Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2017-12736

Summary
Assigner-siemens
Assigner Org ID-cec7a2ec-15b4-4faf-bd53-b40f371f3a77
Published At-26 Dec, 2017 | 04:00
Updated At-12 Aug, 2025 | 11:10
Rejected At-
Credits

After initial configuration, the Ruggedcom Discovery Protocol (RCDP) is still able to write to the device under certain conditions. This could allow an attacker located in the adjacent network of the targeted device to perform unauthorized administrative actions.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:siemens
Assigner Org ID:cec7a2ec-15b4-4faf-bd53-b40f371f3a77
Published At:26 Dec, 2017 | 04:00
Updated At:12 Aug, 2025 | 11:10
Rejected At:
▼CVE Numbering Authority (CNA)

After initial configuration, the Ruggedcom Discovery Protocol (RCDP) is still able to write to the device under certain conditions. This could allow an attacker located in the adjacent network of the targeted device to perform unauthorized administrative actions.

Affected Products
Vendor
Siemens AGSiemens
Product
RUGGEDCOM i800
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM i800NC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM i801
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM i801NC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM i802
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM i802NC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM i803
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM i803NC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM M2100
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM M2100NC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM M2200
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM M2200NC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM M969
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM M969NC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RMC30
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RMC30NC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RMC8388 V4.X
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RMC8388 V5.X
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RMC8388NC V4.X
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RMC8388NC V5.X
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RP110
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RP110NC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS1600
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS1600F
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS1600FNC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS1600NC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS1600T
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS1600TNC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS400
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS400NC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS401
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS401NC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS416
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS416NC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS416NCv2 V4.X
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS416NCv2 V5.X
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS416P
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS416PNC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS416PNCv2 V4.X
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS416PNCv2 V5.X
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS416Pv2 V4.X
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS416Pv2 V5.X
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS416v2 V4.X
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS416v2 V5.X
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS8000
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS8000A
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS8000ANC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS8000H
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS8000HNC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS8000NC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS8000T
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS8000TNC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS900
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS900 (32M) V4.X
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS900 (32M) V5.X
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS900G
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS900G (32M) V4.X
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS900G (32M) V5.X
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS900GNC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS900GNC(32M) V4.X
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS900GNC(32M) V5.X
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS900GP
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS900GPNC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS900L
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS900LNC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS900M-GETS-C01
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS900M-GETS-XX
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS900M-STND-C01
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS900M-STND-XX
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS900MNC-GETS-C01
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS900MNC-GETS-XX
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS900MNC-STND-XX
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS900MNC-STND-XX-C01
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS900NC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS900NC(32M) V4.X
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS900NC(32M) V5.X
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS900W
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS910
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS910L
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS910LNC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS910NC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS910W
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS920L
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS920LNC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS920W
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS930L
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS930LNC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS930W
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS940G
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS940GNC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS969
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RS969NC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2100
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2100 (32M) V4.X
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2100 (32M) V5.X
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2100NC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2100NC(32M) V4.X
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2100NC(32M) V5.X
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2100P
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2100P (32M) V4.X
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2100P (32M) V5.X
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2100PNC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2100PNC (32M) V4.X
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2100PNC (32M) V5.X
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2200
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2200NC
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2288 V4.X
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2288 V5.X
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2288NC V4.X
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2288NC V5.X
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2300 V4.X
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2300 V5.X
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2300NC V4.X
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2300NC V5.X
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2300P V4.X
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2300P V5.X
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2300PNC V4.X
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2300PNC V5.X
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2488 V4.X
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2488 V5.X
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2488NC V4.X
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG2488NC V5.X
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG907R
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG908C
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG909R
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG910C
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG920P V4.X
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG920P V5.X
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG920PNC V4.X
Default Status
unknown
Versions
Affected
  • From 0 before V4.3.4 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSG920PNC V5.X
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSL910
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RSL910NC
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RST2228
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RST2228P
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RST916C
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
RUGGEDCOM RST916P
Default Status
unknown
Versions
Affected
  • From 0 before V5.0.1 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XB205-3 (SC, PN)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XB205-3 (ST, E/IP)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XB205-3 (ST, E/IP)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XB205-3 (ST, PN)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XB205-3LD (SC, E/IP)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XB205-3LD (SC, PN)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XB206-2 (SC)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XB206-2 (ST/BFOC)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XB206-2 LD
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XB206-2 SC
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XB206-2 ST
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XB206-2LD
