2.2", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5874-2aa00-2aa2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5874-3aa00-2aa2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "7.2.2", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5874-3aa00-2aa2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5876-3aa02-2ba2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "7.2.2", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5876-3aa02-2ba2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5876-3aa02-2ea2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "7.2.2", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5876-3aa02-2ea2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5876-4aa10-2ba2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "7.2.2", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5876-4aa10-2ba2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5876-4aa00-2ba2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "7.2.2", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5876-4aa00-2ba2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5876-4aa00-2da2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "7.2.2", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5876-4aa00-2da2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5853-2ea00-2da1_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "7.2.2", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5853-2ea00-2da1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5856-2ea00-3da1_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "7.2.2", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5856-2ea00-3da1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5856-2ea00-3aa1_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "7.2.2", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5856-2ea00-3aa1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5615-0aa00-2aa2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "7.2.2", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5615-0aa00-2aa2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:6gk5615-0aa01-2aa2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "7.2.2", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:6gk5615-0aa01-2aa2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2023-49692", }, ], }, cve: "CVE-2023-49692", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "MULTIPLE", author: "CNVD", availabilityImpact: "COMPLETE", baseScore: 8.3, confidentialityImpact: "COMPLETE", exploitabilityScore: 6.4, id: "CNVD-2023-97257", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.6, vectorString: "AV:N/AC:L/Au:M/C:C/I:C/A:C", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "LOCAL", author: "NVD", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", exploitabilityScore: 0.8, impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, { attackComplexity: "LOW", attackVector: "NETWORK", author: "productcert@siemens.com", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 1.2, impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Local", author: "NVD", availabilityImpact: "High", baseScore: 6.7, baseSeverity: "Medium", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2023-49692", impactScore: null, integrityImpact: "High", privilegesRequired: "High", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2023-49692", trust: 1.8, value: "MEDIUM", }, { author: "productcert@siemens.com", id: "CVE-2023-49692", trust: 1, value: "HIGH", }, { author: "CNVD", id: "CNVD-2023-97257", trust: 0.6, value: "HIGH", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2023-97257", }, { db: "JVNDB", id: "JVNDB-2023-019857", }, { db: "NVD", id: "CVE-2023-49692", }, { db: "NVD", id: "CVE-2023-49692", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V7.2.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V7.2.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) (All versions < V7.2.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V7.2.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V7.2.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V7.2.2), SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) (All versions < V7.2.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V7.2.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V7.2.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V7.2.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V7.2.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V7.2.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V7.2.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V7.2.2), SCALANCE S615 (6GK5615-0AA00-2AA2) (All versions < V7.2.2), SCALANCE S615 EEC (6GK5615-0AA01-2AA2) (All versions < V7.2.2), SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions < V3.0.2). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the parsing of the IPSEC configuration. This could allow malicious local administrators to issue commands on system level after a new connection is established. 6gk6108-4am00-2ba2 firmware, 6gk6108-4am00-2da2 firmware, 6gk5804-0ap00-2aa2 Several Siemens products, such as firmware, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SCALANCE M-800, MUM-800 and S615 as well as RUGGEDCOM RM1224 are industrial routers", sources: [ { db: "NVD", id: "CVE-2023-49692", }, { db: "JVNDB", id: "JVNDB-2023-019857", }, { db: "CNVD", id: "CNVD-2023-97257", }, ], trust: 2.16, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2023-49692", trust: 3.2, }, { db: "SIEMENS", id: "SSA-068047", trust: 1.8, }, { db: "SIEMENS", id: "SSA-602936", trust: 1, }, { db: "JVN", id: "JVNVU98271228", trust: 0.8, }, { db: "JVN", id: "JVNVU91198149", trust: 0.8, }, { db: "ICS CERT", id: "ICSA-23-348-13", trust: 0.8, }, { db: "ICS CERT", id: "ICSA-24-046-09", trust: 0.8, }, { db: "JVNDB", id: "JVNDB-2023-019857", trust: 0.8, }, { db: "SIEMENS", id: "SSA-077170", trust: 0.6, }, { db: "CNVD", id: "CNVD-2023-97257", trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2023-97257", }, { db: "JVNDB", id: "JVNDB-2023-019857", }, { db: "NVD", id: "CVE-2023-49692", }, ], }, id: "VAR-202312-0198", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2023-97257", }, ], trust: 0.06, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2023-97257", }, ], }, last_update_date: "2024-02-20T20:25:11.371000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "Patch for Siemens SCALANCE M-800/S615 series operating system command injection vulnerability", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/500316", }, ], sources: [ { db: "CNVD", id: "CNVD-2023-97257", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-78", trust: 1, }, { problemtype: "OS Command injection (CWE-78) [ others ]", trust: 0.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2023-019857", }, { db: "NVD", id: "CVE-2023-49692", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.8, url: "https://cert-portal.siemens.com/productcert/pdf/ssa-068047.pdf", }, { trust: 1, url: "https://cert-portal.siemens.com/productcert/html/ssa-068047.html", }, { trust: 1, url: "https://cert-portal.siemens.com/productcert/html/ssa-602936.html", }, { trust: 0.8, url: "https://jvn.jp/vu/jvnvu98271228/", }, { trust: 0.8, url: "https://jvn.jp/vu/jvnvu91198149/index.html", }, { trust: 0.8, url: "https://nvd.nist.gov/vuln/detail/cve-2023-49692", }, { trust: 0.8, url: "https://www.cisa.gov/news-events/ics-advisories/icsa-23-348-13", }, { trust: 0.8, url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-046-09", }, { trust: 0.6, url: "https://cert-portal.siemens.com/productcert/html/ssa-077170.html", }, ], sources: [ { db: "CNVD", id: "CNVD-2023-97257", }, { db: "JVNDB", id: "JVNDB-2023-019857", }, { db: "NVD", id: "CVE-2023-49692", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2023-97257", }, { db: "JVNDB", id: "JVNDB-2023-019857", }, { db: "NVD", id: "CVE-2023-49692", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-12-13T00:00:00", db: "CNVD", id: "CNVD-2023-97257", }, { date: "2024-01-15T00:00:00", db: "JVNDB", id: "JVNDB-2023-019857", }, { date: "2023-12-12T12:15:16.203000", db: "NVD", id: "CVE-2023-49692", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-12-13T00:00:00", db: "CNVD", id: "CNVD-2023-97257", }, { date: "2024-02-19T07:00:00", db: "JVNDB", id: "JVNDB-2023-019857", }, { date: "2024-02-13T09:15:46.507000", db: "NVD", id: "CVE-2023-49692", }, ], }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "in multiple Siemens products OS Command injection vulnerability", sources: [ { db: "JVNDB", id: "JVNDB-2023-019857", }, ], trust: 0.8, }, }
cve-2023-49692
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T22:01:25.938Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-068047.pdf", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/html/ssa-068047.html", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/html/ssa-602936.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "RUGGEDCOM RM1224 LTE(4G) EU", vendor: "Siemens", versions: [ { lessThan: "V7.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "RUGGEDCOM RM1224 LTE(4G) NAM", vendor: "Siemens", versions: [ { lessThan: "V7.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M804PB", vendor: "Siemens", versions: [ { lessThan: "V7.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M812-1 ADSL-Router", vendor: "Siemens", versions: [ { lessThan: "V7.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M812-1 ADSL-Router", vendor: "Siemens", versions: [ { lessThan: "V7.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M816-1 ADSL-Router", vendor: "Siemens", versions: [ { lessThan: "V7.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M816-1 ADSL-Router", vendor: "Siemens", versions: [ { lessThan: "V7.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M826-2 SHDSL-Router", vendor: "Siemens", versions: [ { lessThan: "V7.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M874-2", vendor: "Siemens", versions: [ { lessThan: "V7.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M874-3", vendor: "Siemens", versions: [ { lessThan: "V7.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M876-3", vendor: "Siemens", versions: [ { lessThan: "V7.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M876-3 (ROK)", vendor: "Siemens", versions: [ { lessThan: "V7.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M876-4", vendor: "Siemens", versions: [ { lessThan: "V7.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M876-4 (EU)", vendor: "Siemens", versions: [ { lessThan: "V7.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M876-4 (NAM)", vendor: "Siemens", versions: [ { lessThan: "V7.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE MUM853-1 (EU)", vendor: "Siemens", versions: [ { lessThan: "V7.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE MUM856-1 (EU)", vendor: "Siemens", versions: [ { lessThan: "V7.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE MUM856-1 (RoW)", vendor: "Siemens", versions: [ { lessThan: "V7.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE S615 EEC LAN-Router", vendor: "Siemens", versions: [ { lessThan: "V7.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE S615 LAN-Router", vendor: "Siemens", versions: [ { lessThan: "V7.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V7.2.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V7.2.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V7.2.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V7.2.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V7.2.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V7.2.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V7.2.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V7.2.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V7.2.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V7.2.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V7.2.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V7.2.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V7.2.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V7.2.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V7.2.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V7.2.2). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the parsing of the IPSEC configuration. This could allow malicious local administrators to issue commands on system level after a new connection is established.", }, ], metrics: [ { cvssV3_1: { baseScore: 7.2, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-78", description: "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-08-13T07:53:59.588Z", orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", shortName: "siemens", }, references: [ { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-068047.pdf", }, { url: "https://cert-portal.siemens.com/productcert/html/ssa-068047.html", }, { url: "https://cert-portal.siemens.com/productcert/html/ssa-602936.html", }, ], }, }, cveMetadata: { assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", assignerShortName: "siemens", cveId: "CVE-2023-49692", datePublished: "2023-12-12T11:27:26.231Z", dateReserved: "2023-11-29T17:51:25.463Z", dateUpdated: "2024-08-13T07:53:59.588Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-41990
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://github.com/strongswan/strongswan/releases/tag/5.9.4 | x_refsource_MISC | |
https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41990%29.html | x_refsource_CONFIRM | |
https://www.debian.org/security/2021/dsa-4989 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/ | vendor-advisory, x_refsource_FEDORA | |
https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T03:22:25.777Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/strongswan/strongswan/releases/tag/5.9.4", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41990%29.html", }, { name: "DSA-4989", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2021/dsa-4989", }, { name: "FEDORA-2021-0b37146973", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/", }, { name: "FEDORA-2021-b3df83339e", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/", }, { name: "FEDORA-2021-95fab6a482", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution cannot occur.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-02-08T12:06:11", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/strongswan/strongswan/releases/tag/5.9.4", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41990%29.html", }, { name: "DSA-4989", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2021/dsa-4989", }, { name: "FEDORA-2021-0b37146973", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/", }, { name: "FEDORA-2021-b3df83339e", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/", }, { name: "FEDORA-2021-95fab6a482", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2021-41990", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution cannot occur.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/strongswan/strongswan/releases/tag/5.9.4", refsource: "MISC", url: "https://github.com/strongswan/strongswan/releases/tag/5.9.4", }, { name: "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41990).html", refsource: "CONFIRM", url: "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41990).html", }, { name: "DSA-4989", refsource: "DEBIAN", url: "https://www.debian.org/security/2021/dsa-4989", }, { name: "FEDORA-2021-0b37146973", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/", }, { name: "FEDORA-2021-b3df83339e", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/", }, { name: "FEDORA-2021-95fab6a482", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2021-41990", datePublished: "2021-10-18T13:44:50", dateReserved: "2021-10-04T00:00:00", dateUpdated: "2024-08-04T03:22:25.777Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-31765
