CNVD-2021-77598
Vulnerability from cnvd - Published: 2021-10-15
VLAI Severity ?
Title
Siemens RUGGEDCOM ROX设备拒绝服务漏洞
Description
ROX-based VPN端点和防火墙设备用于连接在恶劣环境中运行的设备,如电力设施变电站和交通控制柜。
Siemens RUGGEDCOM ROX设备存在拒绝服务漏洞,该漏洞源于受影响的设备在不检查文件上是否有足够空间可用的情况下进行数据写入导致转储崩溃。攻击者可利用此漏洞造成永久拒绝服务。
Severity
高
Patch Name
Siemens RUGGEDCOM ROX设备拒绝服务漏洞的补丁
Patch Description
ROX-based VPN端点和防火墙设备用于连接在恶劣环境中运行的设备,如电力设施变电站和交通控制柜。
Siemens RUGGEDCOM ROX设备存在拒绝服务漏洞,该漏洞源于受影响的设备在不检查文件上是否有足够空间可用的情况下进行数据写入导致转储崩溃。攻击者可利用此漏洞造成永久拒绝服务。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布了漏洞修复程序,请及时关注更新: https://cert-portal.siemens.com/productcert/pdf/ssa-173565.pdf
Reference
https://cert-portal.siemens.com/productcert/pdf/ssa-173565.pdf
Impacted products
| Name | ['Siemens RUGGEDCOM ROX RX5000 < V2.14.1', 'Siemens RUGGEDCOM ROX MX5000 <V2.14.1', 'Siemens RUGGEDCOM ROX RX1400 <V2.14.1', 'Siemens RUGGEDCOM ROX RX1500 <V2.14.1', 'Siemens RUGGEDCOM ROX RX1501 <V2.14.1', 'Siemens RUGGEDCOM ROX RX1510 <V2.14.1', 'Siemens RUGGEDCOM ROX RX1511 <V2.14.1', 'Siemens RUGGEDCOM ROX RX1512 <V2.14.1', 'Siemens RUGGEDCOM ROX RX1524 <V2.14.1', 'Siemens RUGGEDCOM ROX RX1536 <V2.14.1'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2021-41546",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2021-41546"
}
},
"description": "ROX-based VPN\u7aef\u70b9\u548c\u9632\u706b\u5899\u8bbe\u5907\u7528\u4e8e\u8fde\u63a5\u5728\u6076\u52a3\u73af\u5883\u4e2d\u8fd0\u884c\u7684\u8bbe\u5907\uff0c\u5982\u7535\u529b\u8bbe\u65bd\u53d8\u7535\u7ad9\u548c\u4ea4\u901a\u63a7\u5236\u67dc\u3002\n\nSiemens RUGGEDCOM ROX\u8bbe\u5907\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u53d7\u5f71\u54cd\u7684\u8bbe\u5907\u5728\u4e0d\u68c0\u67e5\u6587\u4ef6\u4e0a\u662f\u5426\u6709\u8db3\u591f\u7a7a\u95f4\u53ef\u7528\u7684\u60c5\u51b5\u4e0b\u8fdb\u884c\u6570\u636e\u5199\u5165\u5bfc\u81f4\u8f6c\u50a8\u5d29\u6e83\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u6b64\u6f0f\u6d1e\u9020\u6210\u6c38\u4e45\u62d2\u7edd\u670d\u52a1\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://cert-portal.siemens.com/productcert/pdf/ssa-173565.pdf",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2021-77598",
"openTime": "2021-10-15",
"patchDescription": "ROX-based VPN\u7aef\u70b9\u548c\u9632\u706b\u5899\u8bbe\u5907\u7528\u4e8e\u8fde\u63a5\u5728\u6076\u52a3\u73af\u5883\u4e2d\u8fd0\u884c\u7684\u8bbe\u5907\uff0c\u5982\u7535\u529b\u8bbe\u65bd\u53d8\u7535\u7ad9\u548c\u4ea4\u901a\u63a7\u5236\u67dc\u3002\r\n\r\nSiemens RUGGEDCOM ROX\u8bbe\u5907\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u53d7\u5f71\u54cd\u7684\u8bbe\u5907\u5728\u4e0d\u68c0\u67e5\u6587\u4ef6\u4e0a\u662f\u5426\u6709\u8db3\u591f\u7a7a\u95f4\u53ef\u7528\u7684\u60c5\u51b5\u4e0b\u8fdb\u884c\u6570\u636e\u5199\u5165\u5bfc\u81f4\u8f6c\u50a8\u5d29\u6e83\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u6b64\u6f0f\u6d1e\u9020\u6210\u6c38\u4e45\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Siemens RUGGEDCOM ROX\u8bbe\u5907\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Siemens RUGGEDCOM ROX RX5000 \u003c V2.14.1",
"Siemens RUGGEDCOM ROX MX5000 \u003cV2.14.1",
"Siemens RUGGEDCOM ROX RX1400 \u003cV2.14.1",
"Siemens RUGGEDCOM ROX RX1500 \u003cV2.14.1",
"Siemens RUGGEDCOM ROX RX1501 \u003cV2.14.1",
"Siemens RUGGEDCOM ROX RX1510 \u003cV2.14.1",
"Siemens RUGGEDCOM ROX RX1511 \u003cV2.14.1",
"Siemens RUGGEDCOM ROX RX1512 \u003cV2.14.1",
"Siemens RUGGEDCOM ROX RX1524 \u003cV2.14.1",
"Siemens RUGGEDCOM ROX RX1536 \u003cV2.14.1"
]
},
"referenceLink": "https://cert-portal.siemens.com/productcert/pdf/ssa-173565.pdf",
"serverity": "\u9ad8",
"submitTime": "2021-10-15",
"title": "Siemens RUGGEDCOM ROX\u8bbe\u5907\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…