cve-2024-38278
Vulnerability from cvelistv5
Published
2024-07-09 12:05
Modified
2024-08-02 04:04
Severity ?
EPSS score ?
Summary
A vulnerability has been identified in RUGGEDCOM RMC8388 V5.X (All versions < V5.9.0), RUGGEDCOM RMC8388NC V5.X (All versions < V5.9.0), RUGGEDCOM RS416NCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416PNCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416v2 V5.X (All versions < V5.9.0), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.9.0), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.9.0), RUGGEDCOM RS900GNC(32M) V5.X (All versions < V5.9.0), RUGGEDCOM RS900NC(32M) V5.X (All versions < V5.9.0), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.9.0), RUGGEDCOM RSG2100NC(32M) V5.X (All versions < V5.9.0), RUGGEDCOM RSG2288 V5.X (All versions < V5.9.0), RUGGEDCOM RSG2288NC V5.X (All versions < V5.9.0), RUGGEDCOM RSG2300 V5.X (All versions < V5.9.0), RUGGEDCOM RSG2300NC V5.X (All versions < V5.9.0), RUGGEDCOM RSG2300P V5.X (All versions < V5.9.0), RUGGEDCOM RSG2300PNC V5.X (All versions < V5.9.0), RUGGEDCOM RSG2488 V5.X (All versions < V5.9.0), RUGGEDCOM RSG2488NC V5.X (All versions < V5.9.0), RUGGEDCOM RSG907R (All versions < V5.9.0), RUGGEDCOM RSG908C (All versions < V5.9.0), RUGGEDCOM RSG909R (All versions < V5.9.0), RUGGEDCOM RSG910C (All versions < V5.9.0), RUGGEDCOM RSG920P V5.X (All versions < V5.9.0), RUGGEDCOM RSG920PNC V5.X (All versions < V5.9.0), RUGGEDCOM RSL910 (All versions < V5.9.0), RUGGEDCOM RSL910NC (All versions < V5.9.0), RUGGEDCOM RST2228 (All versions < V5.9.0), RUGGEDCOM RST2228P (All versions < V5.9.0), RUGGEDCOM RST916C (All versions < V5.9.0), RUGGEDCOM RST916P (All versions < V5.9.0). The affected products with IP forwarding enabled wrongly make available certain remote services in non-managed VLANs, even if these services are not intentionally activated. An attacker could leverage this vulnerability to create a remote shell to the affected system.
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rmc8388:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rmc8388", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rmc8388nc:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rmc8388nc", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rs416ncv2:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rs416ncv2", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rs416pncv2:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rs416pncv2", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rs416pv2:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rs416pv2", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rs416v2:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rs416v2", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rs900:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rs900", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rs900g:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rs900g", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rs900gnc:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rs900gnc", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rs900nc:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rs900nc", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rsg2100:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rsg2100", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rsg2100nc:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rsg2100nc", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rsg2288:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rsg2288", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rsg2288nc:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rsg2288nc", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rsg2300:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rsg2300", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rsg2300nc:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rsg2300nc", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rsg2300p:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rsg2300p", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rsg2300pnc:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rsg2300pnc", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rsg2488:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rsg2488", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rsg2488nc:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rsg2488nc", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rsg907r:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rsg907r", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rsg908c:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rsg908c", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rsg909r:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rsg909r", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rsg910c:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rsg910c", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rsg920p:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rsg920p", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rsg920pnc:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rsg920pnc", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rsl910:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rsl910", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rsl910nc:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rsl910nc", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rst2228:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rst2228", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rst2228p:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rst2228p", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rst916c:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rst916c", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:siemens:ruggedcom_ros_rst916p:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_ros_rst916p", "vendor": "siemens", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-38278", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-24T17:16:47.980613Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-24T17:45:46.872Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:04:25.242Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-170375.