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: All versions < V7.1.2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T07:26:01.033Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-552702.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "RUGGEDCOM RM1224 LTE(4G) EU", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V7.1.2", }, ], }, { defaultStatus: "unknown", product: "RUGGEDCOM RM1224 LTE(4G) NAM", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V7.1.2", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M804PB", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V7.1.2", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M812-1 ADSL-Router (Annex A)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V7.1.2", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M812-1 ADSL-Router (Annex B)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V7.1.2", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M816-1 ADSL-Router (Annex A)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V7.1.2", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M816-1 ADSL-Router (Annex B)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V7.1.2", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M826-2 SHDSL-Router", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V7.1.2", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M874-2", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V7.1.2", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M874-3", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V7.1.2", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M876-3 (EVDO)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V7.1.2", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M876-3 (ROK)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V7.1.2", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M876-4", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V7.1.2", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M876-4 (EU)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V7.1.2", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M876-4 (NAM)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V7.1.2", }, ], }, { defaultStatus: "unknown", product: "SCALANCE MUM853-1 (EU)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V7.1.2", }, ], }, { defaultStatus: "unknown", product: "SCALANCE MUM856-1 (EU)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V7.1.2", }, ], }, { defaultStatus: "unknown", product: "SCALANCE MUM856-1 (RoW)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V7.1.2", }, ], }, { defaultStatus: "unknown", product: "SCALANCE S615", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V7.1.2", }, ], }, { defaultStatus: "unknown", product: "SCALANCE S615 EEC", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V7.1.2", }, ], }, { defaultStatus: "unknown", product: "SCALANCE SC622-2C", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.0", }, ], }, { defaultStatus: "unknown", product: "SCALANCE SC632-2C", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.0", }, ], }, { defaultStatus: "unknown", product: "SCALANCE SC636-2C", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.0", }, ], }, { defaultStatus: "unknown", product: "SCALANCE SC642-2C", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.0", }, ], }, { defaultStatus: "unknown", product: "SCALANCE SC646-2C", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.0", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W1748-1 M12", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W1748-1 M12", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W1788-1 M12", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W1788-2 EEC M12", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W1788-2 M12", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W1788-2IA M12", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W721-1 RJ45", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W721-1 RJ45", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W722-1 RJ45", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W722-1 RJ45", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W722-1 RJ45", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W734-1 RJ45", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W734-1 RJ45", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W734-1 RJ45", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W734-1 RJ45 (USA)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W738-1 M12", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W738-1 M12", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W748-1 M12", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W748-1 M12", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W748-1 RJ45", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W748-1 RJ45", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W761-1 RJ45", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W761-1 RJ45", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W774-1 M12 EEC", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W774-1 M12 EEC", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W774-1 RJ45", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W774-1 RJ45", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W774-1 RJ45", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W774-1 RJ45", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W774-1 RJ45 (USA)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W778-1 M12", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W778-1 M12", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W778-1 M12 EEC", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W778-1 M12 EEC (USA)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W786-1 RJ45", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W786-1 RJ45", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W786-2 RJ45", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W786-2 RJ45", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W786-2 RJ45", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W786-2 SFP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W786-2 SFP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W786-2IA RJ45", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W786-2IA RJ45", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W788-1 M12", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W788-1 M12", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W788-1 RJ45", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W788-1 RJ45", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W788-2 M12", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W788-2 M12", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W788-2 M12 EEC", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W788-2 M12 EEC", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W788-2 M12 EEC", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W788-2 RJ45", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W788-2 RJ45", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE W788-2 RJ45", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SCALANCE WAM763-1", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V2.0", }, ], }, { defaultStatus: "unknown", product: "SCALANCE WAM766-1 (EU)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V2.0", }, ], }, { defaultStatus: "unknown", product: "SCALANCE WAM766-1 (US)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V2.0", }, ], }, { defaultStatus: "unknown", product: "SCALANCE WAM766-1 EEC (EU)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V2.0", }, ], }, { defaultStatus: "unknown", product: "SCALANCE WAM766-1 EEC (US)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V2.0", }, ], }, { defaultStatus: "unknown", product: "SCALANCE WUM763-1", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V2.0", }, ], }, { defaultStatus: "unknown", product: "SCALANCE WUM763-1", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V2.0", }, ], }, { defaultStatus: "unknown", product: "SCALANCE WUM766-1 (EU)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V2.0", }, ], }, { defaultStatus: "unknown", product: "SCALANCE WUM766-1 (US)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V2.0", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XB205-3 (SC, PN)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XB205-3 (ST, E/IP)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XB205-3 (ST, E/IP)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XB205-3 (ST, PN)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XB205-3LD (SC, E/IP)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XB205-3LD (SC, PN)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XB208 (E/IP)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XB208 (PN)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XB213-3 (SC, E/IP)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XB213-3 (SC, PN)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XB213-3 (ST, E/IP)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XB213-3 (ST, PN)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XB213-3LD (SC, E/IP)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XB213-3LD (SC, PN)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XB216 (E/IP)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XB216 (PN)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC206-2 (SC)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC206-2 (ST/BFOC)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC206-2G PoE", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC206-2G PoE (54 V DC)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC206-2G PoE EEC (54 V DC)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC206-2SFP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC206-2SFP EEC", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC206-2SFP G", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC206-2SFP G (EIP DEF.)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC206-2SFP G EEC", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC208", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC208EEC", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC208G", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC208G (EIP def.)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC208G EEC", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC208G PoE", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC208G PoE (54 V DC)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC216", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC216-3G PoE", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC216-3G PoE (54 V DC)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC216-4C", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC216-4C G", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC216-4C G (EIP Def.)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC216-4C G EEC", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC216EEC", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC224", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC224-4C G", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC224-4C G (EIP Def.)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XC224-4C G EEC", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XF204", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XF204 DNA", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XF204-2BA", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XF204-2BA DNA", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XM408-4C", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V6.6", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XM408-4C (L3 int.)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V6.6", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XM408-8C", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V6.6", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XM408-8C (L3 int.)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V6.6", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XM416-4C", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V6.6", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XM416-4C (L3 int.)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V6.6", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XP208", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XP208 (Ethernet/IP)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XP208EEC", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XP208PoE EEC", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XP216", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XP216 (Ethernet/IP)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XP216EEC", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XP216POE EEC", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR324WG (24 x FE, AC 230V)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR324WG (24 X FE, DC 24V)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR326-2C PoE WG", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR326-2C PoE WG (without UL)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR328-4C WG (28xGE, AC 230V)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR328-4C WG (28xGE, DC 24V)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR524-8C, 1x230V", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V6.6", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR524-8C, 1x230V (L3 int.)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V6.6", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR524-8C, 24V", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V6.6", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR524-8C, 24V (L3 int.)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V6.6", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR524-8C, 2x230V", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V6.6", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR524-8C, 2x230V (L3 int.)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V6.6", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR526-8C, 1x230V", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V6.6", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR526-8C, 1x230V (L3 int.)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V6.6", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR526-8C, 24V", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V6.6", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR526-8C, 24V (L3 int.)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V6.6", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR526-8C, 2x230V", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V6.6", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR526-8C, 2x230V (L3 int.)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V6.6", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR528-6M", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V6.6", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR528-6M (2HR2, L3 int.)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V6.6", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR528-6M (2HR2)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V6.6", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR528-6M (L3 int.)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V6.6", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR552-12M", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V6.6", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR552-12M (2HR2, L3 int.)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V6.6", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR552-12M (2HR2)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V6.6", }, ], }, { defaultStatus: "unknown", product: "SCALANCE XR552-12M (2HR2)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V6.6", }, ], }, { defaultStatus: "unknown", product: "SIPLUS NET SCALANCE XC206-2", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SIPLUS NET SCALANCE XC206-2SFP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SIPLUS NET SCALANCE XC208", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, { defaultStatus: "unknown", product: "SIPLUS NET SCALANCE XC216-4C", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4", }, ], }, ], descriptions: [ { lang: "en", value: "Affected devices do not properly authorize the change password function of the web interface.\r\nThis could allow low privileged users to escalate their privileges.", }, ], metrics: [ { cvssV3_1: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-862", description: "CWE-862: Missing Authorization", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-11T09:02:25.347Z", orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", shortName: "siemens", }, references: [ { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-552702.pdf", }, ], }, }, cveMetadata: { assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", assignerShortName: "siemens", cveId: "CVE-2022-31765", datePublished: "2022-10-11T00:00:00", dateReserved: "2022-05-27T00:00:00", dateUpdated: "2024-08-03T07:26:01.033Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-49691
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 LTE(4G) EU |
Version: 0 < V8.0 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T22:01:25.906Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/html/ssa-180704.html", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/html/ssa-602936.html", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/html/ssa-690517.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "RUGGEDCOM RM1224 LTE(4G) EU", vendor: "Siemens", versions: [ { lessThan: "V8.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "RUGGEDCOM RM1224 LTE(4G) NAM", vendor: "Siemens", versions: [ { lessThan: "V8.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M804PB", vendor: "Siemens", versions: [ { lessThan: "V8.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M812-1 ADSL-Router", vendor: "Siemens", versions: [ { lessThan: "V8.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M812-1 ADSL-Router", vendor: "Siemens", versions: [ { lessThan: "V8.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M816-1 ADSL-Router", vendor: "Siemens", versions: [ { lessThan: "V8.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M816-1 ADSL-Router", vendor: "Siemens", versions: [ { lessThan: "V8.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M826-2 SHDSL-Router", vendor: "Siemens", versions: [ { lessThan: "V8.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M874-2", vendor: "Siemens", versions: [ { lessThan: "V8.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M874-3", vendor: "Siemens", versions: [ { lessThan: "V8.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M876-3", vendor: "Siemens", versions: [ { lessThan: "V8.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M876-3 (ROK)", vendor: "Siemens", versions: [ { lessThan: "V8.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M876-4", vendor: "Siemens", versions: [ { lessThan: "V8.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M876-4 (EU)", vendor: "Siemens", versions: [ { lessThan: "V8.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE M876-4 (NAM)", vendor: "Siemens", versions: [ { lessThan: "V8.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE MUM853-1 (EU)", vendor: "Siemens", versions: [ { lessThan: "V8.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE MUM856-1 (EU)", vendor: "Siemens", versions: [ { lessThan: "V8.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE MUM856-1 (RoW)", vendor: "Siemens", versions: [ { lessThan: "V8.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE S615 EEC LAN-Router", vendor: "Siemens", versions: [ { lessThan: "V8.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SCALANCE S615 LAN-Router", vendor: "Siemens", versions: [ { lessThan: "V8.0", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.0). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the handling of the DDNS configuration. This could allow malicious local administrators to issue commands on system level after a successful IP address update.", }, ], metrics: [ { cvssV3_1: { baseScore: 7.2, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-78", description: "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-08-13T07:53:58.093Z", orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", shortName: "siemens", }, references: [ { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf", }, { url: "https://cert-portal.siemens.com/productcert/html/ssa-180704.html", }, { url: "https://cert-portal.siemens.com/productcert/html/ssa-602936.html", }, { url: "https://cert-portal.siemens.com/productcert/html/ssa-690517.html", }, ], }, }, cveMetadata: { assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", assignerShortName: "siemens", cveId: "CVE-2023-49691", datePublished: "2023-12-12T11:27:24.588Z", dateReserved: "2023-11-29T17:51:25.463Z", dateUpdated: "2024-08-13T07:53:58.093Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf | Third Party Advisory | |
