CNVD-2024-47914
Vulnerability from cnvd - Published: 2024-12-12
VLAI Severity ?
Title
Siemens RUGGEDCOM ROX II跨站请求伪造漏洞
Description
RUGGEDCOM ROX II是基于ROX的VPN端点和防火墙设备用于连接在恶劣环境中运行的设备,如电力变电站和交通控制柜。
Siemens RUGGEDCOM ROX II存在跨站请求伪造漏洞,攻击者可利用该漏洞通过欺骗经过身份验证的合法用户访问恶意链接来读取或修改设备配置。
Severity
高
Patch Name
Siemens RUGGEDCOM ROX II跨站请求伪造漏洞的补丁
Patch Description
RUGGEDCOM ROX II是基于ROX的VPN端点和防火墙设备用于连接在恶劣环境中运行的设备,如电力变电站和交通控制柜。
Siemens RUGGEDCOM ROX II存在跨站请求伪造漏洞,攻击者可利用该漏洞通过欺骗经过身份验证的合法用户访问恶意链接来读取或修改设备配置。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
用户可参考如下供应商提供的安全公告获得补丁信息: https://cert-portal.siemens.com/productcert/html/ssa-384652.html
Reference
https://cert-portal.siemens.com/productcert/html/ssa-384652.html
Impacted products
| Name | ['Siemens RUGGEDCOM ROX MX5000 < V2.16.0', 'Siemens RUGGEDCOM ROX MX5000RE < V2.16.0', 'Siemens RUGGEDCOM ROX RX1400 < V2.16.0', 'Siemens RUGGEDCOM ROX RX1500 < V2.16.0', 'Siemens RUGGEDCOM ROX RX1501 < V2.16.0', 'Siemens RUGGEDCOM ROX RX1510 < V2.16.0', 'Siemens RUGGEDCOM ROX RX1511 < V2.16.0', 'Siemens RUGGEDCOM ROX RX1512 < V2.16.0', 'Siemens RUGGEDCOM ROX RX1524 < V2.16.0', 'Siemens RUGGEDCOM ROX RX1536 < V2.16.0', 'Siemens RUGGEDCOM ROX RX5000 < V2.16.0'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2020-28398"
}
},
"description": "RUGGEDCOM ROX II\u662f\u57fa\u4e8eROX\u7684VPN\u7aef\u70b9\u548c\u9632\u706b\u5899\u8bbe\u5907\u7528\u4e8e\u8fde\u63a5\u5728\u6076\u52a3\u73af\u5883\u4e2d\u8fd0\u884c\u7684\u8bbe\u5907\uff0c\u5982\u7535\u529b\u53d8\u7535\u7ad9\u548c\u4ea4\u901a\u63a7\u5236\u67dc\u3002\n\nSiemens RUGGEDCOM ROX II\u5b58\u5728\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7\u6b3a\u9a97\u7ecf\u8fc7\u8eab\u4efd\u9a8c\u8bc1\u7684\u5408\u6cd5\u7528\u6237\u8bbf\u95ee\u6076\u610f\u94fe\u63a5\u6765\u8bfb\u53d6\u6216\u4fee\u6539\u8bbe\u5907\u914d\u7f6e\u3002",
"formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u4f9b\u5e94\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttps://cert-portal.siemens.com/productcert/html/ssa-384652.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2024-47914",
"openTime": "2024-12-12",
"patchDescription": "RUGGEDCOM ROX II\u662f\u57fa\u4e8eROX\u7684VPN\u7aef\u70b9\u548c\u9632\u706b\u5899\u8bbe\u5907\u7528\u4e8e\u8fde\u63a5\u5728\u6076\u52a3\u73af\u5883\u4e2d\u8fd0\u884c\u7684\u8bbe\u5907\uff0c\u5982\u7535\u529b\u53d8\u7535\u7ad9\u548c\u4ea4\u901a\u63a7\u5236\u67dc\u3002\r\n\r\nSiemens RUGGEDCOM ROX II\u5b58\u5728\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7\u6b3a\u9a97\u7ecf\u8fc7\u8eab\u4efd\u9a8c\u8bc1\u7684\u5408\u6cd5\u7528\u6237\u8bbf\u95ee\u6076\u610f\u94fe\u63a5\u6765\u8bfb\u53d6\u6216\u4fee\u6539\u8bbe\u5907\u914d\u7f6e\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Siemens RUGGEDCOM ROX II\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Siemens RUGGEDCOM ROX MX5000 \u003c V2.16.0",
"Siemens RUGGEDCOM ROX MX5000RE \u003c V2.16.0",
"Siemens RUGGEDCOM ROX RX1400 \u003c V2.16.0",
"Siemens RUGGEDCOM ROX RX1500 \u003c V2.16.0",
"Siemens RUGGEDCOM ROX RX1501 \u003c V2.16.0",
"Siemens RUGGEDCOM ROX RX1510 \u003c V2.16.0",
"Siemens RUGGEDCOM ROX RX1511 \u003c V2.16.0",
"Siemens RUGGEDCOM ROX RX1512 \u003c V2.16.0",
"Siemens RUGGEDCOM ROX RX1524 \u003c V2.16.0",
"Siemens RUGGEDCOM ROX RX1536 \u003c V2.16.0",
"Siemens RUGGEDCOM ROX RX5000 \u003c V2.16.0"
]
},
"referenceLink": "https://cert-portal.siemens.com/productcert/html/ssa-384652.html",
"serverity": "\u9ad8",
"submitTime": "2024-12-11",
"title": "Siemens RUGGEDCOM ROX II\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…