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM RMC8388 V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RMC8388NC V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS416NCv2 V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS416PNCv2 V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS416Pv2 V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS416v2 V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900 (32M) V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900G (32M) V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900GNC(32M) V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900NC(32M) V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2100 (32M) V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2100NC(32M) V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2288 V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2288NC V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2300 V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2300NC V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2300P V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2300PNC V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2488 V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2488NC V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG907R", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG908C", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG909R", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG910C", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG920P V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG920PNC V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSL910", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSL910NC", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RST2228", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RST2228P", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RST916C", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RST916P", "vendor": "Siemens", "versions": [ { "lessThan": "V5.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in RUGGEDCOM RMC8388 V5.X (All versions \u003c V5.9.0), RUGGEDCOM RMC8388NC V5.X (All versions \u003c V5.9.0), RUGGEDCOM RS416NCv2 V5.X (All versions \u003c V5.9.0), RUGGEDCOM RS416PNCv2 V5.X (All versions \u003c V5.9.0), RUGGEDCOM RS416Pv2 V5.X (All versions \u003c V5.9.0), RUGGEDCOM RS416v2 V5.X (All versions \u003c V5.9.0), RUGGEDCOM RS900 (32M) V5.X (All versions \u003c V5.9.0), RUGGEDCOM RS900G (32M) V5.X (All versions \u003c V5.9.0), RUGGEDCOM RS900GNC(32M) V5.X (All versions \u003c V5.9.0), RUGGEDCOM RS900NC(32M) V5.X (All versions \u003c V5.9.0), RUGGEDCOM RSG2100 (32M) V5.X (All versions \u003c V5.9.0), RUGGEDCOM RSG2100NC(32M) V5.X (All versions \u003c V5.9.0), RUGGEDCOM RSG2288 V5.X (All versions \u003c V5.9.0), RUGGEDCOM RSG2288NC V5.X (All versions \u003c V5.9.0), RUGGEDCOM RSG2300 V5.X (All versions \u003c V5.9.0), RUGGEDCOM RSG2300NC V5.X (All versions \u003c V5.9.0), RUGGEDCOM RSG2300P V5.X (All versions \u003c V5.9.0), RUGGEDCOM RSG2300PNC V5.X (All versions \u003c V5.9.0), RUGGEDCOM RSG2488 V5.X (All versions \u003c V5.9.0), RUGGEDCOM RSG2488NC V5.X (All versions \u003c V5.9.0), RUGGEDCOM RSG907R (All versions \u003c V5.9.0), RUGGEDCOM RSG908C (All versions \u003c V5.9.0), RUGGEDCOM RSG909R (All versions \u003c V5.9.0), RUGGEDCOM RSG910C (All versions \u003c V5.9.0), RUGGEDCOM RSG920P V5.X (All versions \u003c V5.9.0), RUGGEDCOM RSG920PNC V5.X (All versions \u003c V5.9.0), RUGGEDCOM RSL910 (All versions \u003c V5.9.0), RUGGEDCOM RSL910NC (All versions \u003c V5.9.0), RUGGEDCOM RST2228 (All versions \u003c V5.9.0), RUGGEDCOM RST2228P (All versions \u003c V5.9.0), RUGGEDCOM RST916C (All versions \u003c V5.9.0), RUGGEDCOM RST916P (All versions \u003c V5.9.0). The affected products with IP forwarding enabled wrongly make available certain remote services in non-managed VLANs, even if these services are not intentionally activated. An attacker could leverage this vulnerability to create a remote shell to the affected system." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" } }, { "cvssV4_0": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-266", "description": "CWE-266: Incorrect Privilege Assignment", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-09T12:05:07.958Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-170375.