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XB208 (E/IP)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XB208 (PN)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XB213-3 (SC, E/IP)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XB213-3 (SC, PN)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XB213-3 (ST, E/IP)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XB213-3 (ST, PN)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XB213-3LD (SC, E/IP)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XB213-3LD (SC, PN)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XB216 (E/IP)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XB216 (PN)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC206-2 (SC)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC206-2 (ST/BFOC)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC206-2G PoE
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC206-2G PoE (54 V DC)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC206-2G PoE EEC (54 V DC)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC206-2SFP
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC206-2SFP EEC
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC206-2SFP G
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC206-2SFP G (EIP DEF.)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC206-2SFP G EEC
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC208
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC208EEC
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC208G
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC208G (EIP def.)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC208G EEC
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC208G PoE
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC208G PoE (54 V DC)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC216
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC216-3G PoE
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC216-3G PoE (54 V DC)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC216-4C
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC216-4C G
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC216-4C G (EIP Def.)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC216-4C G EEC
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC216EEC
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC224
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC224-4C G
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC224-4C G (EIP Def.)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XC224-4C G EEC
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XF204
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XF204 DNA
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XF204-2BA
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XF204-2BA DNA
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XF204G
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XM408-4C
Default Status
unknown
Versions
Affected
  • From V6.1.0 before V6.1.1 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XM408-4C (L3 int.)
Default Status
unknown
Versions
Affected
  • From V6.1.0 before V6.1.1 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XM408-8C
Default Status
unknown
Versions
Affected
  • From V6.1.0 before V6.1.1 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XM408-8C (L3 int.)
Default Status
unknown
Versions
Affected
  • From V6.1.0 before V6.1.1 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XM416-4C
Default Status
unknown
Versions
Affected
  • From V6.1.0 before V6.1.1 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XM416-4C (L3 int.)
Default Status
unknown
Versions
Affected
  • From V6.1.0 before V6.1.1 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XP208
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XP208
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XP208 (Ethernet/IP)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XP208EEC
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XP208EEC
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XP208G
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XP208G EEC
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XP208G PoE EEC
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XP208G PP
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XP208PoE EEC
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XP208PoE EEC
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XP216
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XP216 (Ethernet/IP)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XP216 (V2)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XP216EEC
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XP216EEC (V2)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XP216G
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XP216G EEC
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XP216G PoE EEC
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XP216POE EEC
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XP216PoE EEC (V2)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR324WG (24 x FE, AC 230V)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR324WG (24 X FE, DC 24V)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR326-2C PoE WG
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR326-2C PoE WG (without UL)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR328-4C WG (24XFE, 4XGE, 24V)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR328-4C WG (28xGE, AC 230V)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR328-4C WG (28xGE, DC 24V)
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR524-8C, 1x230V
Default Status
unknown
Versions
Affected
  • From V6.1.0 before V6.1.1 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR524-8C, 1x230V (L3 int.)
Default Status
unknown
Versions
Affected
  • From V6.1.0 before V6.1.1 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR524-8C, 24V
Default Status
unknown
Versions
Affected
  • From V6.1.0 before V6.1.1 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR524-8C, 24V (L3 int.)
Default Status
unknown
Versions
Affected
  • From V6.1.0 before V6.1.1 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR524-8C, 2x230V
Default Status
unknown
Versions
Affected
  • From V6.1.0 before V6.1.1 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR524-8C, 2x230V (L3 int.)
Default Status
unknown
Versions
Affected
  • From V6.1.0 before V6.1.1 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR526-8C, 1x230V
Default Status
unknown
Versions
Affected
  • From V6.1.0 before V6.1.1 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR526-8C, 1x230V (L3 int.)
Default Status
unknown
Versions
Affected
  • From V6.1.0 before V6.1.1 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR526-8C, 24V
Default Status
unknown
Versions
Affected
  • From V6.1.0 before V6.1.1 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR526-8C, 24V (L3 int.)
Default Status
unknown
Versions
Affected
  • From V6.1.0 before V6.1.1 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR526-8C, 2x230V
Default Status
unknown
Versions
Affected
  • From V6.1.0 before V6.1.1 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR526-8C, 2x230V (L3 int.)
Default Status
unknown
Versions
Affected
  • From V6.1.0 before V6.1.1 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR528-6M
Default Status
unknown
Versions
Affected
  • From V6.1.0 before V6.1.1 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR528-6M (2HR2, L3 int.)
Default Status
unknown
Versions
Affected
  • From V6.1.0 before V6.1.1 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR528-6M (2HR2)
Default Status
unknown
Versions
Affected
  • From V6.1.0 before V6.1.1 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR528-6M (L3 int.)
Default Status
unknown
Versions
Affected
  • From V6.1.0 before V6.1.1 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR552-12M
Default Status
unknown
Versions
Affected
  • From V6.1.0 before V6.1.1 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR552-12M (2HR2, L3 int.)
Default Status
unknown
Versions
Affected
  • From V6.1.0 before V6.1.1 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR552-12M (2HR2)
Default Status
unknown
Versions
Affected
  • From V6.1.0 before V6.1.1 (custom)
Vendor
Siemens AGSiemens
Product
SCALANCE XR552-12M (2HR2)
Default Status
unknown
Versions
Affected
  • From V6.1.0 before V6.1.1 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS NET SCALANCE XC206-2
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS NET SCALANCE XC206-2SFP
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS NET SCALANCE XC208
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS NET SCALANCE XC216-4C
Default Status
unknown
Versions
Affected
  • From V3.0 before V3.0.2 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-1188CWE-1188: Initialization of a Resource with an Insecure Default
Type: CWE
CWE ID: CWE-1188
Description: CWE-1188: Initialization of a Resource with an Insecure Default
Metrics
VersionBase scoreBase severityVector
3.18.8HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 8.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-856721.pdf
x_refsource_CONFIRM
http://www.securitytracker.com/id/1039463
vdb-entry
x_refsource_SECTRACK
http://www.securitytracker.com/id/1039464
vdb-entry
x_refsource_SECTRACK
http://www.securityfocus.com/bid/101041
vdb-entry
x_refsource_BID
https://cert-portal.siemens.com/productcert/html/ssa-856721.html
N/A
Hyperlink: https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-856721.pdf
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securitytracker.com/id/1039463
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.securitytracker.com/id/1039464
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.securityfocus.com/bid/101041
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://cert-portal.siemens.com/productcert/html/ssa-856721.html
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-856721.pdf
x_refsource_CONFIRM
x_transferred
http://www.securitytracker.com/id/1039463
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.securitytracker.com/id/1039464
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.securityfocus.com/bid/101041
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-856721.pdf
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securitytracker.com/id/1039463
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.securitytracker.com/id/1039464
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.securityfocus.com/bid/101041
Resource:
vdb-entry
x_refsource_BID
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:productcert@siemens.com
Published At:26 Dec, 2017 | 04:29
Updated At:12 Aug, 2025 | 12:15