cve@mitre.org | https://github.com/strongswan/strongswan/releases/tag/5.9.4 | Release Notes, Third Party Advisory | |
cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/ | ||
cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/ | ||
cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/ | ||
cve@mitre.org | https://www.debian.org/security/2021/dsa-4989 | Third Party Advisory | |
cve@mitre.org | https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41990%29.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/strongswan/strongswan/releases/tag/5.9.4 | Release Notes, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2021/dsa-4989 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41990%29.html |
Vendor | Product | Version | |
---|---|---|---|
strongswan | strongswan | * | |
debian | debian_linux | 10.0 | |
debian | debian_linux | 11.0 | |
fedoraproject | fedora | 33 | |
fedoraproject | fedora | 34 | |
fedoraproject | fedora | 35 | |
siemens | 6gk6108-4am00-2ba2_firmware | - | |
siemens | 6gk6108-4am00-2ba2 | - | |
siemens | 6gk6108-4am00-2da2_firmware | - | |
siemens | 6gk6108-4am00-2da2 | - | |
siemens | 6gk5804-0ap00-2aa2_firmware | - | |
siemens | 6gk5804-0ap00-2aa2 | - | |
siemens | 6gk5812-1aa00-2aa2_firmware | - | |
siemens | 6gk5812-1aa00-2aa2 | - | |
siemens | 6gk5812-1ba00-2aa2_firmware | - | |
siemens | 6gk5812-1ba00-2aa2 | - | |
siemens | 6gk5816-1aa00-2aa2_firmware | - | |
siemens | 6gk5816-1aa00-2aa2 | - | |
siemens | 6gk5816-1ba00-2aa2_firmware | - | |
siemens | 6gk5816-1ba00-2aa2 | - | |
siemens | 6gk5826-2ab00-2ab2_firmware | - | |
siemens | 6gk5826-2ab00-2ab2 | - | |
siemens | 6gk5874-2aa00-2aa2_firmware | - | |
siemens | 6gk5874-2aa00-2aa2 | - | |
siemens | 6gk5874-3aa00-2aa2_firmware | - | |
siemens | 6gk5874-3aa00-2aa2 | - | |
siemens | 6gk5876-3aa02-2ba2_firmware | - | |
siemens | 6gk5876-3aa02-2ba2 | - | |
siemens | 6gk5876-3aa02-2ea2_firmware | - | |
siemens | 6gk5876-3aa02-2ea2 | - | |
siemens | 6gk5876-4aa00-2ba2_firmware | - | |
siemens | 6gk5876-4aa00-2ba2 | - | |
siemens | 6gk5876-4aa00-2da2_firmware | - | |
siemens | 6gk5876-4aa00-2da2 | - | |
siemens | 6gk5856-2ea00-3da1_firmware | - | |
siemens | 6gk5856-2ea00-3da1 | - | |
siemens | 6gk5856-2ea00-3aa1_firmware | - | |
siemens | 6gk5856-2ea00-3aa1 | - | |
siemens | 6gk5615-0aa00-2aa2_firmware | - | |
siemens | 6gk5615-0aa00-2aa2 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:strongswan:strongswan:*:*:*:*:*:*:*:*", matchCriteriaId: "C846D49A-DAB8-4A9D-8F5D-C2DE8514BD13", versionEndExcluding: "5.9.4", versionStartIncluding: "5.6.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", matchCriteriaId: "FA6FEEC2-9F11-4643-8827-749718254FED", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", matchCriteriaId: "E460AA51-FCDA-46B9-AE97-E6676AA5E194", vulnerable: true, }, { criteria: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", matchCriteriaId: "A930E247-0B43-43CB-98FF-6CE7B8189835", vulnerable: true, }, { criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk6108-4am00-2ba2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AAD2C58F-144D-4E04-9D4C-2F2A4698FF5F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk6108-4am00-2ba2:-:*:*:*:*:*:*:*", matchCriteriaId: "FF17A4F6-6057-4A37-87E7-9BCADD629FF7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk6108-4am00-2da2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A69F6F1C-C623-42DB-B4E5-81C29F8273C6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk6108-4am00-2da2:-:*:*:*:*:*:*:*", matchCriteriaId: "6C6F2102-116D-4488-9FEC-2A97DC6C5964", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5804-0ap00-2aa2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "35EC73B8-B260-4F0E-A14E-333706FDD8BD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5804-0ap00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "ABB76E7F-193D-4AFA-A820-A3D93D1AAA32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5812-1aa00-2aa2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CE42F585-4318-4726-BF5A-286EE846EB17", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5812-1aa00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "374B9F0F-D572-4CB3-8A8C-778AE405E4FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5812-1ba00-2aa2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8CD1DFFA-790E-4D92-A8D8-70E784DB4997", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5812-1ba00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "B8A8BB09-B2DC-4F09-A051-FC1ACCA76627", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5816-1aa00-2aa2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "35CFC5E6-B755-46E1-A115-8A6EFCDAFF09", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5816-1aa00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "A8A090F9-63B9-4C02-8FF5-91A99231434A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5816-1ba00-2aa2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D53740F7-54A1-480D-9271-ECF8D0CB067C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5816-1ba00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "A1FC0649-5A59-47C3-92F8-22A27EA08495", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5826-2ab00-2ab2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "068C6894-26DB-49B4-8F6B-1CF647AC6370", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5826-2ab00-2ab2:-:*:*:*:*:*:*:*", matchCriteriaId: "58C61EFF-461A-4FA0-B851-4B838FC9762F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5874-2aa00-2aa2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "91B842C1-A4AC-402C-ADAE-64DB4B2D40A8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5874-2aa00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "BA7267C4-1486-49AF-B5F9-2A40DC285E86", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5874-3aa00-2aa2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8B331C5C-F77B-4892-8CFD-7F24882EA3A4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5874-3aa00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "B82271D5-62F9-4483-A199-AB306F560E70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5876-3aa02-2ba2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "798171AF-C325-4F47-8524-BF1B80C7E6E0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5876-3aa02-2ba2:-:*:*:*:*:*:*:*", matchCriteriaId: "AAFD5B12-FE85-432D-9169-657E8CA7FDB5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5876-3aa02-2ea2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "315AC6E8-FAE5-4FB3-8326-AD224DF63841", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5876-3aa02-2ea2:-:*:*:*:*:*:*:*", matchCriteriaId: "F55773A9-F64F-4365-8249-B1500C809D63", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5876-4aa00-2ba2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "533B1922-AD4E-4AD6-9A82-202300FE2C68", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5876-4aa00-2ba2:-:*:*:*:*:*:*:*", matchCriteriaId: "8040F274-DC42-466F-B13A-4DEA36B351DC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5876-4aa00-2da2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1364CC7A-BA04-405B-B8C2-AE6DDC90B746", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5876-4aa00-2da2:-:*:*:*:*:*:*:*", matchCriteriaId: "D28BCB70-1DA2-4C1D-8FA5-B7242163C3DC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5856-2ea00-3da1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E4C39484-B251-47FD-AFA2-0480BB95A265", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5856-2ea00-3da1:-:*:*:*:*:*:*:*", matchCriteriaId: "AD59C631-F68B-4BB1-ACF1-BDE034214B20", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5856-2ea00-3aa1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "032A3ABF-C39E-4786-9D57-CE14601B2F34", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5856-2ea00-3aa1:-:*:*:*:*:*:*:*", matchCriteriaId: "D3CE8D68-CCE8-49E8-8229-5D64E5F7C67B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5615-0aa00-2aa2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "49D07F00-C689-4B82-A4BA-51A39CE92A87", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5615-0aa00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "CF189379-EA02-4FCE-8E85-51C7CFD1674C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution cannot occur.", }, { lang: "es", value: "El plugin gmp en strongSwan versiones anteriores a 5.9.4, presenta un desbordamiento de enteros remoto por medio de un certificado diseñado con una firma RSASSA-PSS. Por ejemplo, esto puede ser desencadenado por un certificado de CA autofirmado no relacionado enviado por un iniciador. Una ejecución de código remota no puede ocurrir", }, ], id: "CVE-2021-41990", lastModified: "2024-11-21T06:27:01.873", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-10-18T14:15:10.297", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf", }, { source: "cve@mitre.org", tags: [ "Release Notes", "Third Party Advisory", ], url: "https://github.com/strongswan/strongswan/releases/tag/5.9.4", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2021/dsa-4989", }, { source: "cve@mitre.org", url: "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41990%29.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Third Party Advisory", ], url: "https://github.com/strongswan/strongswan/releases/tag/5.9.4", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5FJSATD2R2XHTG4P63GCMQ2N7EWKMME5/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQSQ3BEC22NF4NCDZVCT4P3Q2ZIAJXGJ/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3TQ32JLJOBJDB2EJKSX2PBPB5NFG2D4/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2021/dsa-4989", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41990%29.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-190", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | https://cert-portal.siemens.com/productcert/html/ssa-180704.html | ||
productcert@siemens.com | https://cert-portal.siemens.com/productcert/html/ssa-602936.html | ||
productcert@siemens.com | https://cert-portal.siemens.com/productcert/html/ssa-690517.html | ||
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/html/ssa-180704.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/html/ssa-602936.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/html/ssa-690517.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
siemens | 6gk6108-4am00-2ba2_firmware | * | |
siemens | 6gk6108-4am00-2ba2 | - | |
siemens | 6gk6108-4am00-2da2_firmware | * | |
siemens | 6gk6108-4am00-2da2 | - | |
siemens | 6gk5804-0ap00-2aa2_firmware | * | |
siemens | 6gk5804-0ap00-2aa2 | - | |
siemens | 6gk5812-1aa00-2aa2_firmware | * | |
siemens | 6gk5812-1aa00-2aa2 | - | |
siemens | 6gk5812-1ba00-2aa2_firmware | * | |
siemens | 6gk5812-1ba00-2aa2 | - | |
siemens | 6gk5816-1aa00-2aa2_firmware | * | |
siemens | 6gk5816-1aa00-2aa2 | - | |
siemens | 6gk5816-1ba00-2aa2_firmware | * | |
siemens | 6gk5816-1ba00-2aa2 | - | |
siemens | 6gk5826-2ab00-2ab2_firmware | * | |
siemens | 6gk5826-2ab00-2ab2 | - | |
siemens | 6gk5874-2aa00-2aa2_firmware | * | |
siemens | 6gk5874-2aa00-2aa2 | - | |
siemens | 6gk5874-3aa00-2aa2_firmware | * | |
siemens | 6gk5874-3aa00-2aa2 | - | |
siemens | 6gk5876-3aa02-2ba2_firmware | * | |
siemens | 6gk5876-3aa02-2ba2 | - | |
siemens | 6gk5876-3aa02-2ea2_firmware | * | |
siemens | 6gk5876-3aa02-2ea2 | - | |
siemens | 6gk5876-4aa10-2ba2_firmware | * | |
siemens | 6gk5876-4aa10-2ba2 | - | |
siemens | 6gk5876-4aa00-2ba2_firmware | * | |
siemens | 6gk5876-4aa00-2ba2 | - | |
siemens | 6gk5876-4aa00-2da2_firmware | * | |
siemens | 6gk5876-4aa00-2da2 | - | |
siemens | 6gk5853-2ea00-2da1_firmware | * | |
siemens | 6gk5853-2ea00-2da1 | - | |
siemens | 6gk5856-2ea00-3da1_firmware | * | |
siemens | 6gk5856-2ea00-3da1 | - | |
siemens | 6gk5856-2ea00-3aa1_firmware | * | |
siemens | 6gk5856-2ea00-3aa1 | - | |
siemens | 6gk5615-0aa00-2aa2_firmware | * | |
siemens | 6gk5615-0aa00-2aa2 | - | |
siemens | 6gk5615-0aa01-2aa2_firmware | * | |
siemens | 6gk5615-0aa01-2aa2 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk6108-4am00-2ba2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7D78FE89-5ADC-45CB-8EDC-AA657F106E07", versionEndExcluding: "8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk6108-4am00-2ba2:-:*:*:*:*:*:*:*", matchCriteriaId: "FF17A4F6-6057-4A37-87E7-9BCADD629FF7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk6108-4am00-2da2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "58930E3B-A968-4098-9087-4C740EF376D9", versionEndExcluding: "8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk6108-4am00-2da2:-:*:*:*:*:*:*:*", matchCriteriaId: "6C6F2102-116D-4488-9FEC-2A97DC6C5964", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5804-0ap00-2aa2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3F21BF0A-F11E-46F7-9E29-C56998E72387", versionEndExcluding: "8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5804-0ap00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "ABB76E7F-193D-4AFA-A820-A3D93D1AAA32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5812-1aa00-2aa2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ECAC1DA7-D83A-4FB0-A961-5613B45327B6", versionEndExcluding: "8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5812-1aa00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "374B9F0F-D572-4CB3-8A8C-778AE405E4FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5812-1ba00-2aa2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9EA49DAA-7120-4812-A208-5DAC42D6ECB0", versionEndExcluding: "8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5812-1ba00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "B8A8BB09-B2DC-4F09-A051-FC1ACCA76627", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5816-1aa00-2aa2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ABC8E30A-6736-4305-9113-E7D2E151D3E1", versionEndExcluding: "8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5816-1aa00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "A8A090F9-63B9-4C02-8FF5-91A99231434A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5816-1ba00-2aa2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DDD88150-70D8-444C-8368-957D9C14E0CD", versionEndExcluding: "8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5816-1ba00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "A1FC0649-5A59-47C3-92F8-22A27EA08495", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5826-2ab00-2ab2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2156396E-75DC-4993-BE4B-66FD912CBFD9", versionEndExcluding: "8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5826-2ab00-2ab2:-:*:*:*:*:*:*:*", matchCriteriaId: "58C61EFF-461A-4FA0-B851-4B838FC9762F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5874-2aa00-2aa2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6B19E755-B69C-4D0F-B69C-17C6F03DED37", versionEndExcluding: "8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5874-2aa00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "BA7267C4-1486-49AF-B5F9-2A40DC285E86", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5874-3aa00-2aa2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "40EFCF99-C271-4F47-ACA3-B294855A3C35", versionEndExcluding: "8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5874-3aa00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "B82271D5-62F9-4483-A199-AB306F560E70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5876-3aa02-2ba2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DF90538A-D487-4F20-B938-8B934F84C24E", versionEndExcluding: "8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5876-3aa02-2ba2:-:*:*:*:*:*:*:*", matchCriteriaId: "AAFD5B12-FE85-432D-9169-657E8CA7FDB5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5876-3aa02-2ea2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6CB6CC96-7F8B-400D-A094-81241AC0BE3B", versionEndExcluding: "8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5876-3aa02-2ea2:-:*:*:*:*:*:*:*", matchCriteriaId: "F55773A9-F64F-4365-8249-B1500C809D63", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5876-4aa10-2ba2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D4610695-66D5-4F8A-A11E-721B30DA5904", versionEndExcluding: "8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5876-4aa10-2ba2:-:*:*:*:*:*:*:*", matchCriteriaId: "2BE36DEA-AEF7-4F39-B3C0-52ECBA170333", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5876-4aa00-2ba2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "79C98BF8-4D0F-4A9F-9B3E-0E4D5ABE7E66", versionEndExcluding: "8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5876-4aa00-2ba2:-:*:*:*:*:*:*:*", matchCriteriaId: "8040F274-DC42-466F-B13A-4DEA36B351DC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5876-4aa00-2da2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0730D773-35A2-411C-AB41-EB124F33006A", versionEndExcluding: "8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5876-4aa00-2da2:-:*:*:*:*:*:*:*", matchCriteriaId: "D28BCB70-1DA2-4C1D-8FA5-B7242163C3DC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5853-2ea00-2da1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "71DEC2D7-DE0E-41D6-857C-E7F3BEEB85B6", versionEndExcluding: "8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5853-2ea00-2da1:-:*:*:*:*:*:*:*", matchCriteriaId: "39CFB4DB-2628-49C8-BEF7-DB0A27FEA286", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5856-2ea00-3da1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A90AB343-67D5-4205-8B81-66BFE2D3B230", versionEndExcluding: "8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5856-2ea00-3da1:-:*:*:*:*:*:*:*", matchCriteriaId: "AD59C631-F68B-4BB1-ACF1-BDE034214B20", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5856-2ea00-3aa1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BF69EE86-5E8A-460A-AA47-3EC1475AB8B2", versionEndExcluding: "8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5856-2ea00-3aa1:-:*:*:*:*:*:*:*", matchCriteriaId: "D3CE8D68-CCE8-49E8-8229-5D64E5F7C67B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5615-0aa00-2aa2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BE2DDADD-E6A4-43DD-9317-4AFCB4B970AF", versionEndExcluding: "8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5615-0aa00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "CF189379-EA02-4FCE-8E85-51C7CFD1674C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5615-0aa01-2aa2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2F99BBBF-2AC0-4F02-9B95-5A3DD3D0B4EC", versionEndExcluding: "8.