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2024-38278", "datePublished": "2024-07-09T12:05:07.958Z", "dateReserved": "2024-06-12T14:37:01.983Z", "dateUpdated": "2024-08-02T04:04:25.242Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-38278\",\"sourceIdentifier\":\"productcert@siemens.com\",\"published\":\"2024-07-09T12:15:15.497\",\"lastModified\":\"2024-11-21T09:25:15.127\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability has been identified in RUGGEDCOM RMC8388 V5.X (All versions \u003c V5.9.0), RUGGEDCOM RMC8388NC V5.X (All versions \u003c V5.9.0), RUGGEDCOM RS416NCv2 V5.X (All versions \u003c V5.9.0), RUGGEDCOM RS416PNCv2 V5.X (All versions \u003c V5.9.0), RUGGEDCOM RS416Pv2 V5.X (All versions \u003c V5.9.0), RUGGEDCOM RS416v2 V5.X (All versions \u003c V5.9.0), RUGGEDCOM RS900 (32M) V5.X (All versions \u003c V5.9.0), RUGGEDCOM RS900G (32M) V5.X (All versions \u003c V5.9.0), RUGGEDCOM RS900GNC(32M) V5.X (All versions \u003c V5.9.0), RUGGEDCOM RS900NC(32M) V5.X (All versions \u003c V5.9.0), RUGGEDCOM RSG2100 (32M) V5.X (All versions \u003c V5.9.0), RUGGEDCOM RSG2100NC(32M) V5.X (All versions \u003c V5.9.0), RUGGEDCOM RSG2288 V5.X (All versions \u003c V5.9.0), RUGGEDCOM RSG2288NC V5.X (All versions \u003c V5.9.0), RUGGEDCOM RSG2300 V5.X (All versions \u003c V5.9.0), RUGGEDCOM RSG2300NC V5.X (All versions \u003c V5.9.0), RUGGEDCOM RSG2300P V5.X (All versions \u003c V5.9.0), RUGGEDCOM RSG2300PNC V5.X (All versions \u003c V5.9.0), RUGGEDCOM RSG2488 V5.X (All versions \u003c V5.9.0), RUGGEDCOM RSG2488NC V5.X (All versions \u003c V5.9.0), RUGGEDCOM RSG907R (All versions \u003c V5.9.0), RUGGEDCOM RSG908C (All versions \u003c V5.9.0), RUGGEDCOM RSG909R (All versions \u003c V5.9.0), RUGGEDCOM RSG910C (All versions \u003c V5.9.0), RUGGEDCOM RSG920P V5.X (All versions \u003c V5.9.0), RUGGEDCOM RSG920PNC V5.X (All versions \u003c V5.9.0), RUGGEDCOM RSL910 (All versions \u003c V5.9.0), RUGGEDCOM RSL910NC (All versions \u003c V5.9.0), RUGGEDCOM RST2228 (All versions \u003c V5.9.0), RUGGEDCOM RST2228P (All versions \u003c V5.9.0), RUGGEDCOM RST916C (All versions \u003c V5.9.0), RUGGEDCOM RST916P (All versions \u003c V5.9.0). The affected products with IP forwarding enabled wrongly make available certain remote services in non-managed VLANs, even if these services are not intentionally activated. An attacker could leverage this vulnerability to create a remote shell to the affected system.\"},{\"lang\":\"es\",\"value\":\"Se ha identificado una vulnerabilidad en RUGGEDCOM RMC8388 V5.X (Todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RMC8388NC V5.X (Todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RS416NCv2 V5.X (Todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RS416PNCv2 V5.X (Todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RS416Pv2 V5.X (Todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RS416v2 V5.X (Todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RS900 (32M) V5.X (Todas versiones \u0026lt; V5.9.0), RUGGEDCOM RS900G (32M) V5.X (Todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RS900GNC(32M) V5.X (Todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RS900NC(32M) V5.X ( Todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RSG2100 (32M) V5.X (Todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RSG2100NC(32M) V5.X (Todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RSG2288 V5.X (Todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RSG2288NC V5.X (Todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RSG2300 V5.X (Todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RSG2300NC V5.X (Todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RSG2300P V5.X (Todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RSG2300PNC V5.X (Todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RSG2488 V5.X (Todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RSG2488NC V5.X (Todas las versiones \u0026lt; V5 .9.0), RUGGEDCOM RSG907R (todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RSG908C (todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RSG909R (todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RSG910C (todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RSG920P V5.X (Todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RSG920PNC V5.X (Todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RSL910 (Todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RSL910NC (Todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RST2228 (Todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RST2228P (Todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RST916C (Todas las versiones \u0026lt; V5.9.0), RUGGEDCOM RST916P (Todas las versiones \u0026lt; V5.9.0). Los productos afectados con reenv\u00edo de IP habilitado ponen a disposici\u00f3n por error determinados servicios remotos en VLAN no gestionadas, incluso si estos servicios no se activan intencionadamente. Un atacante podr\u00eda aprovechar esta vulnerabilidad para crear un shell remoto para el sistema afectado.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"vulnerableSystemConfidentiality\":\"HIGH\",\"vulnerableSystemIntegrity\":\"HIGH\",\"vulnerableSystemAvailability\":\"HIGH\",\"subsequentSystemConfidentiality\":\"NONE\",\"subsequentSystemIntegrity\":\"NONE\",\"subsequentSystemAvailability\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirements\":\"NOT_DEFINED\",\"integrityRequirements\":\"NOT_DEFINED\",\"availabilityRequirements\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnerableSystemConfidentiality\":\"NOT_DEFINED\",\"modifiedVulnerableSystemIntegrity\":\"NOT_DEFINED\",\"modifiedVulnerableSystemAvailability\":\"NOT_DEFINED\",\"modifiedSubsequentSystemConfidentiality\":\"NOT_DEFINED\",\"modifiedSubsequentSystemIntegrity\":\"NOT_DEFINED\",\"modifiedSubsequentSystemAvailability\":\"NOT_DEFINED\",\"safety\":\"NOT_DEFINED\",\"automatable\":\"NOT_DEFINED\",\"recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.6,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.7,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-266\"}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/html/ssa-170375.html\",\"source\":\"productcert@siemens.com\"},{\"url\":\"https://cert-portal.siemens.com/productcert/html/ssa-170375.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.