After initial configuration, the Ruggedcom Discovery Protocol (RCDP) is still able to write to the device under certain conditions. This could allow an attacker located in the adjacent network of the targeted device to perform unauthorized administrative actions.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.18.8HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Secondary3.08.8HIGH
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.05.8MEDIUM
AV:A/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 3.1
Base score: 8.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.0
Base score: 8.8
Base severity: HIGH
Vector:
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 5.8
Base severity: MEDIUM
Vector:
AV:A/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

Siemens AG
siemens
>>scalance_xb-200_firmware>>Versions from 3.0(inclusive)
cpe:2.3:o:siemens:scalance_xb-200_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>scalance_xb-200>>-
cpe:2.3:h:siemens:scalance_xb-200:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>scalance_xc-200_firmware>>Versions from 3.0(inclusive)
cpe:2.3:o:siemens:scalance_xc-200_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>scalance_xc-200>>-
cpe:2.3:h:siemens:scalance_xc-200:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>scalance_xp-200_firmware>>Versions from 3.0(inclusive)
cpe:2.3:o:siemens:scalance_xp-200_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>scalance_xp-200>>-
cpe:2.3:h:siemens:scalance_xp-200:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>scalance_xr300-wg_firmware>>Versions from 3.0(inclusive)
cpe:2.3:o:siemens:scalance_xr300-wg_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>scalance_xr300-wg>>-
cpe:2.3:h:siemens:scalance_xr300-wg:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>scalance_xr-500_firmware>>Versions from 6.1(inclusive)
cpe:2.3:o:siemens:scalance_xr-500_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>scalance_xr-500>>-
cpe:2.3:h:siemens:scalance_xr-500:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>scalance_xm-400_firmware>>Versions from 6.1(inclusive)
cpe:2.3:o:siemens:scalance_xm-400_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>scalance_xm-400>>-
cpe:2.3:h:siemens:scalance_xm-400:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>ruggedcom_ros>>Versions before 5.0.1(exclusive)
cpe:2.3:o:siemens:ruggedcom_ros:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>ruggedcom_rsl910>>-
cpe:2.3:h:siemens:ruggedcom_rsl910:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>ruggedcom_ros>>Versions before 4.3.4(exclusive)
cpe:2.3:o:siemens:ruggedcom_ros:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>ruggedcom>>-
cpe:2.3:h:siemens:ruggedcom:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-1188Primaryproductcert@siemens.com
CWE-665Secondarynvd@nist.gov
CWE ID: CWE-1188
Type: Primary
Source: productcert@siemens.com
CWE ID: CWE-665
Type: Secondary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.securityfocus.com/bid/101041productcert@siemens.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1039463productcert@siemens.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1039464productcert@siemens.com
Third Party Advisory
VDB Entry
https://cert-portal.siemens.com/productcert/html/ssa-856721.htmlproductcert@siemens.com
N/A
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-856721.pdfproductcert@siemens.com
Issue Tracking
Mitigation
Vendor Advisory
http://www.securityfocus.com/bid/101041af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1039463af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1039464af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-856721.pdfaf854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Mitigation
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/101041
Source: productcert@siemens.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1039463
Source: productcert@siemens.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1039464