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5615-0aa01-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "B83CF684-8E84-4ECD-9090-8B8997008108", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.0). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the handling of the DDNS configuration. This could allow malicious local administrators to issue commands on system level after a successful IP address update.", }, { lang: "es", value: "Se ha identificado una vulnerabilidad en: \nRUGGEDCOM RM1224 LTE(4G) EU (Todas las versiones < V8.0), \nRUGGEDCOM RM1224 LTE(4G) NAM (Todas las versiones < V8.0), \nSCALANCE M804PB (Todas las versiones < V8.0), \nSCALANCE M812-1 ADSL-Router (Anexo A) (Todas las versiones < V8.0),\nSCALANCE M812-1 ADSL-Router (Anexo B) (Todas las versiones < V8.0),\nSCALANCE M816-1 ADSL-Router (Anexo A) (Todas las versiones < V8.0),\nSCALANCE M816-1 ADSL-Router (Anexo B) (Todas las versiones < V8.0),\nSCALANCE M826-2 SHDSL-Router (Todas las versiones < V8.0), \nSCALANCE M874-2 ( Todas las versiones < V8.0), \nSCALANCE M874-3 (Todas las versiones < V8.0), \nSCALANCE M876-3 (EVDO) (Todas las versiones < V8.0), \nSCALANCE M876-3 (ROK) (Todas las versiones < V8. 0), \nSCALANCE M876-4 (Todas las versiones < V8.0), \nSCALANCE M876-4 (EU) (Todas las versiones < V8.0), \nSCALANCE M876-4 (NAM) (Todas las versiones < V8.0), \nSCALANCE MUM853 -1 (UE) (Todas las versiones < V8.0), \nSCALANCE MUM856-1 (UE) (Todas las versiones < V8.0), \nSCALANCE MUM856-1 (RoW) (Todas las versiones < V8.0), \nSCALANCE S615 (Todas versiones < V8.0), \nSCALANCE S615 EEC (Todas las versiones < V8.0). \nExiste una vulnerabilidad de neutralización inadecuada de elementos especiales utilizados en un comando del sistema operativo con privilegios de root en el manejo de la configuración DDNS. Esto podría permitir a administradores locales maliciosos emitir comandos a nivel del sistema después de una actualización exitosa de la dirección IP.", }, ], id: "CVE-2023-49691", lastModified: "2024-11-21T08:33:42.023", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "productcert@siemens.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-12-12T12:15:15.990", references: [ { source: "productcert@siemens.com", url: "https://cert-portal.siemens.com/productcert/html/ssa-180704.html", }, { source: "productcert@siemens.com", url: "https://cert-portal.siemens.com/productcert/html/ssa-602936.html", }, { source: "productcert@siemens.com", url: "https://cert-portal.siemens.com/productcert/html/ssa-690517.html", }, { source: "productcert@siemens.com", tags: [ "Vendor Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://cert-portal.siemens.com/productcert/html/ssa-180704.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://cert-portal.siemens.com/productcert/html/ssa-602936.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://cert-portal.siemens.com/productcert/html/ssa-690517.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf", }, ], sourceIdentifier: "productcert@siemens.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-78", }, ], source: "productcert@siemens.com", type: "Primary", }, ], }
Vulnerability from fkie_nvd
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-552702.pdf | Mitigation, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-552702.pdf | Mitigation, Patch, Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
siemens | 6gk6108-4am00-2ba2_firmware | * | |
siemens | 6gk6108-4am00-2ba2 | - | |
siemens | 6gk6108-4am00-2da2_firmware | * | |
siemens | 6gk6108-4am00-2da2 | - | |
siemens | 6gk5804-0ap00-2aa2_firmware | * | |
siemens | 6gk5804-0ap00-2aa2 | - | |
siemens | 6gk5812-1aa00-2aa2_firmware | * | |
siemens | 6gk5812-1aa00-2aa2 | - | |
siemens | 6gk5812-1ba00-2aa2_firmware | * | |
siemens | 6gk5812-1ba00-2aa2 | - | |
siemens | 6gk5816-1aa00-2aa2_firmware | * | |
siemens | 6gk5816-1aa00-2aa2 | - | |
siemens | 6gk5816-1ba00-2aa2_firmware | * | |
siemens | 6gk5816-1ba00-2aa2 | - | |
siemens | 6gk5826-2ab00-2ab2_firmware | * | |
siemens | 6gk5826-2ab00-2ab2 | - | |
siemens | 6gk5874-2aa00-2aa2_firmware | * | |
siemens | 6gk5874-2aa00-2aa2 | - | |
siemens | 6gk5874-3aa00-2aa2_firmware | * | |
siemens | 6gk5874-3aa00-2aa2 | - | |
siemens | 6gk5876-3aa02-2ba2_firmware | * | |
siemens | 6gk5876-3aa02-2ba2 | - | |
siemens | 6gk5876-3aa02-2ea2_firmware | * | |
siemens | 6gk5876-3aa02-2ea2 | - | |
siemens | 6gk5876-4aa00-2ba2_firmware | * | |
siemens | 6gk5876-4aa00-2ba2 | - | |
siemens | 6gk5876-4aa00-2da2_firmware | * | |
siemens | 6gk5876-4aa00-2da2 | - | |
siemens | 6gk5853-2ea00-2da1_firmware | * | |
siemens | 6gk5853-2ea00-2da1 | - | |
siemens | 6gk5856-2ea00-3da1_firmware | * | |
siemens | 6gk5856-2ea00-3da1 | - | |
siemens | 6gk5856-2ea00-3aa1_firmware | * | |
siemens | 6gk5856-2ea00-3aa1 | - | |
siemens | 6gk5622-2gs00-2ac2_firmware | - | |
siemens | 6gk5622-2gs00-2ac2 | - | |
siemens | 6gk5632-2gs00-2ac2_firmware | - | |
siemens | 6gk5632-2gs00-2ac2 | - | |
siemens | 6gk5636-2gs00-2ac2_firmware | - | |
siemens | 6gk5636-2gs00-2ac2 | - | |
siemens | 6gk5642-2gs00-2ac2_firmware | - | |
siemens | 6gk5642-2gs00-2ac2 | - | |
siemens | 6gk5646-2gs00-2ac2_firmware | - | |
siemens | 6gk5646-2gs00-2ac2 | - | |
siemens | 6gk5721-1fc00-0aa0_firmware | - | |
siemens | 6gk5721-1fc00-0aa0 | - | |
siemens | 6gk5721-1fc00-0ab0_firmware | - | |
siemens | 6gk5721-1fc00-0ab0 | - | |
siemens | 6gk5722-1fc00-0aa0_firmware | - | |
siemens | 6gk5722-1fc00-0aa0 | - | |
siemens | 6gk5722-1fc00-0ab0_firmware | - | |
siemens | 6gk5722-1fc00-0ab0 | - | |
siemens | 6gk5722-1fc00-0ac0_firmware | - | |
siemens | 6gk5722-1fc00-0ac0 | - | |
siemens | 6gk5734-1fx00-0aa0_firmware | - | |
siemens | 6gk5734-1fx00-0aa0 | - | |
siemens | 6gk5734-1fx00-0aa6_firmware | - | |
siemens | 6gk5734-1fx00-0aa6 | - | |
siemens | 6gk5734-1fx00-0ab0_firmware | - | |
siemens | 6gk5734-1fx00-0ab0 | - | |
siemens | 6gk5734-1fx00-0ab6_firmware | - | |
siemens | 6gk5734-1fx00-0ab6 | - | |
siemens | 6gk5738-1gy00-0aa0_firmware | - | |
siemens | 6gk5738-1gy00-0aa0 | - | |
siemens | 6gk5738-1gy00-0ab0_firmware | - | |
siemens | 6gk5738-1gy00-0ab0 | - | |
siemens | 6gk5748-1gd00-0aa0_firmware | - | |
siemens | 6gk5748-1gd00-0aa0 | - | |
siemens | 6gk5748-1gd00-0ab0_firmware | - | |
siemens | 6gk5748-1gd00-0ab0 | - | |
siemens | 6gk5748-1fc00-0aa0_firmware | - | |
siemens | 6gk5748-1fc00-0aa0 | - | |
siemens | 6gk5748-1fc00-0ab0_firmware | - | |
siemens | 6gk5748-1fc00-0ab0 | - | |
siemens | 6gk5761-1fc00-0aa0_firmware | - | |
siemens | 6gk5761-1fc00-0aa0 | - | |
siemens | 6gk5761-1fc00-0ab0_firmware | - | |
siemens | 6gk5761-1fc00-0ab0 | - | |
siemens | 6gk5774-1fy00-0ta0_firmware | - | |
siemens | 6gk5774-1fy00-0ta0 | - | |
siemens | 6gk5774-1fy00-0tb0_firmware | - | |
siemens | 6gk5774-1fy00-0tb0 | - | |
siemens | 6gk5774-1fx00-0aa0_firmware | - | |
siemens | 6gk5774-1fx00-0aa0 | - | |
siemens | 6gk5774-1fx00-0aa6_firmware | - | |
siemens | 6gk5774-1fx00-0aa6 | - | |
siemens | 6gk5774-1fx00-0ab0_firmware | - | |
siemens | 6gk5774-1fx00-0ab0 | - | |
siemens | 6gk5774-1fx00-0ac0_firmware | - | |
siemens | 6gk5774-1fx00-0ac0 | - | |
siemens | 6gk5774-1fx00-0ab6_firmware | - | |
siemens | 6gk5774-1fx00-0ab6 | - | |
siemens | 6gk5778-1gy00-0aa0_firmware | - | |
siemens | 6gk5778-1gy00-0aa0 | - | |
siemens | 6gk5778-1gy00-0ab0_firmware | - | |
siemens | 6gk5778-1gy00-0ab0 | - | |
siemens | 6gk5778-1gy00-0ta0_firmware | - | |
siemens | 6gk5778-1gy00-0ta0 | - | |
siemens | 6gk5778-1gy00-0tb0_firmware | - | |
siemens | 6gk5778-1gy00-0tb0 | - | |
siemens | 6gk5786-1fc00-0aa0_firmware | - | |
siemens | 6gk5786-1fc00-0aa0 | - | |
siemens | 6gk5786-1fc00-0ab0_firmware | - | |
siemens | 6gk5786-1fc00-0ab0 | - | |
siemens | 6gk5786-2fc00-0aa0_firmware | - | |
siemens | 6gk5786-2fc00-0aa0 | - | |
siemens | 6gk5786-2fc00-0ab0_firmware | - | |
siemens | 6gk5786-2fc00-0ab0 | - | |
siemens | 6gk5786-2fc00-0ac0_firmware | - | |
siemens | 6gk5786-2fc00-0ac0 | - | |
siemens | 6gk5786-2fe00-0aa0_firmware | - | |
siemens | 6gk5786-2fe00-0aa0 | - | |
siemens | 6gk5786-2fe00-0ab0_firmware | - | |
siemens | 6gk5786-2fe00-0ab0 | - | |
siemens | 6gk5786-2hc00-0aa0_firmware | - | |
siemens | 6gk5786-2hc00-0aa0 | - | |
siemens | 6gk5786-2hc00-0ab0_firmware | - | |
siemens | 6gk5786-2hc00-0ab0 | - | |
siemens | 6gk5788-1gd00-0aa0_firmware | - | |
siemens | 6gk5788-1gd00-0aa0 | - | |
siemens | 6gk5788-1gd00-0ab0_firmware | - | |
siemens | 6gk5788-1gd00-0ab0 | - | |
siemens | 6gk5788-1fc00-0aa0_firmware | - | |
siemens | 6gk5788-1fc00-0aa0 | - | |
siemens | 6gk5788-1fc00-0ab0_firmware | - | |
siemens | 6gk5788-1fc00-0ab0 | - | |
siemens | 6gk5788-2gd00-0aa0_firmware | - | |
siemens | 6gk5788-2gd00-0aa0 | - | |
siemens | 6gk5788-2gd00-0ab0_firmware | - | |
siemens | 6gk5788-2gd00-0ab0 | - | |
siemens | 6gk5788-2gd00-0ta0_firmware | - | |
siemens | 6gk5788-2gd00-0ta0 | - | |
siemens | 6gk5788-2gd00-0tb0_firmware | - | |
siemens | 6gk5788-2gd00-0tb0 | - | |
siemens | 6gk5788-2gd00-0tc0_firmware | - | |
siemens | 6gk5788-2gd00-0tc0 | - | |
siemens | 6gk5788-2fc00-0aa0_firmware | - | |
siemens | 6gk5788-2fc00-0aa0 | - | |
siemens | 6gk5788-2fc00-0ab0_firmware | - | |
siemens | 6gk5788-2fc00-0ab0 | - | |
siemens | 6gk5788-2fc00-0ac0_firmware | - | |
siemens | 6gk5788-2fc00-0ac0 | - | |
siemens | 6gk5748-1gy01-0aa0_firmware | - | |
siemens | 6gk5748-1gy01-0aa0 | - | |
siemens | 6gk5748-1gy01-0ta0_firmware | - | |
siemens | 6gk5748-1gy01-0ta0 | - | |
siemens | 6gk5788-1gy01-0aa0_firmware | - | |
siemens | 6gk5788-1gy01-0aa0 | - | |
siemens | 6gk5788-2gy01-0ta0_firmware | - | |
siemens | 6gk5788-2gy01-0ta0 | - | |
siemens | 6gk5788-2gy01-0aa0_firmware | - | |
siemens | 6gk5788-2gy01-0aa0 | - | |
siemens | 6gk5788-2hy01-0aa0_firmware | - | |
siemens | 6gk5788-2hy01-0aa0 | - | |
siemens | 6gk5763-1al00-7da0_firmware | - | |
siemens | 6gk5763-1al00-7da0 | - | |
siemens | 6gk5766-1ge00-7da0_firmware | - | |
siemens | 6gk5766-1ge00-7da0 | - | |
siemens | 6gk5766-1ge00-7db0_firmware | - | |
siemens | 6gk5766-1ge00-7db0 | - | |
siemens | 6gk5766-1je00-7da0_firmware | - | |
siemens | 6gk5766-1je00-7da0 | - | |
siemens | 6gk5766-1ge00-7ta0_firmware | - | |
siemens | 6gk5766-1ge00-7ta0 | - | |
siemens | 6gk5766-1ge00-7tb0_firmware | - | |
siemens | 6gk5766-1ge00-7tb0 | - | |
siemens | 6gk5766-1je00-7ta0_firmware | - | |
siemens | 6gk5766-1je00-7ta0 | - | |
siemens | 6gk5763-1al00-3aa0_firmware | - | |
siemens | 6gk5763-1al00-3aa0 | - | |
siemens | 6gk5763-1al00-3da0_firmware | - | |
siemens | 6gk5763-1al00-3da0 | - | |
siemens | 6gk5766-1ge00-3da0_firmware | - | |
siemens | 6gk5766-1ge00-3da0 | - | |
siemens | 6gk5766-1ge00-3db0_firmware | - | |
siemens | 6gk5766-1ge00-3db0 | - | |
siemens | 6gk5766-1je00-3da0_firmware | - | |
siemens | 6gk5766-1je00-3da0 | - | |
siemens | 6gk5205-3bb00-2ab2_firmware | - | |
siemens | 6gk5205-3bb00-2ab2 | - | |
siemens | 6gk5205-3bb00-2tb2_firmware | - | |
siemens | 6gk5205-3bb00-2tb2 | - | |
siemens | 6gk5205-3bd00-2tb2_firmware | - | |
siemens | 6gk5205-3bd00-2tb2 | - | |
siemens | 6gk5205-3bd00-2ab2_firmware | - | |
siemens | 6gk5205-3bd00-2ab2 | - | |
siemens | 6gk5205-3bf00-2tb2_firmware | - | |
siemens | 6gk5205-3bf00-2tb2 | - | |
siemens | 6gk5205-3bf00-2ab2_firmware | - | |
siemens | 6gk5205-3bf00-2ab2 | - | |
siemens | 6gk5208-0ba00-2tb2_firmware | - | |
siemens | 6gk5208-0ba00-2tb2 | - | |
siemens | 6gk5208-0ba00-2ab2_firmware | - | |
siemens | 6gk5208-0ba00-2ab2 | - | |
siemens | 6gk5213-3bd00-2tb2_firmware | - | |
siemens | 6gk5213-3bd00-2tb2 | - | |
siemens | 6gk5213-3bd00-2ab2_firmware | - | |
siemens | 6gk5213-3bd00-2ab2 | - | |
siemens | 6gk5213-3bb00-2tb2_firmware | - | |
siemens | 6gk5213-3bb00-2tb2 | - | |
siemens | 6gk5213-3bb00-2ab2_firmware | - | |
siemens | 6gk5213-3bb00-2ab2 | - | |
siemens | 6gk5213-3bf00-2tb2_firmware | - | |
siemens | 6gk5213-3bf00-2tb2 | - | |
siemens | 6gk5213-3bf00-2ab2_firmware | - | |
siemens | 6gk5213-3bf00-2ab2 | - | |
siemens | 6gk5216-0ba00-2tb2_firmware | - | |
siemens | 6gk5216-0ba00-2tb2 | - | |
siemens | 6gk5216-0ba00-2ab2_firmware | - | |
siemens | 6gk5216-0ba00-2ab2 | - | |
siemens | 6gk5206-2bd00-2ac2_firmware | - | |
siemens | 6gk5206-2bd00-2ac2 | - | |
siemens | 6gk5206-2bb00-2ac2_firmware | - | |
siemens | 6gk5206-2bb00-2ac2 | - | |
siemens | 6gk5206-2rs00-2ac2_firmware | - | |
siemens | 6gk5206-2rs00-2ac2 | - | |
siemens | 6gk5206-2rs00-5ac2_firmware | - | |
siemens | 6gk5206-2rs00-5ac2 | - | |
siemens | 6gk5206-2rs00-5fc2_firmware | - | |
siemens | 6gk5206-2rs00-5fc2 | - | |
siemens | 6gk5206-2bs00-2ac2_firmware | - | |
siemens | 6gk5206-2bs00-2ac2 | - | |
siemens | 6gk5206-2bs00-2fc2_firmware | - | |
siemens | 6gk5206-2bs00-2fc2 | - | |
siemens | 6gk5206-2gs00-2ac2_firmware | - | |
siemens | 6gk5206-2gs00-2ac2 | - | |
siemens | 6gk5206-2gs00-2tc2_firmware | - | |
siemens | 6gk5206-2gs00-2tc2 | - | |
siemens | 6gk5206-2gs00-2fc2_firmware | - | |
siemens | 6gk5206-2gs00-2fc2 | - | |
siemens | 6gk5208-0ba00-2ac2_firmware | - | |
siemens | 6gk5208-0ba00-2ac2 | - | |
siemens | 6gk5208-0ba00-2fc2_firmware | - | |
siemens | 6gk5208-0ba00-2fc2 | - | |
siemens | 6gk5208-0ga00-2ac2_firmware | - | |
siemens | 6gk5208-0ga00-2ac2 | - | |
siemens | 6gk5208-0ga00-2tc2_firmware | - | |
siemens | 6gk5208-0ga00-2tc2 | - | |
siemens | 6gk5208-0ga00-2fc2_firmware | - | |
siemens | 6gk5208-0ga00-2fc2 | - | |
siemens | 6gk5208-0ra00-2ac2_firmware | - | |
siemens | 6gk5208-0ra00-2ac2 | - | |
siemens | 6gk5208-0ra00-5ac2_firmware | - | |
siemens | 6gk5208-0ra00-5ac2 | - | |
siemens | 6gk5216-0ba00-2ac2_firmware | - | |
siemens | 6gk5216-0ba00-2ac2 | - | |
siemens | 6gk5216-3rs00-2ac2_firmware | - | |
siemens | 6gk5216-3rs00-2ac2 | - | |
siemens | 6gk5216-3rs00-5ac2_firmware | - | |
siemens | 6gk5216-3rs00-5ac2 | - | |
siemens | 6gk5216-4bs00-2ac2_firmware | - | |
siemens | 6gk5216-4bs00-2ac2 | - | |
siemens | 6gk5216-4gs00-2ac2_firmware | - | |
siemens | 6gk5216-4gs00-2ac2 | - | |
siemens | 6gk5216-4gs00-2tc2_firmware | - | |
siemens | 6gk5216-4gs00-2tc2 | - | |
siemens | 6gk5216-4gs00-2fc2_firmware | - | |
siemens | 6gk5216-4gs00-2fc2 | - | |
siemens | 6gk5216-0ba00-2fc2_firmware | - | |
siemens | 6gk5216-0ba00-2fc2 | - | |
siemens | 6gk5224-0ba00-2ac2_firmware | - | |
siemens | 6gk5224-0ba00-2ac2 | - | |
siemens | 6gk5224-4gs00-2ac2_firmware | - | |
siemens | 6gk5224-4gs00-2ac2 | - | |
siemens | 6gk5224-4gs00-2tc2_firmware | - | |
siemens | 6gk5224-4gs00-2tc2 | - | |
siemens | 6gk5224-4gs00-2fc2_firmware | - | |
siemens | 6gk5224-4gs00-2fc2 | - | |
siemens | 6gk5204-0ba00-2gf2_firmware | - | |
siemens | 6gk5204-0ba00-2gf2 | - | |
siemens | 6gk5204-0ba00-2yf2_firmware | - | |
siemens | 6gk5204-0ba00-2yf2 | - | |
siemens | 6gk5204-2aa00-2gf2_firmware | - | |
siemens | 6gk5204-2aa00-2gf2 | - | |
siemens | 6gk5204-2aa00-2yf2_firmware | - | |
siemens | 6gk5204-2aa00-2yf2 | - | |
siemens | 6gk5408-4gp00-2am2_firmware | - | |
siemens | 6gk5408-4gp00-2am2 | - | |
siemens | 6gk5408-4gq00-2am2_firmware | - | |
siemens | 6gk5408-4gq00-2am2 | - | |
siemens | 6gk5408-8gs00-2am2_firmware | - | |
siemens | 6gk5408-8gs00-2am2 | - | |
siemens | 6gk5408-8gr00-2am2_firmware | - | |
siemens | 6gk5408-8gr00-2am2 | - | |
siemens | 6gk5416-4gs00-2am2_firmware | - | |
siemens | 6gk5416-4gs00-2am2 | - | |
siemens | 6gk5416-4gr00-2am2_firmware | - | |
siemens | 6gk5416-4gr00-2am2 | - | |
siemens | 6gk5208-0ha00-2as6_firmware | - | |
siemens | 6gk5208-0ha00-2as6 | - | |
siemens | 6gk5208-0ha00-2ts6_firmware | - | |
siemens | 6gk5208-0ha00-2ts6 | - | |
siemens | 6gk5208-0ha00-2es6_firmware | - | |
siemens | 6gk5208-0ha00-2es6 | - | |
siemens | 6gk5208-0ua00-5es6_firmware | - | |
siemens | 6gk5208-0ua00-5es6 | - | |
siemens | 6gk5216-0ha00-2as6_firmware | - | |
siemens | 6gk5216-0ha00-2as6 | - | |
siemens | 6gk5216-0ha00-2ts6_firmware | - | |
siemens | 6gk5216-0ha00-2ts6 | - | |
siemens | 6gk5216-0ha00-2es6_firmware | - | |
siemens | 6gk5216-0ha00-2es6 | - | |
siemens | 6gk5216-0ua00-5es6_firmware | - | |
siemens | 6gk5216-0ua00-5es6 | - | |
siemens | 6gk5324-0ba00-3ar3_firmware | - | |
siemens | 6gk5324-0ba00-3ar3 | - | |
siemens | 6gk5324-0ba00-2ar3_firmware | - | |
siemens | 6gk5324-0ba00-2ar3 | - | |
siemens | 6gk5326-2qs00-3ar3_firmware | - | |
siemens | 6gk5326-2qs00-3ar3 | - | |
siemens | 6gk5326-2qs00-3rr3_firmware | - | |
siemens | 6gk5326-2qs00-3rr3 | - | |
siemens | 6gk5328-4fs00-3ar3_firmware | - | |
siemens | 6gk5328-4fs00-3ar3 | - | |
siemens | 6gk5328-4fs00-3rr3_firmware | - | |
siemens | 6gk5328-4fs00-3rr3 | - | |
siemens | 6gk5328-4fs00-2ar3_firmware | - | |
siemens | 6gk5328-4fs00-2ar3 | - | |
siemens | 6gk5328-4fs00-2rr3_firmware | - | |
siemens | 6gk5328-4fs00-2rr3 | - | |
siemens | 6gk5328-4ss00-3ar3_firmware | - | |
siemens | 6gk5328-4ss00-3ar3 | - | |
siemens | 6gk5328-4ss00-2ar3_firmware | - | |