Source: productcert@siemens.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://cert-portal.siemens.com/productcert/html/ssa-856721.html
Source: productcert@siemens.com
Resource: N/A
Hyperlink: https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-856721.pdf
Source: productcert@siemens.com
Resource:
Issue Tracking
Mitigation
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/101041
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1039463
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1039464
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-856721.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Mitigation
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

0Records found

CVE-2025-31930
Matching Score-10
Assigner-Siemens
ShareView Details
Matching Score-10
Assigner-Siemens
CVSS Score-8.7||HIGH
EPSS-0.02% / 4.25%
||
7 Day CHG~0.00%
Published-13 May, 2025 | 09:38
Updated-13 May, 2025 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in IEC 1Ph 7.4kW Child socket (8EM1310-2EH04-0GA0) (All versions < V2.135), IEC 1Ph 7.4kW Child socket/ shutter (8EM1310-2EN04-0GA0) (All versions < V2.135), IEC 1Ph 7.4kW Parent cable 7m (8EM1310-2EJ04-3GA1) (All versions < V2.135), IEC 1Ph 7.4kW Parent cable 7m incl. SIM (8EM1310-2EJ04-3GA2) (All versions < V2.135), IEC 1Ph 7.4kW Parent socket (8EM1310-2EH04-3GA1) (All versions < V2.135), IEC 1Ph 7.4kW Parent socket incl. SIM (8EM1310-2EH04-3GA2) (All versions < V2.135), IEC 1Ph 7.4kW Parent socket/ shutter (8EM1310-2EN04-3GA1) (All versions < V2.135), IEC 1Ph 7.4kW Parent socket/ shutter SIM (8EM1310-2EN04-3GA2) (All versions < V2.135), IEC 3Ph 22kW Child cable 7m (8EM1310-3EJ04-0GA0) (All versions < V2.135), IEC 3Ph 22kW Child socket (8EM1310-3EH04-0GA0) (All versions < V2.135), IEC 3Ph 22kW Child socket/ shutter (8EM1310-3EN04-0GA0) (All versions < V2.135), IEC 3Ph 22kW Parent cable 7m (8EM1310-3EJ04-3GA1) (All versions < V2.135), IEC 3Ph 22kW Parent cable 7m incl. SIM (8EM1310-3EJ04-3GA2) (All versions < V2.135), IEC 3Ph 22kW Parent socket (8EM1310-3EH04-3GA1) (All versions < V2.135), IEC 3Ph 22kW Parent socket incl. SIM (8EM1310-3EH04-3GA2) (All versions < V2.135), IEC 3Ph 22kW Parent socket/ shutter (8EM1310-3EN04-3GA1) (All versions < V2.135), IEC 3Ph 22kW Parent socket/ shutter SIM (8EM1310-3EN04-3GA2) (All versions < V2.135), IEC ERK 3Ph 22 kW Child cable 7m (8EM1310-3FJ04-0GA0) (All versions < V2.135), IEC ERK 3Ph 22 kW Child cable 7m (8EM1310-3FJ04-0GA1) (All versions < V2.135), IEC ERK 3Ph 22 kW Child cable 7m (8EM1310-3FJ04-0GA2) (All versions < V2.135), IEC ERK 3Ph 22 kW Child socket (8EM1310-3FH04-0GA0) (All versions < V2.135), IEC ERK 3Ph 22 kW Parent socket (8EM1310-3FH04-3GA1) (All versions < V2.135), IEC ERK 3Ph 22 kW Parent socket incl. SI (8EM1310-3FH04-3GA2) (All versions < V2.135), UL Commercial Cellular 48A NTEP (8EM1310-5HF14-1GA2) (All versions < V2.135), UL Commercial Child 40A w/ 15118 HW (8EM1310-4CF14-0GA0) (All versions < V2.135), UL Commercial Child 48A BA Compliant (8EM1315-5CG14-0GA0) (All versions < V2.135), UL Commercial Child 48A w/ 15118 HW (8EM1310-5CF14-0GA0) (All versions < V2.135), UL Commercial Parent 40A with Simcard (8EM1310-4CF14-1GA2) (All versions < V2.135), UL Commercial Parent 48A (USPS) (8EM1317-5CG14-1GA2) (All versions < V2.135), UL Commercial Parent 48A BA Compliant (8EM1315-5CG14-1GA2) (All versions < V2.135), UL Commercial Parent 48A with Simcard BA (8EM1310-5CF14-1GA2) (All versions < V2.135), UL Commercial Parent 48A, 15118, 25ft (8EM1310-5CG14-1GA1) (All versions < V2.135), UL Commercial Parent 48A, 15118, 25ft (8EM1314-5CG14-2FA2) (All versions < V2.135), UL Commercial Parent 48A, 15118, 25ft (8EM1315-5HG14-1GA2) (All versions < V2.135), UL Commercial Parent 48A,15118 25ft Sim (8EM1310-5CG14-1GA2) (All versions < V2.135), VersiCharge Blue™ 80A AC Cellular (8EM1315-7BG16-1FH2) (All versions < V2.135). Affected devices contain Modbus service enabled by default. This could allow an attacker connected to the same network to remotely control the EV charger.

Action-Not Available
Vendor-Siemens AG
Product-IEC 3Ph 22kW Child socket/ shutterIEC 1Ph 7.4kW Parent socket incl. SIMUL Commercial Parent 48A (USPS)UL Commercial Child 40A w/ 15118 HWIEC 1Ph 7.4kW Child socket/ shutterIEC 1Ph 7.4kW Parent cable 7m incl. SIMIEC ERK 3Ph 22 kW Parent socket incl. SIUL Commercial Parent 48A BA CompliantIEC 1Ph 7.4kW Parent socket/ shutterIEC 3Ph 22kW Parent socket incl. SIMVersiCharge Blue™ 80A AC CellularUL Commercial Child 48A w/ 15118 HWUL Commercial Parent 40A with SimcardIEC 3Ph 22kW Parent cable 7m incl. SIMIEC ERK 3Ph 22 kW Child cable 7mUL Commercial Parent 48A,15118 25ft SimUL Commercial Parent 48A, 15118, 25ftIEC ERK 3Ph 22 kW Child socketIEC 1Ph 7.4kW Parent socket/ shutter SIMIEC 3Ph 22kW Parent cable 7mUL Commercial Child 48A BA CompliantIEC 3Ph 22kW Parent socket/ shutterUL Commercial Cellular 48A NTEPIEC 3Ph 22kW Child cable 7mIEC 1Ph 7.4kW Parent cable 7mIEC 3Ph 22kW Parent socket/ shutter SIMIEC 3Ph 22kW Parent socketIEC ERK 3Ph 22 kW Parent socketUL Commercial Parent 48A with Simcard BAIEC 1Ph 7.4kW Parent socketIEC 3Ph 22kW Child socketIEC 1Ph 7.4kW Child socket
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2024-23811
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-8.8||HIGH
EPSS-1.55% / 80.66%
||
7 Day CHG~0.00%
Published-13 Feb, 2024 | 09:00
Updated-04 Oct, 2024 | 16:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SINEC NMS (All versions < V2.0 SP1). The affected application allows users to upload arbitrary files via TFTP. This could allow an attacker to upload malicious firmware images or other files, that could potentially lead to remote code execution.