siemens | 6gk5328-4ss00-2ar3 | - | |
siemens | 6gk5524-8gs00-3ar2_firmware | - | |
siemens | 6gk5524-8gs00-3ar2 | - | |
siemens | 6gk5524-8gr00-3ar2_firmware | - | |
siemens | 6gk5524-8gr00-3ar2 | - | |
siemens | 6gk5524-8gs00-4ar2_firmware | - | |
siemens | 6gk5524-8gs00-4ar2 | - | |
siemens | 6gk5524-8gr00-4ar2_firmware | - | |
siemens | 6gk5524-8gr00-4ar2 | - | |
siemens | 6gk5524-8gs00-2ar2_firmware | - | |
siemens | 6gk5524-8gs00-2ar2 | - | |
siemens | 6gk5524-8gr00-2ar2_firmware | - | |
siemens | 6gk5524-8gr00-2ar2 | - | |
siemens | 6gk5526-8gs00-3ar2_firmware | - | |
siemens | 6gk5526-8gs00-3ar2 | - | |
siemens | 6gk5526-8gr00-3ar2_firmware | - | |
siemens | 6gk5526-8gr00-3ar2 | - | |
siemens | 6gk5526-8gs00-4ar2_firmware | - | |
siemens | 6gk5526-8gs00-4ar2 | - | |
siemens | 6gk5526-8gr00-4ar2_firmware | - | |
siemens | 6gk5526-8gr00-4ar2 | - | |
siemens | 6gk5526-8gs00-2ar2_firmware | - | |
siemens | 6gk5526-8gs00-2ar2 | - | |
siemens | 6gk5526-8gr00-2ar2_firmware | - | |
siemens | 6gk5526-8gr00-2ar2 | - | |
siemens | 6gk5528-0aa00-2ar2_firmware | - | |
siemens | 6gk5528-0aa00-2ar2 | - | |
siemens | 6gk5528-0aa00-2hr2_firmware | - | |
siemens | 6gk5528-0aa00-2hr2 | - | |
siemens | 6gk5528-0ar00-2hr2_firmware | - | |
siemens | 6gk5528-0ar00-2hr2 | - | |
siemens | 6gk5528-0ar00-2ar2_firmware | - | |
siemens | 6gk5528-0ar00-2ar2 | - | |
siemens | 6gk5552-0aa00-2ar2_firmware | - | |
siemens | 6gk5552-0aa00-2ar2 | - | |
siemens | 6gk5552-0aa00-2hr2_firmware | - | |
siemens | 6gk5552-0aa00-2hr2 | - | |
siemens | 6gk5552-0ar00-2hr2_firmware | - | |
siemens | 6gk5552-0ar00-2hr2 | - | |
siemens | 6gk5552-0ar00-2ar2_firmware | - | |
siemens | 6gk5552-0ar00-2ar2 | - | |
siemens | 6ag1206-2bb00-7ac2_firmware | - | |
siemens | 6ag1206-2bb00-7ac2 | - | |
siemens | 6ag1206-2bs00-7ac2_firmware | - | |
siemens | 6ag1206-2bs00-7ac2 | - | |
siemens | 6ag1208-0ba00-7ac2_firmware | - | |
siemens | 6ag1208-0ba00-7ac2 | - | |
siemens | 6ag1216-4bs00-7ac2_firmware | - | |
siemens | 6ag1216-4bs00-7ac2 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk6108-4am00-2ba2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "603C44E4-E8B5-4329-BE56-FEDA247C0A3A", versionEndExcluding: "7.1.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk6108-4am00-2ba2:-:*:*:*:*:*:*:*", matchCriteriaId: "FF17A4F6-6057-4A37-87E7-9BCADD629FF7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk6108-4am00-2da2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "88762AFE-588E-48A0-9BC8-DEA666308144", versionEndExcluding: "7.1.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk6108-4am00-2da2:-:*:*:*:*:*:*:*", matchCriteriaId: "6C6F2102-116D-4488-9FEC-2A97DC6C5964", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5804-0ap00-2aa2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C9BBDFCF-FBF2-4EA8-94B7-43C8CE4F5C36", versionEndExcluding: "7.1.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5804-0ap00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "ABB76E7F-193D-4AFA-A820-A3D93D1AAA32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5812-1aa00-2aa2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A041B489-C632-4D8C-8121-7FDF0142CDFC", versionEndExcluding: "7.1.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5812-1aa00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "374B9F0F-D572-4CB3-8A8C-778AE405E4FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5812-1ba00-2aa2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A9253E06-6C3C-4083-8CEE-5C07AC3F165B", versionEndExcluding: "7.1.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5812-1ba00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "B8A8BB09-B2DC-4F09-A051-FC1ACCA76627", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5816-1aa00-2aa2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "11128350-4562-4375-A831-30F85B21570F", versionEndExcluding: "7.1.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5816-1aa00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "A8A090F9-63B9-4C02-8FF5-91A99231434A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5816-1ba00-2aa2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "42CE3B78-9F63-4416-9987-C4711E1B4491", versionEndExcluding: "7.1.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5816-1ba00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "A1FC0649-5A59-47C3-92F8-22A27EA08495", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5826-2ab00-2ab2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "86B6E2F3-073D-4C5F-B10B-A988695A516E", versionEndExcluding: "7.1.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5826-2ab00-2ab2:-:*:*:*:*:*:*:*", matchCriteriaId: "58C61EFF-461A-4FA0-B851-4B838FC9762F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5874-2aa00-2aa2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2618845A-EAB9-4D44-BB36-BA797585D7AE", versionEndExcluding: "7.1.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5874-2aa00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "BA7267C4-1486-49AF-B5F9-2A40DC285E86", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5874-3aa00-2aa2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A955162E-5C02-4C23-80BF-A94BADBABBEF", versionEndExcluding: "7.1.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5874-3aa00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "B82271D5-62F9-4483-A199-AB306F560E70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5876-3aa02-2ba2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D27C4199-3900-4B06-B07D-3FE0376EDE73", versionEndExcluding: "7.1.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5876-3aa02-2ba2:-:*:*:*:*:*:*:*", matchCriteriaId: "AAFD5B12-FE85-432D-9169-657E8CA7FDB5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5876-3aa02-2ea2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A58A2CB9-08B9-4C54-BFE2-154993F63034", versionEndExcluding: "7.1.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5876-3aa02-2ea2:-:*:*:*:*:*:*:*", matchCriteriaId: "F55773A9-F64F-4365-8249-B1500C809D63", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5876-4aa00-2ba2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AA94340A-E0A5-420A-B267-3E880D52B35B", versionEndExcluding: "7.1.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5876-4aa00-2ba2:-:*:*:*:*:*:*:*", matchCriteriaId: "8040F274-DC42-466F-B13A-4DEA36B351DC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5876-4aa00-2da2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8B62631E-836A-4838-BD6B-0277742A6F50", versionEndExcluding: "7.1.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5876-4aa00-2da2:-:*:*:*:*:*:*:*", matchCriteriaId: "D28BCB70-1DA2-4C1D-8FA5-B7242163C3DC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5853-2ea00-2da1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "31438FB8-F3C1-4CCC-BF0D-7185FB8D44FF", versionEndExcluding: "7.1.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5853-2ea00-2da1:-:*:*:*:*:*:*:*", matchCriteriaId: "39CFB4DB-2628-49C8-BEF7-DB0A27FEA286", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5856-2ea00-3da1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EE2993A4-59A8-4648-BCEF-5D223D0AAE0C", versionEndExcluding: "7.1.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5856-2ea00-3da1:-:*:*:*:*:*:*:*", matchCriteriaId: "AD59C631-F68B-4BB1-ACF1-BDE034214B20", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5856-2ea00-3aa1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "057F13BE-DC91-49A6-BE1D-66C841886A32", versionEndExcluding: "7.1.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5856-2ea00-3aa1:-:*:*:*:*:*:*:*", matchCriteriaId: "D3CE8D68-CCE8-49E8-8229-5D64E5F7C67B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5622-2gs00-2ac2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8B75F839-3501-4684-96B0-1A6A35207C58", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5622-2gs00-2ac2:-:*:*:*:*:*:*:*", matchCriteriaId: "12FE7784-D59A-4E1E-8551-06CCFED772E4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5632-2gs00-2ac2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EFB9FA6F-9AD9-45AF-9022-60FB5DA84628", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5632-2gs00-2ac2:-:*:*:*:*:*:*:*", matchCriteriaId: "C64B24A5-BC52-4812-80BA-3F183641782F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5636-2gs00-2ac2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "29F1AA11-93AB-4B15-99A9-3D0A05CEB7CF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5636-2gs00-2ac2:-:*:*:*:*:*:*:*", matchCriteriaId: "0E5F0040-9B10-4E6B-85AE-E4D04CFC42D0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5642-2gs00-2ac2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AB71FD32-1F80-4A1C-9AEA-C7B951170BDA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5642-2gs00-2ac2:-:*:*:*:*:*:*:*", matchCriteriaId: "900B67C4-DC4D-47FC-9F5A-E53A23398C95", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5646-2gs00-2ac2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "033D083D-7B0A-4212-A730-1F5B1557B5D7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5646-2gs00-2ac2:-:*:*:*:*:*:*:*", matchCriteriaId: "2743D36E-2DEC-4250-B1B2-F1009A47590E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5721-1fc00-0aa0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3F3105C9-E259-439F-8DF5-F55DEA28702A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5721-1fc00-0aa0:-:*:*:*:*:*:*:*", matchCriteriaId: "2CBBC686-0AB9-4FDA-B58C-57C0C84B2F29", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5721-1fc00-0ab0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "49A92E63-B8BB-4941-82A9-A6116A7DECA4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5721-1fc00-0ab0:-:*:*:*:*:*:*:*", matchCriteriaId: "7B76A451-1431-4915-B3A9-ED9EEB3B6660", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5722-1fc00-0aa0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2A3A894D-8EF1-494E-9E9C-E2FFD1F5CE25", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5722-1fc00-0aa0:-:*:*:*:*:*:*:*", matchCriteriaId: "71EC6061-B8A4-43A4-9B16-C9423BFE2201", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5722-1fc00-0ab0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "77FBF657-FB5A-4420-9B73-E82E6339719F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5722-1fc00-0ab0:-:*:*:*:*:*:*:*", matchCriteriaId: "7213F6D7-46F0-43D7-8E34-0684BEB8995F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5722-1fc00-0ac0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9AC970D8-9DD6-4394-832B-FAD24A19AB99", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5722-1fc00-0ac0:-:*:*:*:*:*:*:*", matchCriteriaId: "E81A0E0A-AA5F-42CB-AEDE-B3F2AB3A69AB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5734-1fx00-0aa0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1ED23026-00D3-4017-9543-D1E1B300D674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5734-1fx00-0aa0:-:*:*:*:*:*:*:*", matchCriteriaId: "3A0BFD9C-43CF-4C8E-A407-9EA717A70A51", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5734-1fx00-0aa6_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CDBDA68A-9864-4F07-83A8-ADD4572121CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5734-1fx00-0aa6:-:*:*:*:*:*:*:*", matchCriteriaId: "2E62DB6B-73E8-4C50-8387-308975BAFC4D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5734-1fx00-0ab0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "58D98E45-CFA6-4051-B24B-FF0A1E813BE6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5734-1fx00-0ab0:-:*:*:*:*:*:*:*", matchCriteriaId: "22E33E60-1745-4FBD-917E-9355EC6057A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5734-1fx00-0ab6_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "878A73BC-ADD6-4BFA-8942-A783F76E5597", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5734-1fx00-0ab6:-:*:*:*:*:*:*:*", matchCriteriaId: "B6CEA5DD-D99B-4974-AD8F-76A0AC493BD3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5738-1gy00-0aa0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F8C3E69E-394A-492D-9412-C0213D4D9691", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5738-1gy00-0aa0:-:*:*:*:*:*:*:*", matchCriteriaId: "77EEF188-3CF2-46C6-A3A4-1B72FA7A34F0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5738-1gy00-0ab0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CAB0417C-7D37-44C4-B599-ED717F307C93", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5738-1gy00-0ab0:-:*:*:*:*:*:*:*", matchCriteriaId: "3EA95F61-6540-41E3-933D-C13A77BDDF2A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5748-1gd00-0aa0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "51D4508E-14A6-4653-B420-E9CD34009025", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5748-1gd00-0aa0:-:*:*:*:*:*:*:*", matchCriteriaId: "566E3CE8-DE12-45DC-8AA5-1D1798CBC027", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5748-1gd00-0ab0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "70E2B355-465B-4E8C-AC94-794CA230C678", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5748-1gd00-0ab0:-:*:*:*:*:*:*:*", matchCriteriaId: "16E9B533-65B4-43A1-BA15-761AD974D259", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5748-1fc00-0aa0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F1DF0670-D2B6-45FD-8BCF-BE26AC0C956E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5748-1fc00-0aa0:-:*:*:*:*:*:*:*", matchCriteriaId: "AA45DC8C-0202-4DE9-9D24-32919477CAAE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5748-1fc00-0ab0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8CA53BD4-4A12-4752-9AD6-3E2CD331F3A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5748-1fc00-0ab0:-:*:*:*:*:*:*:*", matchCriteriaId: "0E5A2415-6890-4F19-AEE8-5E83C07211C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5761-1fc00-0aa0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DACCB09A-30D5-4915-9BCE-E67B095EE3CE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5761-1fc00-0aa0:-:*:*:*:*:*:*:*", matchCriteriaId: "6A57BCB9-44BD-48F1-B370-69E03B17D448", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5761-1fc00-0ab0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8ED8187B-FEFC-4F07-A2CE-4BE7BF6C758B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5761-1fc00-0ab0:-:*:*:*:*:*:*:*", matchCriteriaId: "2633009B-16A6-4353-AFA7-017BC4E7FE50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5774-1fy00-0ta0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "26FDD59B-6106-425B-8782-32037FA677D9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5774-1fy00-0ta0:-:*:*:*:*:*:*:*", matchCriteriaId: "83A08C2A-D7A7-4E75-879D-54F74ADD65F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5774-1fy00-0tb0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "80BBB9FD-20FF-44F4-A13A-779D9FE8A9F6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5774-1fy00-0tb0:-:*:*:*:*:*:*:*", matchCriteriaId: "EDC49642-2F25-4A53-AA8E-FCC40B6D2DA4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5774-1fx00-0aa0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "913D1428-B4D9-44F8-8B1F-E048FE46685E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5774-1fx00-0aa0:-:*:*:*:*:*:*:*", matchCriteriaId: "9A57FF30-EECB-4F29-AEA8-7FEFC77FBD30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5774-1fx00-0aa6_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "170D2299-912F-4314-B1C0-2DFE85140FF8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5774-1fx00-0aa6:-:*:*:*:*:*:*:*", matchCriteriaId: "14DB666E-F9F3-48A1-A872-97B1E4C1E957", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5774-1fx00-0ab0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "92885818-1A6A-4E87-B458-41D0D434CD04", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5774-1fx00-0ab0:-:*:*:*:*:*:*:*", matchCriteriaId: "594E7D3E-C4BF-48C4-A843-A69DE4E1B3FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5774-1fx00-0ac0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E6E146B2-D6CF-497E-BCAA-77A8860B3782", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5774-1fx00-0ac0:-:*:*:*:*:*:*:*", matchCriteriaId: "97A39206-6924-44A1-BE2C-6F86DB0408FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5774-1fx00-0ab6_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "27308C16-5F8D-44A0-9232-C28E32842084", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5774-1fx00-0ab6:-:*:*:*:*:*:*:*", matchCriteriaId: "4D4E8FA2-CBF4-4D1D-9DC8-D5EAC6C8BAA0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5778-1gy00-0aa0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "16B71EFB-2059-4754-B8AF-05E21B514F61", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5778-1gy00-0aa0:-:*:*:*:*:*:*:*", matchCriteriaId: "44936685-10C4-4BE8-8762-DBCC6085565D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5778-1gy00-0ab0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "34541FC4-B04A-4DB1-BEC1-23B55667D081", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5778-1gy00-0ab0:-:*:*:*:*:*:*:*", matchCriteriaId: "BB2EC405-1620-4E09-8070-A34DE52B11FB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5778-1gy00-0ta0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5E620175-6A2C-4108-B852-A47ECF006E10", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5778-1gy00-0ta0:-:*:*:*:*:*:*:*", matchCriteriaId: "D98244D4-185E-4499-B0E2-D1C6D08A000A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5778-1gy00-0tb0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4F91BD99-D166-4A69-8778-901421E242DE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5778-1gy00-0tb0:-:*:*:*:*:*:*:*", matchCriteriaId: "D9A24F4D-9BCF-4FB7-A1D3-716C9D243687", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5786-1fc00-0aa0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E5BC04A3-6ACB-4929-A62D-EFB17B0D4FDE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5786-1fc00-0aa0:-:*:*:*:*:*:*:*", matchCriteriaId: "D7B673F8-390F-45D6-9444-BDBD499E1AA8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5786-1fc00-0ab0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E4CF0533-D4AD-49D8-8615-B603BE7AD315", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5786-1fc00-0ab0:-:*:*:*:*:*:*:*", matchCriteriaId: "47DEF370-176F-4FF7-BC87-389D6B0E2570", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5786-2fc00-0aa0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B0793A98-9CB6-4024-A3EB-341DE0AFB8D1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5786-2fc00-0aa0:-:*:*:*:*:*:*:*", matchCriteriaId: "30E8F4B1-A110-477A-BBA1-8C73F68AE8D6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5786-2fc00-0ab0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A432D8B3-8DC0-4B66-9DBD-10E0014D6D55", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5786-2fc00-0ab0:-:*:*:*:*:*:*:*", matchCriteriaId: "0404F6BF-1670-4C4C-9DC0-1263E466E92D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5786-2fc00-0ac0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5AEBD0B6-E220-4A8D-A116-BB0250F6DDF7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5786-2fc00-0ac0:-:*:*:*:*:*:*:*", matchCriteriaId: "CF471757-6CC2-4394-8341-C4A9E67A94F0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5786-2fe00-0aa0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B28E8FD8-A1B6-470E-9B0C-6F3AC8B78B8D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5786-2fe00-0aa0:-:*:*:*:*:*:*:*", matchCriteriaId: "6A99362B-D9B8-49F5-8999-B1E500B0C434", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5786-2fe00-0ab0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E3FEC3B9-642F-4C95-AA10-127EB502E409", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5786-2fe00-0ab0:-:*:*:*:*:*:*:*", matchCriteriaId: "8403E352-F182-470B-AF18-DC1F828C9C74", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5786-2hc00-0aa0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "376D556E-1416-4189-B8CF-70589B1CE7EB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5786-2hc00-0aa0:-:*:*:*:*:*:*:*", matchCriteriaId: "9FB1F4CA-3BF9-4437-88E3-59D4CD25A536", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5786-2hc00-0ab0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5B22A30E-99C7-41CC-A5B3-6B21DF18A6D1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5786-2hc00-0ab0:-:*:*:*:*:*:*:*", matchCriteriaId: "B6B97926-C92A-4B44-9C86-24CFCBD7238B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5788-1gd00-0aa0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4EABE1D5-63C5-45FC-8DD4-731FC2C81003", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5788-1gd00-0aa0:-:*:*:*:*:*:*:*", matchCriteriaId: "30AE269E-3E30-4745-8114-6217EB77230B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5788-1gd00-0ab0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "68359952-3ECE-40B5-A0BB-ADD10CF8EC86", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5788-1gd00-0ab0:-:*:*:*:*:*:*:*", matchCriteriaId: "1E85381A-06B4-4E65-B568-6A5086316318", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5788-1fc00-0aa0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6BBC0079-1F2A-4BF5-ADC9-4B69BF712D9E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5788-1fc00-0aa0:-:*:*:*:*:*:*:*", matchCriteriaId: "075069DF-F692-46C0-94A6-94BA85379A9B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5788-1fc00-0ab0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "91CEFC03-4EAB-465A-B4D5-44C760C1FD15", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5788-1fc00-0ab0:-:*:*:*:*:*:*:*", matchCriteriaId: "5E695BF7-A6B3-4718-9B97-1C938FB33CDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5788-2gd00-0aa0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0DC0FCB7-D0EB-49C5-BD04-567EDB6204A1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5788-2gd00-0aa0:-:*:*:*:*:*:*:*", matchCriteriaId: "876875F6-BF8D-4C48-989A-F9817BA56C6B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5788-2gd00-0ab0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4E8A5202-017D-4FE4-ADA2-712FFDEDC1F0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5788-2gd00-0ab0:-:*:*:*:*:*:*:*", matchCriteriaId: "792B6AFB-A207-4219-8DE2-40C5752EEB43", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5788-2gd00-0ta0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8C177DC7-C59C-4A0C-A48F-1C0E3F3FDFB7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5788-2gd00-0ta0:-:*:*:*:*:*:*:*", matchCriteriaId: "7836D79C-5DA2-448E-9ECA-45C966D31F96", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5788-2gd00-0tb0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "310074BA-987B-4B23-A309-45DF68AF7413", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5788-2gd00-0tb0:-:*:*:*:*:*:*:*", matchCriteriaId: "BC47DE4D-B092-4928-8ACF-A3F286BA1F33", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5788-2gd00-0tc0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AEFF292F-2A48-46AA-A1AD-34EC8B759B21", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5788-2gd00-0tc0:-:*:*:*:*:*:*:*", matchCriteriaId: "7ED18A60-E3BF-4333-B444-B63D28B97CDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5788-2fc00-0aa0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EBD754BA-6B94-43A2-AD75-70B71726C728", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5788-2fc00-0aa0:-:*:*:*:*:*:*:*", matchCriteriaId: "5BDDAF6D-2BEB-4F3F-BE02-9AC073D661E3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5788-2fc00-0ab0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "304C1CF0-79DE-41D0-892D-A463935956B5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5788-2fc00-0ab0:-:*:*:*:*:*:*:*", matchCriteriaId: "D030F5B0-3FE6-4CC4-BFA8-68BB1FECF6AA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5788-2fc00-0ac0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "57338884-3951-4A45-9934-00F4F62A1436", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5788-2fc00-0ac0:-:*:*:*:*:*:*:*", matchCriteriaId: "9100E788-2D16-4582-ACDC-543DE5B9C371", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5748-1gy01-0aa0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C6308743-B641-4C74-99CA-61315B10FF08", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5748-1gy01-0aa0:-:*:*:*:*:*:*:*", matchCriteriaId: "F952AFF0-5484-4672-926E-8854DBD7F59F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5748-1gy01-0ta0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5340A7BD-B05C-40AA-B00C-9B06B92CE147", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5748-1gy01-0ta0:-:*:*:*:*:*:*:*", matchCriteriaId: "87303A0A-DF98-4CC4-A429-047530CEA782", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5788-1gy01-0aa0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "816314A0-B497-402D-8184-46FE1585521A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5788-1gy01-0aa0:-:*:*:*:*:*:*:*", matchCriteriaId: "DDB33B5A-8B2B-4877-82A4-2890530917A5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5788-2gy01-0ta0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7C3E0F1C-A9C3-4D2C-AA66-A0D04FC907DE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5788-2gy01-0ta0:-:*:*:*:*:*:*:*", matchCriteriaId: "3B39BCB3-6E7C-474F-88AA-D5538C4AF24A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5788-2gy01-0aa0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EF61CB48-3A28-4F4B-A7F8-AB4DF6E87F9E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5788-2gy01-0aa0:-:*:*:*:*:*:*:*", matchCriteriaId: "B96CAF4B-BB4A-4C86-BDD5-E292EF7BD19A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5788-2hy01-0aa0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8182228D-EB82-4187-8EEE-1FA22D64CD5E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5788-2hy01-0aa0:-:*:*:*:*:*:*:*", matchCriteriaId: "5B02C936-51BB-43C8-8F47-10A0FD8CB02B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5763-1al00-7da0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F8339ACF-2D87-44A1-B84F-F3E48C82F8CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5763-1al00-7da0:-:*:*:*:*:*:*:*", matchCriteriaId: "72E99748-08CA-4515-B64B-A7696E7C9824", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5766-1ge00-7da0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D1879CAE-355C-45BC-9C8B-3C83E1AFB32D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5766-1ge00-7da0:-:*:*:*:*:*:*:*", matchCriteriaId: "A9A76803-CFF6-4A82-A5EC-10A3946A91D3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5766-1ge00-7db0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "80806049-9CB8-4DB7-A333-C5A83A436A53", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5766-1ge00-7db0:-:*:*:*:*:*:*:*", matchCriteriaId: "9AAE92C7-5197-48AA-9334-62D3E313F8AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5766-1je00-7da0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1079E863-6BFB-42C0-9F68-B2CBD875F96B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5766-1je00-7da0:-:*:*:*:*:*:*:*", matchCriteriaId: "6D4F2AD0-57B4-4947-8887-9F26C47909CB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5766-1ge00-7ta0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "52F5D75A-9CC0-4CF3-B4D3-1042D51F7F20", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5766-1ge00-7ta0:-:*:*:*:*:*:*:*", matchCriteriaId: "4450B377-C7C1-4225-9304-C4AC79AB7E71", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5766-1ge00-7tb0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A3DCF9D5-6EFD-4577-94C3-09864AF650D3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5766-1ge00-7tb0:-:*:*:*:*:*:*:*", matchCriteriaId: "802CE18D-AF89-46F3-82EF-83F9590A49DA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5766-1je00-7ta0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "00C9F0BB-D859-4921-A692-B182BB62A01D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5766-1je00-7ta0:-:*:*:*:*:*:*:*", matchCriteriaId: "BFC81171-3522-4982-BFA8-940E161AF217", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5763-1al00-3aa0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "02C27DCE-1C13-4593-8D3D-C99DF260DCD9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5763-1al00-3aa0:-:*:*:*:*:*:*:*", matchCriteriaId: "E50D46EE-B0D0-4385-BF21-804CB1B9556C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5763-1al00-3da0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C1363219-D914-415E-B2C9-010C4F22D72F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5763-1al00-3da0:-:*:*:*:*:*:*:*", matchCriteriaId: "781FDDBB-8DCA-4B65-8906-E78FBE3CFDA1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5766-1ge00-3da0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AA89F0EB-F515-4E89-9351-459FE62E8641", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5766-1ge00-3da0:-:*:*:*:*:*:*:*", matchCriteriaId: "2C591807-63DE-40DC-8E0A-083080FDC6FC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5766-1ge00-3db0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4307B508-3EBA-48C2-9211-A53ED8A89444", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5766-1ge00-3db0:-:*:*:*:*:*:*:*", matchCriteriaId: "142E900D-63F3-4CC7-9E27-026B4C38A803", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5766-1je00-3da0_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "704A70FB-2F98-4606-9D06-6222316B95C6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5766-1je00-3da0:-:*:*:*:*:*:*:*", matchCriteriaId: "420D0BD5-A206-4A3F-8978-6D0959CE4F14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5205-3bb00-2ab2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C6EF801B-FCF7-4FC4-86C2-93C3C0C3ADCE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5205-3bb00-2ab2:-:*:*:*:*:*:*:*", matchCriteriaId: "BDEEF735-2636-4AD5-9449-447B9E228A24", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5205-3bb00-2tb2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AA9B52D9-3655-468A-A809-3B7AB6976973", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5205-3bb00-2tb2:-:*:*:*:*:*:*:*", matchCriteriaId: "5F0BB9D0-8E93-415E-B8DD-DFFEA8EA2CF3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5205-3bd00-2tb2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C6B08556-A162-4FA2-9032-14F30D188F6A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5205-3bd00-2tb2:-:*:*:*:*:*:*:*", matchCriteriaId: "35017AF3-EE65-46A5-ABD0-D2BC13B1AD3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5205-3bd00-2ab2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AE700924-3817-41AB-BB3A-184922264D15", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5205-3bd00-2ab2:-:*:*:*:*:*:*:*", matchCriteriaId: "36D74890-F750-4A32-A73E-6E9225EC4C85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5205-3bf00-2tb2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B10344CB-EB27-4FE7-876F-7DCB19FE53C0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5205-3bf00-2tb2:-:*:*:*:*:*:*:*", matchCriteriaId: "88698599-ECBF-44D9-8944-BDCBAED51B65", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5205-3bf00-2ab2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "730DD40A-05D8-4BED-A2F0-E4EAC0ADFDAB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5205-3bf00-2ab2:-:*:*:*:*:*:*:*", matchCriteriaId: "5198B71D-1222-4056-8381-9C59E16E386A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5208-0ba00-2tb2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "679D46EC-2223-4A00-8340-17470BE18D1B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5208-0ba00-2tb2:-:*:*:*:*:*:*:*", matchCriteriaId: "FB050EAC-BEA2-4167-8FC0-6952CA2A2FCF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5208-0ba00-2ab2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D8694FBF-D8C2-4A61-8CAC-94652086A644", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5208-0ba00-2ab2:-:*:*:*:*:*:*:*", matchCriteriaId: "566A2361-9323-497F-AFB9-FCC171E0640F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5213-3bd00-2tb2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "77FC9FF9-EA75-46B5-9333-541D87260335", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5213-3bd00-2tb2:-:*:*:*:*:*:*:*", matchCriteriaId: "A3C2B16E-CF58-40AB-9F2A-9633304361DA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5213-3bd00-2ab2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9CCF361D-8C9E-4051-82C0-52E2D5A1A60D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5213-3bd00-2ab2:-:*:*:*:*:*:*:*", matchCriteriaId: "88B309AA-BD24-4413-B810-AD6B11E82198", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5213-3bb00-2tb2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4C98003C-4D5E-4B69-8E02-25C4A41BFFA2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5213-3bb00-2tb2:-:*:*:*:*:*:*:*", matchCriteriaId: "0B026C10-2071-4323-B5D3-F6855599A726", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5213-3bb00-2ab2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0C4FBC6D-1A85-4565-850C-3E6166D68D0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5213-3bb00-2ab2:-:*:*:*:*:*:*:*", matchCriteriaId: "479E9EF0-9283-42E0-89FC-A5C11E6BFAA6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5213-3bf00-2tb2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DE8622F6-05E2-4AF8-9525-62CA34ABB15D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5213-3bf00-2tb2:-:*:*:*:*:*:*:*", matchCriteriaId: "FAFFC79E-B741-4E8F-9D2D-4D09190F0CED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5213-3bf00-2ab2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E58FA79B-A167-4ADF-BDDA-02EE72932A3A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5213-3bf00-2ab2:-:*:*:*:*:*:*:*", matchCriteriaId: "7A40D181-7374-482F-AD39-56EB0F4780CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5216-0ba00-2tb2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3395F5DF-1773-4102-B32B-10DEBA1279B1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5216-0ba00-2tb2:-:*:*:*:*:*:*:*", matchCriteriaId: "0C241D35-A5FF-4484-B4B1-C52C8BADB09E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5216-0ba00-2ab2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D6DDE4B7-AD36-49BA-9D00-CC4EE2A9F3C5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5216-0ba00-2ab2:-:*:*:*:*:*:*:*", matchCriteriaId: "74611624-D165-4C11-8898-D523E3CBACD5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5206-2bd00-2ac2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0ACD2F94-E541-4308-BBF8-5F2DC07BC56D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5206-2bd00-2ac2:-:*:*:*:*:*:*:*", matchCriteriaId: "205429A2-813F-43F9-AD29-CD331DA4740B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5206-2bb00-2ac2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "85818DDB-8922-46B4-9777-85DE1CF54821", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5206-2bb00-2ac2:-:*:*:*:*:*:*:*", matchCriteriaId: "548A9568-CE04-4CDC-9CE5-2051B23ECE29", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5206-2rs00-2ac2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "61BC435D-E613-4FA5-802A-53962E30C1E5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5206-2rs00-2ac2:-:*:*:*:*:*:*:*", matchCriteriaId: "ACE51E5E-DBA9-4A33-B18C-B3531B473030", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5206-2rs00-5ac2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D9ABBD6E-A7D0-466F-8AB6-FA9AD44CE147", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5206-2rs00-5ac2:-:*:*:*:*:*:*:*", matchCriteriaId: "66EE6855-297D-433F-9BAE-9623C73665A2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5206-2rs00-5fc2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2013722E-E8FA-4EAD-9F05-50FFFBB6D8D0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5206-2rs00-5fc2:-:*:*:*:*:*:*:*", matchCriteriaId: "0E8B8958-DD46-47FA-A00A-4ED05A874FAF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5206-2bs00-2ac2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "38E8C21F-45BF-4538-9937-FC3A1DB7D253", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5206-2bs00-2ac2:-:*:*:*:*:*:*:*", matchCriteriaId: "4E57B681-5E0D-4891-9563-A51A8449E871", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5206-2bs00-2fc2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "915B80DC-7014-4804-BA82-7A8F4001C2DA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5206-2bs00-2fc2:-:*:*:*:*:*:*:*", matchCriteriaId: "2AFD8C8A-6702-42BA-8DA4-B2DC1FD08C32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5206-2gs00-2ac2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0C6FC3C5-21D8-4AC5-8716-A6F1B9438728", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5206-2gs00-2ac2:-:*:*:*:*:*:*:*", matchCriteriaId: "B5B5AA34-9392-4C90-89DE-C7A3D12230A2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5206-2gs00-2tc2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EDD4A312-B793-4F81-889C-038BDB6C1C72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5206-2gs00-2tc2:-:*:*:*:*:*:*:*", matchCriteriaId: "13C278FB-B26F-4DB0-96F3-5E22D9CB63A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5206-2gs00-2fc2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F8CF09AA-40D9-4D45-93E9-416C952AF704", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5206-2gs00-2fc2:-:*:*:*:*:*:*:*", matchCriteriaId: "8D4FE9F1-CA78-4E2D-BAAB-27F370C74058", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5208-0ba00-2ac2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EFA797AE-3C58-48B4-9C63-99D156E3BFEA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5208-0ba00-2ac2:-:*:*:*:*:*:*:*", matchCriteriaId: "18B74B85-3F14-4E2B-8579-8304B0CDEBF6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5208-0ba00-2fc2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4FFC9E3C-02E4-450C-92AB-2D53DDD3767E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5208-0ba00-2fc2:-:*:*:*:*:*:*:*", matchCriteriaId: "81A3F713-4B72-40AE-9FB1-88FBA52574F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5208-0ga00-2ac2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E383CCE2-495C-4E43-B03F-36A0FAD3F9F0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5208-0ga00-2ac2:-:*:*:*:*:*:*:*", matchCriteriaId: "E2C557EB-5EE6-4FB6-AA77-E2519C122792", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5208-0ga00-2tc2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D0F8A1BD-77E0-4893-BF5B-C09409202E43", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5208-0ga00-2tc2:-:*:*:*:*:*:*:*", matchCriteriaId: "84745DC6-8D3E-48BD-B61F-93B6D43919AB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5208-0ga00-2fc2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DF9667A2-DFFD-450C-88A9-B0222AF6AEEB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5208-0ga00-2fc2:-:*:*:*:*:*:*:*", matchCriteriaId: "D6997812-562B-421F-AECF-6E1151E9EC50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5208-0ra00-2ac2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AA99B15C-C088-4A7B-909E-6A4A03A3BCE1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5208-0ra00-2ac2:-:*:*:*:*:*:*:*", matchCriteriaId: "D3EA732B-3BDA-41AE-A791-700A28FD632B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5208-0ra00-5ac2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "625752A1-AEA6-42F0-A726-45B07980F3E2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5208-0ra00-5ac2:-:*:*:*:*:*:*:*", matchCriteriaId: "A44C230B-2682-4DCF-808A-3D1EB647BA13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5216-0ba00-2ac2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CE041C38-4530-40ED-A6EB-1B30DE72DCB4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5216-0ba00-2ac2:-:*:*:*:*:*:*:*", matchCriteriaId: "943E741B-800D-4919-8865-D07B14DC1DA8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5216-3rs00-2ac2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7355CF28-97D6-4630-B454-AA76681D15CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5216-3rs00-2ac2:-:*:*:*:*:*:*:*", matchCriteriaId: "279C651A-F2BE-4B5B-898D-5BAD8D16C040", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5216-3rs00-5ac2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "597F167A-EA8C-4FE2-9A53-772A81A4D66C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5216-3rs00-5ac2:-:*:*:*:*:*:*:*", matchCriteriaId: "573F9273-D8DE-40CD-9EAF-F7F118E57CF9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5216-4bs00-2ac2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "32146B70-B851-4EC6-ADBC-4CE5A8B1296B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5216-4bs00-2ac2:-:*:*:*:*:*:*:*", matchCriteriaId: "C004D760-9DE2-44EA-9B55-935A8A9BEF2E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5216-4gs00-2ac2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9FE1122F-CEEC-496E-ABF2-9B5715071F80", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5216-4gs00-2ac2:-:*:*:*:*:*:*:*", matchCriteriaId: "B36634FC-391C-4E54-8C21-B2A839D3590A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5216-4gs00-2tc2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AD3E82BC-C87F-4FA8-AC82-16102372D7D2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5216-4gs00-2tc2:-:*:*:*:*:*:*:*", matchCriteriaId: "50EFE6F9-9DFC-4107-BFB6-2B4887D2F872", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5216-4gs00-2fc2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E8EEDEC3-0DF1-412B-A6DE-44B79E822BBB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5216-4gs00-2fc2:-:*:*:*:*:*:*:*", matchCriteriaId: "C403B02F-D93F-4CB1-A076-093BD62F95D9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5216-0ba00-2fc2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4A7B656F-DB9F-46FD-B7E0-DD9EF3473965", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5216-0ba00-2fc2:-:*:*:*:*:*:*:*", matchCriteriaId: "789F2F49-28A6-45E3-9CC1-9C5BF5522BE7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5224-0ba00-2ac2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3D7778E2-2279-4C21-918A-F9DDF7FF9944", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5224-0ba00-2ac2:-:*:*:*:*:*:*:*", matchCriteriaId: "17EFD31B-A636-4592-99AD-6FD99A3E8985", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5224-4gs00-2ac2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30B14200-2AE3-403D-A70C-0EB7262B6D8D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5224-4gs00-2ac2:-:*:*:*:*:*:*:*", matchCriteriaId: "207E4118-760C-42DA-BE1F-48EAD3DC821B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5224-4gs00-2tc2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D8A8DFFC-EF47-4E47-B7A3-53106936D8F5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5224-4gs00-2tc2:-:*:*:*:*:*:*:*", matchCriteriaId: "8704FBF9-8444-4D2F-B43C-2B71EC261F73", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5224-4gs00-2fc2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6836C8C8-1761-4A07-9D01-5153B008E49C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5224-4gs00-2fc2:-:*:*:*:*:*:*:*", matchCriteriaId: "230B0871-97F0-48D2-88AD-8E1C6A72559F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5204-0ba00-2gf2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5C36366D-A94F-4776-892F-B76DD926E2E4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5204-0ba00-2gf2:-:*:*:*:*:*:*:*", matchCriteriaId: "4337C0EB-8312-4B0B-8FB5-CCA7ADA7C2ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5204-0ba00-2yf2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C45959B4-A29E-4606-B147-F55BE45AC284", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5204-0ba00-2yf2:-:*:*:*:*:*:*:*", matchCriteriaId: "F0D2DA9A-09E5-4BFE-83B9-F73317243D61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5204-2aa00-2gf2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8848DC79-7936-43C0-87E9-9899C0CC17C8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5204-2aa00-2gf2:-:*:*:*:*:*:*:*", matchCriteriaId: "0E560752-C8C9-4972-94D5-F9F59C6D1E28", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5204-2aa00-2yf2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3AA01BB3-0C48-410D-95AA-8BA78B942850", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5204-2aa00-2yf2:-:*:*:*:*:*:*:*", matchCriteriaId: "1E5D6A0F-CEE4-4EEB-B847-FCE06EAC6F35", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5408-4gp00-2am2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7768DC4B-9E3B-471B-B049-83F42812716A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5408-4gp00-2am2:-:*:*:*:*:*:*:*", matchCriteriaId: "EBFE671F-A61E-4A59-B42B-47086D514129", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5408-4gq00-2am2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "151060E4-89CE-4C71-84EF-716D6EBB199B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5408-4gq00-2am2:-:*:*:*:*:*:*:*", matchCriteriaId: "CD74B667-FCF6-4748-B5BB-AAF194B8C13F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5408-8gs00-2am2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "61737E76-C589-48B1-82A7-CB477DB0FCFF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5408-8gs00-2am2:-:*:*:*:*:*:*:*", matchCriteriaId: "05B63541-6C5C-4B0E-A3C2-A19F2682BECF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5408-8gr00-2am2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3B4EFD15-EAA1-4213-A9BD-2E8D75B291F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5408-8gr00-2am2:-:*:*:*:*:*:*:*", matchCriteriaId: "AA3322CD-3E93-4AD3-B939-2A12FE9BDC47", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5416-4gs00-2am2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7E17C2F5-1113-46D5-9007-CA848AB45981", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5416-4gs00-2am2:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D49280-E4DF-4B57-A79F-76ED4C048796", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5416-4gr00-2am2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "78FFDA88-562D-4AAB-9761-8AF0B1E1D098", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5416-4gr00-2am2:-:*:*:*:*:*:*:*", matchCriteriaId: "70AA31BC-4CDA-4BA7-90EB-F18A0D804BDD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5208-0ha00-2as6_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "50A3EC81-C94C-40F1-A05D-F9AA0F36CAB8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5208-0ha00-2as6:-:*:*:*:*:*:*:*", matchCriteriaId: "DD3F4AE6-8CF8-4BA3-B253-73A21D3ED3A5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5208-0ha00-2ts6_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D9B89ECE-1CB6-4DE7-964B-4FDB7BBB7BD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5208-0ha00-2ts6:-:*:*:*:*:*:*:*", matchCriteriaId: "2E9B7D1D-6E96-40F1-A5CA-4F6623FDE510", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5208-0ha00-2es6_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "908E385E-8C4A-41B5-BDB8-50395E4EA79F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5208-0ha00-2es6:-:*:*:*:*:*:*:*", matchCriteriaId: "493DDECD-04A3-4E92-B191-547F39F759DF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5208-0ua00-5es6_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "854AE90C-2E46-4F91-855D-4D4D2A040AEE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5208-0ua00-5es6:-:*:*:*:*:*:*:*", matchCriteriaId: "D8306306-DCD5-4902-9D1D-467CDE01AB27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5216-0ha00-2as6_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CC47BF31-FF6A-4E00-822A-D08F1CD74974", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5216-0ha00-2as6:-:*:*:*:*:*:*:*", matchCriteriaId: "85B78727-A8F7-4A0E-8E8C-76312986C81F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5216-0ha00-2ts6_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "60465445-AFE0-40AB-AF7F-53F284986015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5216-0ha00-2ts6:-:*:*:*:*:*:*:*", matchCriteriaId: "340C3DED-7414-4CD5-8FA7-733861052CC1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5216-0ha00-2es6_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "907BFF68-BB1B-4FE3-BFD9-C945E55D6F84", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5216-0ha00-2es6:-:*:*:*:*:*:*:*", matchCriteriaId: "5BAA23ED-3873-4E71-A353-75A73343E313", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5216-0ua00-5es6_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "337623E5-B3CB-40EB-9B7F-E21ACBB5F806", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5216-0ua00-5es6:-:*:*:*:*:*:*:*", matchCriteriaId: "0B755E8A-4410-4521-9E35-E5A8B9562A6B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5324-0ba00-3ar3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FAC9CB46-0FF0-4A65-9DE4-BA8696AD7DE7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5324-0ba00-3ar3:-:*:*:*:*:*:*:*", matchCriteriaId: "1BC451F6-0609-43D3-85CF-6F9311E60231", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5324-0ba00-2ar3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A0E875AA-1AF7-4E6E-8C7E-5B2C25759660", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5324-0ba00-2ar3:-:*:*:*:*:*:*:*", matchCriteriaId: "8BB9DA87-8145-4FA1-8E8B-27541F3F23E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5326-2qs00-3ar3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ED372818-2FD2-4689-A224-7015FF99F384", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5326-2qs00-3ar3:-:*:*:*:*:*:*:*", matchCriteriaId: "D491DAE4-E7CD-4284-B718-E2B53901A67A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5326-2qs00-3rr3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "91F64F30-FF96-4E1F-AE66-86843BD44AED", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5326-2qs00-3rr3:-:*:*:*:*:*:*:*", matchCriteriaId: "77C1EBCB-A71B-4A66-91F1-B303012FE3F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5328-4fs00-3ar3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "39849158-4AB6-4D90-8A47-3C88092F6794", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5328-4fs00-3ar3:-:*:*:*:*:*:*:*", matchCriteriaId: "889E98EE-1620-4810-8B69-0C6B56803BE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5328-4fs00-3rr3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "34784E23-84C6-4C73-863C-1465C8371DE0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5328-4fs00-3rr3:-:*:*:*:*:*:*:*", matchCriteriaId: "03C7EA9B-F3D4-4037-AEBC-2E376CBEBC61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5328-4fs00-2ar3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B170818E-D561-4FD2-9366-7E6B7D68CEFF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5328-4fs00-2ar3:-:*:*:*:*:*:*:*", matchCriteriaId: "8B80D331-DF29-4383-802C-99A81AD5EC88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5328-4fs00-2rr3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5C5CE66C-69FC-487D-BE40-F94612238F23", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5328-4fs00-2rr3:-:*:*:*:*:*:*:*", matchCriteriaId: "1920A677-F791-4B23-BABB-E9D3F7C303EB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5328-4ss00-3ar3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EE249A58-9321-4581-8009-374AA7F420E4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5328-4ss00-3ar3:-:*:*:*:*:*:*:*", matchCriteriaId: "D1048547-CC40-45D4-B25F-6776B654E63F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5328-4ss00-2ar3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5FD87097-6CF9-4804-BEC1-2C49B2D2D27C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5328-4ss00-2ar3:-:*:*:*:*:*:*:*", matchCriteriaId: "83FBFAD6-F2B5-4CB4-94F9-28E303E38E05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5524-8gs00-3ar2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0091661F-78B2-460C-B42C-F4430D8D4390", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5524-8gs00-3ar2:-:*:*:*:*:*:*:*", matchCriteriaId: "85AF8043-C111-4241-94BE-84F0A18676FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5524-8gr00-3ar2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F0A87640-9A3F-4419-9EFD-B2F97FD2B946", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5524-8gr00-3ar2:-:*:*:*:*:*:*:*", matchCriteriaId: "B5B47A44-B26F-4D75-A230-847C2D23305A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5524-8gs00-4ar2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0D6BE228-3117-4519-BDDE-7C3FFBDE5B16", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5524-8gs00-4ar2:-:*:*:*:*:*:*:*", matchCriteriaId: "6777A8F6-174C-4EDE-8E46-02B9E6BD18CD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5524-8gr00-4ar2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "286507A2-CCAC-4F2D-8104-7C0C6B4E46D6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5524-8gr00-4ar2:-:*:*:*:*:*:*:*", matchCriteriaId: "027E6066-50EC-4319-83D8-718F8CB6F27C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5524-8gs00-2ar2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D3BC07B0-ED54-497E-BE3D-2512464F4CCF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5524-8gs00-2ar2:-:*:*:*:*:*:*:*", matchCriteriaId: "2FCDE5C3-E8DC-4809-9DAB-72620D7CA6FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5524-8gr00-2ar2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AA824690-B5D5-4129-B178-E7802B39A9EB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5524-8gr00-2ar2:-:*:*:*:*:*:*:*", matchCriteriaId: "979A57BE-578A-420B-8AF0-DCA79CFDCB0A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5526-8gs00-3ar2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4BF042A5-04F3-4B80-A739-41758002466D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5526-8gs00-3ar2:-:*:*:*:*:*:*:*", matchCriteriaId: "194CCB33-DA05-4F82-B4CF-13B33F4FC030", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5526-8gr00-3ar2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B035DC26-6425-4464-8CA6-FDEFF3BA756A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5526-8gr00-3ar2:-:*:*:*:*:*:*:*", matchCriteriaId: "230637D3-86EE-4169-83DC-71E393929C8C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5526-8gs00-4ar2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "855BE375-5D74-4480-AB82-5387D0B206CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5526-8gs00-4ar2:-:*:*:*:*:*:*:*", matchCriteriaId: "FF1E160F-4398-4564-848A-664CA8F45729", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5526-8gr00-4ar2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CC114024-2393-40D9-92D7-BE72D206FC5D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5526-8gr00-4ar2:-:*:*:*:*:*:*:*", matchCriteriaId: "E1E77713-AF23-4DB6-A3A4-75ACF85C4491", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5526-8gs00-2ar2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5A1DFDF4-7F2B-4D7F-B7B1-C51F498FEB2C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5526-8gs00-2ar2:-:*:*:*:*:*:*:*", matchCriteriaId: "5BF26C98-C940-4E69-A67D-DE3E5721A11B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5526-8gr00-2ar2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C6334117-ADD5-45CD-A7A8-BD26843D789C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5526-8gr00-2ar2:-:*:*:*:*:*:*:*", matchCriteriaId: "2F525522-F872-4FF9-8A0B-85F7E682DF5F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5528-0aa00-2ar2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4E0A5FBF-2158-44F3-8B06-11A32024BFC5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5528-0aa00-2ar2:-:*:*:*:*:*:*:*", matchCriteriaId: "C29E47AE-7A3B-474A-A7FE-8DBF5967B133", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5528-0aa00-2hr2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5D20DC79-1EE0-4F43-AE93-786E94E955E3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5528-0aa00-2hr2:-:*:*:*:*:*:*:*", matchCriteriaId: "095473FC-C92E-4F7D-A707-E9AE3E541C54", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5528-0ar00-2hr2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5E80DB5A-DD7C-4CA0-9C2A-0AE16554F5CB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5528-0ar00-2hr2:-:*:*:*:*:*:*:*", matchCriteriaId: "D9D50926-FD44-49E4-8A51-C3FF79E753BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5528-0ar00-2ar2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F3994EBB-F60D-4BB4-9B6B-A56AD6426786", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5528-0ar00-2ar2:-:*:*:*:*:*:*:*", matchCriteriaId: "E578F3B6-3DD4-460C-8A72-613F3E327FDA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5552-0aa00-2ar2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "46DCC8A1-AC4E-4B9E-9EA0-2D169F51041B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5552-0aa00-2ar2:-:*:*:*:*:*:*:*", matchCriteriaId: "E9DD4603-C979-49AB-BF1D-6C5AC71DC687", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5552-0aa00-2hr2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D964CCCE-7516-4614-9A27-7BBC2C42BCC9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5552-0aa00-2hr2:-:*:*:*:*:*:*:*", matchCriteriaId: "2A40CD10-1E99-4705-8F2B-B57CF1E5A4A1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5552-0ar00-2hr2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8BFC0F76-BAE9-4622-A453-A37891E57B8B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5552-0ar00-2hr2:-:*:*:*:*:*:*:*", matchCriteriaId: "AF792C86-45A6-4251-A8BD-2C6DE77565CB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5552-0ar00-2ar2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E1458DB0-7533-4FA5-9DB3-CC855C801DEB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5552-0ar00-2ar2:-:*:*:*:*:*:*:*", matchCriteriaId: "B45E5BB5-A74B-47D2-B763-85C3104593F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6ag1206-2bb00-7ac2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F971981D-FD39-4204-AD19-3CB48399F54D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6ag1206-2bb00-7ac2:-:*:*:*:*:*:*:*", matchCriteriaId: "5CDB924A-7300-47BD-82AE-9F7CBBCDE7D9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6ag1206-2bs00-7ac2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "149759E4-C5A6-4A16-BB0E-B6CA9E50D1B3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6ag1206-2bs00-7ac2:-:*:*:*:*:*:*:*", matchCriteriaId: "182E593F-4C6B-42DD-B167-8CAD8309BCD6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6ag1208-0ba00-7ac2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "05AC6078-677C-4C63-A5F4-E7DF674033FC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6ag1208-0ba00-7ac2:-:*:*:*:*:*:*:*", matchCriteriaId: "BE2B8190-E78D-4ACE-AA74-E8A07A5AA647", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6ag1216-4bs00-7ac2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "45C6E33A-0B30-404C-BAC4-9B55FDE110AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6ag1216-4bs00-7ac2:-:*:*:*:*:*:*:*", matchCriteriaId: "268FAFC6-3D95-44DE-A21D-82084A33B122", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Affected devices do not properly authorize the change password function of the web interface.\r\nThis could allow low privileged users to escalate their privileges.", }, { lang: "es", value: "Los dispositivos afectados no autorizan apropiadamente la función change password de la interfaz web. Esto podría permitir a usuarios poco privilegiado escalar sus privilegios", }, ], id: "CVE-2022-31765", lastModified: "2024-11-21T07:05:15.753", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "productcert@siemens.com", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Secondary", }, ], }, published: "2022-10-11T11:15:09.737", references: [ { source: "productcert@siemens.com", tags: [ "Mitigation", "Patch", "Vendor Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-552702.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mitigation", "Patch", "Vendor Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-552702.pdf", }, ], sourceIdentifier: "productcert@siemens.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-862", }, ], source: "productcert@siemens.com", type: "Primary", }, ], }
Vulnerability from fkie_nvd
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | https://cert-portal.siemens.com/productcert/html/ssa-068047.html | ||
productcert@siemens.com | https://cert-portal.siemens.com/productcert/html/ssa-602936.html | ||
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-068047.pdf | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/html/ssa-068047.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/html/ssa-602936.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-068047.pdf | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
siemens | 6gk6108-4am00-2ba2_firmware | * | |
siemens | 6gk6108-4am00-2ba2 | - | |
siemens | 6gk6108-4am00-2da2_firmware | * | |
siemens | 6gk6108-4am00-2da2 | - | |
siemens | 6gk5804-0ap00-2aa2_firmware | * | |
siemens | 6gk5804-0ap00-2aa2 | - | |
siemens | 6gk5812-1aa00-2aa2_firmware | * | |
siemens | 6gk5812-1aa00-2aa2 | - | |
siemens | 6gk5812-1ba00-2aa2_firmware | * | |
siemens | 6gk5812-1ba00-2aa2 | - | |
siemens | 6gk5816-1aa00-2aa2_firmware | * | |
siemens | 6gk5816-1aa00-2aa2 | - | |
siemens | 6gk5816-1ba00-2aa2_firmware | * | |
siemens | 6gk5816-1ba00-2aa2 | - | |
siemens | 6gk5826-2ab00-2ab2_firmware | * | |
siemens | 6gk5826-2ab00-2ab2 | - | |
siemens | 6gk5874-2aa00-2aa2_firmware | * | |
siemens | 6gk5874-2aa00-2aa2 | - | |
siemens | 6gk5874-3aa00-2aa2_firmware | * | |
siemens | 6gk5874-3aa00-2aa2 | - | |
siemens | 6gk5876-3aa02-2ba2_firmware | * | |
siemens | 6gk5876-3aa02-2ba2 | - | |
siemens | 6gk5876-3aa02-2ea2_firmware | * | |
siemens | 6gk5876-3aa02-2ea2 | - | |
siemens | 6gk5876-4aa10-2ba2_firmware | * | |
siemens | 6gk5876-4aa10-2ba2 | - | |
siemens | 6gk5876-4aa00-2ba2_firmware | * | |
siemens | 6gk5876-4aa00-2ba2 | - | |
siemens | 6gk5876-4aa00-2da2_firmware | * | |
siemens | 6gk5876-4aa00-2da2 | - | |
siemens | 6gk5853-2ea00-2da1_firmware | * | |
siemens | 6gk5853-2ea00-2da1 | - | |
siemens | 6gk5856-2ea00-3da1_firmware | * | |
siemens | 6gk5856-2ea00-3da1 | - | |
siemens | 6gk5856-2ea00-3aa1_firmware | * | |
siemens | 6gk5856-2ea00-3aa1 | - | |
siemens | 6gk5615-0aa00-2aa2_firmware | * | |
siemens | 6gk5615-0aa00-2aa2 | - | |
siemens | 6gk5615-0aa01-2aa2_firmware | * | |
siemens | 6gk5615-0aa01-2aa2 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk6108-4am00-2ba2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "537B7923-B10A-4293-8015-647E7C0209F4", versionEndExcluding: "7.2.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk6108-4am00-2ba2:-:*:*:*:*:*:*:*", matchCriteriaId: "FF17A4F6-6057-4A37-87E7-9BCADD629FF7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk6108-4am00-2da2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "284B21F4-822B-4EC7-BE03-6D177AAFAA53", versionEndExcluding: "7.2.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk6108-4am00-2da2:-:*:*:*:*:*:*:*", matchCriteriaId: "6C6F2102-116D-4488-9FEC-2A97DC6C5964", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5804-0ap00-2aa2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E8452262-C341-4239-974E-9A6B10864592", versionEndExcluding: "7.2.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5804-0ap00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "ABB76E7F-193D-4AFA-A820-A3D93D1AAA32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5812-1aa00-2aa2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7006300C-93DA-4DC0-92D2-D3738F916E09", versionEndExcluding: "7.2.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5812-1aa00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "374B9F0F-D572-4CB3-8A8C-778AE405E4FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5812-1ba00-2aa2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9046E35B-61E7-43C5-9BCB-AE253AA5B219", versionEndExcluding: "7.2.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5812-1ba00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "B8A8BB09-B2DC-4F09-A051-FC1ACCA76627", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5816-1aa00-2aa2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AC97692B-79A4-42EA-B982-C601565AD21A", versionEndExcluding: "7.2.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5816-1aa00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "A8A090F9-63B9-4C02-8FF5-91A99231434A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5816-1ba00-2aa2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CB9F1347-3286-446A-ACBE-CA23295D1994", versionEndExcluding: "7.2.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5816-1ba00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "A1FC0649-5A59-47C3-92F8-22A27EA08495", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5826-2ab00-2ab2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "055CD171-8A39-4B76-A609-9EA6B3269A3A", versionEndExcluding: "7.2.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5826-2ab00-2ab2:-:*:*:*:*:*:*:*", matchCriteriaId: "58C61EFF-461A-4FA0-B851-4B838FC9762F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5874-2aa00-2aa2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E10AD333-1568-45DC-A09C-48D235AED557", versionEndExcluding: "7.2.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5874-2aa00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "BA7267C4-1486-49AF-B5F9-2A40DC285E86", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5874-3aa00-2aa2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4065F6CE-953B-4785-ADFE-2F63F56C48DF", versionEndExcluding: "7.2.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5874-3aa00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "B82271D5-62F9-4483-A199-AB306F560E70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5876-3aa02-2ba2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A7CB8ED9-6EDC-4B4D-8354-FBC5588A43C0", versionEndExcluding: "7.2.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5876-3aa02-2ba2:-:*:*:*:*:*:*:*", matchCriteriaId: "AAFD5B12-FE85-432D-9169-657E8CA7FDB5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5876-3aa02-2ea2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7F794E16-FB65-4F05-AC22-56728BA074B2", versionEndExcluding: "7.2.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5876-3aa02-2ea2:-:*:*:*:*:*:*:*", matchCriteriaId: "F55773A9-F64F-4365-8249-B1500C809D63", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5876-4aa10-2ba2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "01E5DEA4-38E5-4AD8-A963-596449F052E3", versionEndExcluding: "7.2.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5876-4aa10-2ba2:-:*:*:*:*:*:*:*", matchCriteriaId: "2BE36DEA-AEF7-4F39-B3C0-52ECBA170333", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5876-4aa00-2ba2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "87989AC8-FD86-4BE2-9235-39738790CE62", versionEndExcluding: "7.2.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5876-4aa00-2ba2:-:*:*:*:*:*:*:*", matchCriteriaId: "8040F274-DC42-466F-B13A-4DEA36B351DC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5876-4aa00-2da2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C09CC3C4-9D27-43FA-8D26-35C2EBD6B6F2", versionEndExcluding: "7.2.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5876-4aa00-2da2:-:*:*:*:*:*:*:*", matchCriteriaId: "D28BCB70-1DA2-4C1D-8FA5-B7242163C3DC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5853-2ea00-2da1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5D58761E-1E0A-49FF-A32D-8775CDAA3BA8", versionEndExcluding: "7.2.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5853-2ea00-2da1:-:*:*:*:*:*:*:*", matchCriteriaId: "39CFB4DB-2628-49C8-BEF7-DB0A27FEA286", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5856-2ea00-3da1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "89266C0A-4556-4C13-AD7A-6D382288E725", versionEndExcluding: "7.2.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5856-2ea00-3da1:-:*:*:*:*:*:*:*", matchCriteriaId: "AD59C631-F68B-4BB1-ACF1-BDE034214B20", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5856-2ea00-3aa1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2D76F9BF-D064-4DB3-BFF7-1E2B84FE4D8D", versionEndExcluding: "7.2.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5856-2ea00-3aa1:-:*:*:*:*:*:*:*", matchCriteriaId: "D3CE8D68-CCE8-49E8-8229-5D64E5F7C67B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5615-0aa00-2aa2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "68E5790D-4C12-4338-9B1B-711042AF8FBA", versionEndExcluding: "7.2.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5615-0aa00-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "CF189379-EA02-4FCE-8E85-51C7CFD1674C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6gk5615-0aa01-2aa2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "87F42B95-6DB4-4448-AFD6-630BE2F7294A", versionEndExcluding: "7.2.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6gk5615-0aa01-2aa2:-:*:*:*:*:*:*:*", matchCriteriaId: "B83CF684-8E84-4ECD-9090-8B8997008108", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V7.2.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V7.2.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V7.2.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V7.2.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V7.2.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V7.2.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V7.2.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V7.2.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V7.2.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V7.2.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V7.2.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V7.2.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V7.2.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V7.2.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V7.2.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V7.2.2). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the parsing of the IPSEC configuration. This could allow malicious local administrators to issue commands on system level after a new connection is established.", }, { lang: "es", value: "Se ha identificado una vulnerabilidad en: \nRUGGEDCOM RM1224 LTE(4G) EU (Todas las versiones < V7.2.2), \nRUGGEDCOM RM1224 LTE(4G) NAM (Todas las versiones < V7.2.2), \nSCALANCE M804PB (Todas las versiones < V7.2.2), \nSCALANCE M812-1 ADSL-Router (Anexo A) (Todas las versiones < V7.2.2),\nSCALANCE M812-1 ADSL-Router (Anexo B) (Todas las versiones < V7.2.2),\nSCALANCE M816-1 ADSL-Router (Anexo A) (Todas las versiones < V7.2.2),\nSCALANCE M816-1 ADSL-Router (Anexo B) (Todas las versiones < V7.2.2),\nSCALANCE M826-2 SHDSL-Router (Todas las versiones < V7.2.2), \nSCALANCE M874-2 ( Todas las versiones < V7.2.2), \nSCALANCE M874-3 (Todas las versiones < V7.2.2), \nSCALANCE M876-3 (EVDO) (Todas las versiones < V7.2.2), \nSCALANCE M876-3 (ROK) (Todas las versiones < V7. 2.2), \nSCALANCE M876-4 (Todas las versiones < V7.2.2), \nSCALANCE M876-4 (EU) (Todas las versiones < V7.2.2), \nSCALANCE M876-4 (NAM) (Todas las versiones < V7.2.2), \nSCALANCE MUM853 -1 (UE) (Todas las versiones < V7.2.2), \nSCALANCE MUM856-1 (UE) (Todas las versiones < V7.2.2), \nSCALANCE MUM856-1 (RoW) (Todas las versiones < V7.2.2), \nSCALANCE S615 (Todas versiones < V7.2.2), \nSCALANCE S615 EEC (Todas las versiones < V7.2.2). \nExiste una vulnerabilidad de neutralización inadecuada de elementos especiales utilizados en un comando del sistema operativo con privilegios de root en el análisis de la configuración IPSEC. Esto podría permitir que administradores locales malintencionados emitan comandos a nivel del sistema después de que se establezca una nueva conexión.", }, ], id: "CVE-2023-49692", lastModified: "2024-11-21T08:33:42.300", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "productcert@siemens.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-12-12T12:15:16.203", references: [ { source: "productcert@siemens.com", url: "https://cert-portal.siemens.com/productcert/html/ssa-068047.html", }, { source: "productcert@siemens.com", url: "https://cert-portal.siemens.com/productcert/html/ssa-602936.html", }, { source: "productcert@siemens.com", tags: [ "Vendor Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-068047.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://cert-portal.siemens.com/productcert/html/ssa-068047.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://cert-portal.siemens.com/productcert/html/ssa-602936.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-068047.pdf", }, ], sourceIdentifier: "productcert@siemens.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-78", }, ], source: "productcert@siemens.com", type: "Primary", }, ], }