Action-Not Available
Vendor-Siemens AG
Product-sinec_nmsSINEC NMSsinec_nms
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2024-23810
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-8.8||HIGH
EPSS-0.76% / 72.31%
||
7 Day CHG~0.00%
Published-13 Feb, 2024 | 09:00
Updated-09 May, 2025 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SINEC NMS (All versions < V2.0 SP1). The affected application is vulnerable to SQL injection. This could allow an unauthenticated remote attacker to execute arbitrary SQL queries on the server database.

Action-Not Available
Vendor-Siemens AG
Product-sinec_nmsSINEC NMS
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2025-41224
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-7.7||HIGH
EPSS-0.04% / 9.93%
||
7 Day CHG~0.00%
Published-08 Jul, 2025 | 10:35
Updated-08 Jul, 2025 | 20:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in RUGGEDCOM RMC8388 V5.X (All versions < V5.10.0), RUGGEDCOM RMC8388NC V5.X (All versions < V5.10.0), RUGGEDCOM RS416NCv2 V5.X (All versions < V5.10.0), RUGGEDCOM RS416PNCv2 V5.X (All versions < V5.10.0), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.10.0), RUGGEDCOM RS416v2 V5.X (All versions < V5.10.0), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900GNC(32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900NC(32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2100NC(32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2100P (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2100PNC (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2288 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2288NC V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300NC V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300P V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300PNC V5.X (All versions < V5.10.0), RUGGEDCOM RSG2488 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2488NC V5.X (All versions < V5.10.0), RUGGEDCOM RSG907R (All versions < V5.10.0), RUGGEDCOM RSG908C (All versions < V5.10.0), RUGGEDCOM RSG909R (All versions < V5.10.0), RUGGEDCOM RSG910C (All versions < V5.10.0), RUGGEDCOM RSG920P V5.X (All versions < V5.10.0), RUGGEDCOM RSG920PNC V5.X (All versions < V5.10.0), RUGGEDCOM RSL910 (All versions < V5.10.0), RUGGEDCOM RSL910NC (All versions < V5.10.0), RUGGEDCOM RST2228 (All versions < V5.10.0), RUGGEDCOM RST2228P (All versions < V5.10.0), RUGGEDCOM RST916C (All versions < V5.10.0), RUGGEDCOM RST916P (All versions < V5.10.0). The affected products do not properly enforce interface access restrictions when changing from management to non-management interface configurations until a system reboot occurs, despite configuration being saved. This could allow an attacker with network access and credentials to gain access to device through non-management and maintain SSH access to the device until reboot.

Action-Not Available
Vendor-Siemens AG
Product-RUGGEDCOM RSG2100P (32M) V5.XRUGGEDCOM RMC8388NC V5.XRUGGEDCOM RST2228PRUGGEDCOM RSG909RRUGGEDCOM RSG2300NC V5.XRUGGEDCOM RSG2288 V5.XRUGGEDCOM RS416PNCv2 V5.XRUGGEDCOM RSG2288NC V5.XRUGGEDCOM RSG920P V5.XRUGGEDCOM RS416NCv2 V5.XRUGGEDCOM RSG2300PNC V5.XRUGGEDCOM RSL910RUGGEDCOM RST2228RUGGEDCOM RSG910CRUGGEDCOM RS900 (32M) V5.XRUGGEDCOM RST916CRUGGEDCOM RSG2488NC V5.XRUGGEDCOM RS900GNC(32M) V5.XRUGGEDCOM RSG2100NC(32M) V5.XRUGGEDCOM RS900NC(32M) V5.XRUGGEDCOM RST916PRUGGEDCOM RS416Pv2 V5.XRUGGEDCOM RSG908CRUGGEDCOM RSG2300 V5.XRUGGEDCOM RMC8388 V5.XRUGGEDCOM RS900G (32M) V5.XRUGGEDCOM RSG2300P V5.XRUGGEDCOM RS416v2 V5.XRUGGEDCOM RSG2100PNC (32M) V5.XRUGGEDCOM RSG907RRUGGEDCOM RSL910NCRUGGEDCOM RSG920PNC V5.XRUGGEDCOM RSG2488 V5.XRUGGEDCOM RSG2100 (32M) V5.X
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2021-25667
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-8.8||HIGH
EPSS-0.91% / 74.81%
||
7 Day CHG~0.00%
Published-15 Mar, 2021 | 17:03
Updated-03 Aug, 2024 | 20:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in RUGGEDCOM RM1224 (All versions >= V4.3 and < V6.4), SCALANCE M-800 (All versions >= V4.3 and < V6.4), SCALANCE S615 (All versions >= V4.3 and < V6.4), SCALANCE SC-600 Family (All versions >= V2.0 and < V2.1.3), SCALANCE XB-200 (All versions < V4.1), SCALANCE XC-200 (All versions < V4.1), SCALANCE XF-200BA (All versions < V4.1), SCALANCE XM400 (All versions < V6.2), SCALANCE XP-200 (All versions < V4.1), SCALANCE XR-300WG (All versions < V4.1), SCALANCE XR500 (All versions < V6.2). Affected devices contain a stack-based buffer overflow vulnerability in the handling of STP BPDU frames that could allow a remote attacker to trigger a denial-of-service condition or potentially remote code execution. Successful exploitation requires the passive listening feature of the device to be active.

Action-Not Available
Vendor-Siemens AG
Product-scalance_m-800_firmwarescalance_xm400scalance_x300wgscalance_xp-200_firmwarescalance_xc-200_firmwarescalance_xf-200ba_firmwarescalance_sc646-2c_firmwarescalance_xb-200ruggedcom_rm1224_firmwarescalance_sc636-2cscalance_sc642-2c_firmwarescalance_xp-200scalance_xr500ruggedcom_rm1224scalance_xf-200bascalance_sc622-2cscalance_s615scalance_sc646-2cscalance_xm400_firmwarescalance_xb-200_firmwarescalance_sc642-2cscalance_x300wg_firmwarescalance_xc-200scalance_xr500_firmwarescalance_sc632-2c_firmwarescalance_sc622-2c_firmwarescalance_m-800scalance_s615_firmwarescalance_sc636-2c_firmwarescalance_sc632-2cSCALANCE XM400SCALANCE SC-600 FamilySCALANCE XR-300WGSCALANCE XR500SCALANCE XF-200BARUGGEDCOM RM1224SCALANCE XP-200SCALANCE M-800SCALANCE XC-200SCALANCE S615SCALANCE XB-200
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-4833
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-8.8||HIGH
EPSS-1.01% / 76.12%
||
7 Day CHG~0.00%
Published-14 Jun, 2018 | 16:00
Updated-05 Aug, 2024 | 05:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in RFID 181EIP (All versions), RUGGEDCOM Win (V4.4, V4.5, V5.0, and V5.1), SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.3), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.4.1), SCALANCE X-200RNA switch family (All versions < V3.2.6), SCALANCE X-300 switch family (incl. SIPLUS NET variants) (All versions < V4.1.3), SCALANCE X408 (All versions < V4.1.3), SCALANCE X414 (All versions), SIMATIC RF182C (All versions). Unprivileged remote attackers located in the same local network segment (OSI Layer 2) could gain remote code execution on the affected products by sending a specially crafted DHCP response to a client's DHCP request.

Action-Not Available
Vendor-Siemens AG
Product-ruggedcom_wimaxscalance_x414simatic_rf182csimatic_rf182c_firmwarescalance_x408_firmwareruggedcom_wimax_firmwarescalance_x204rna_firmwarescalance_x300rfid_181-eip_firmwarescalance_x200irt_firmwarescalance_x300_firmwarescalance_x200irtscalance_x414_firmwarerfid_181-eipscalance_x200_firmwarescalance_x408scalance_x204rnascalance_x200RFID 181EIPSCALANCE X-200 switch family (incl. SIPLUS NET variants)SCALANCE X408SCALANCE X-200RNA switch familyRUGGEDCOM WinSCALANCE X414SIMATIC RF182CSCALANCE X-300 switch family (incl. SIPLUS NET variants)SCALANCE X-200IRT switch family (incl. SIPLUS NET variants)
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-20
Improper Input Validation
CVE-2022-26476
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-8.8||HIGH
EPSS-0.25% / 48.30%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 09:21
Updated-03 Aug, 2024 | 05:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in Spectrum Power 4 (All versions using Shared HIS), Spectrum Power 7 (All versions using Shared HIS), Spectrum Power MGMS (All versions using Shared HIS). An unauthenticated attacker could log into the component Shared HIS used in Spectrum Power systems by using an account with default credentials. A successful exploitation could allow the attacker to access the component Shared HIS with administrative privileges.

Action-Not Available
Vendor-Siemens AG
Product-spectrum_power_4spectrum_power_microgrid_management_systemspectrum_power_7Spectrum Power 4Spectrum Power 7Spectrum Power MGMS
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2024-39675
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-8.7||HIGH
EPSS-0.08% / 24.87%
||
7 Day CHG+0.02%
Published-09 Jul, 2024 | 12:05
Updated-01 May, 2025 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in RUGGEDCOM RMC30 (All versions < V4.3.10), RUGGEDCOM RMC30NC (All versions < V4.3.10), RUGGEDCOM RP110 (All versions < V4.3.10), RUGGEDCOM RP110NC (All versions < V4.3.10), RUGGEDCOM RS400 (All versions < V4.3.10), RUGGEDCOM RS400NC (All versions < V4.3.10), RUGGEDCOM RS401 (All versions < V4.3.10), RUGGEDCOM RS401NC (All versions < V4.3.10), RUGGEDCOM RS416 (All versions < V4.3.10), RUGGEDCOM RS416NC (All versions < V4.3.10), RUGGEDCOM RS416NCv2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416NCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416P (All versions < V4.3.10), RUGGEDCOM RS416PNC (All versions < V4.3.10), RUGGEDCOM RS416PNCv2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416PNCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416Pv2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416v2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416v2 V5.X (All versions < V5.9.0), RUGGEDCOM RS910 (All versions < V4.3.10), RUGGEDCOM RS910L (All versions), RUGGEDCOM RS910LNC (All versions), RUGGEDCOM RS910NC (All versions < V4.3.10), RUGGEDCOM RS910W (All versions < V4.3.10), RUGGEDCOM RS920L (All versions), RUGGEDCOM RS920LNC (All versions), RUGGEDCOM RS920W (All versions). In some configurations the affected products wrongly enable the Modbus service in non-managed VLANS. Only serial devices are affected by this vulnerability.

Action-Not Available
Vendor-Siemens AG
Product-RUGGEDCOM RS416Pv2 V5.XRUGGEDCOM RS401NCRUGGEDCOM RMC30RUGGEDCOM RS416v2 V4.XRUGGEDCOM RS920LRUGGEDCOM RS920LNCRUGGEDCOM RS400NCRUGGEDCOM RS416NCv2 V5.XRUGGEDCOM RS416NCRUGGEDCOM RP110RUGGEDCOM RS416PNCRUGGEDCOM RS416v2 V5.XRUGGEDCOM RS910RUGGEDCOM RS416PRUGGEDCOM RS910LNCRUGGEDCOM RS910WRUGGEDCOM RS416PNCv2 V5.XRUGGEDCOM RS400RUGGEDCOM RP110NCRUGGEDCOM RS416RUGGEDCOM RMC30NCRUGGEDCOM RS401RUGGEDCOM RS416NCv2 V4.XRUGGEDCOM RS910NCRUGGEDCOM RS416PNCv2 V4.XRUGGEDCOM RS416Pv2 V4.XRUGGEDCOM RS920WRUGGEDCOM RS910Lruggedcom_ros_rs400ruggedcom_ros_rs416ncruggedcom_ros_rs416ruggedcom_ros_rs416pruggedcom_ros_rs401ruggedcom_ros_rmc30ruggedcom_ros_rs910ruggedcom_ros_rs416pv2ruggedcom_ros_rp110ncruggedcom_ros_rs920wruggedcom_ros_rs400ncruggedcom_ros_rs416pncruggedcom_ros_rs920lncruggedcom_ros_rs401ncruggedcom_ros_rs910lruggedcom_ros_rs910lncruggedcom_ros_rp110ruggedcom_ros_rs920lruggedcom_ros_rs416pncv2ruggedcom_ros_rmc30ncruggedcom_ros_rs416ncv2ruggedcom_ros_rs910wruggedcom_ros_rs416v2ruggedcom_ros_rs910nc
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2019-12257
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-24.35% / 95.88%
||
7 Day CHG~0.00%
Published-09 Aug, 2019 | 17:49
Updated-04 Aug, 2024 | 23:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Wind River VxWorks 6.6 through 6.9 has a Buffer Overflow in the DHCP client component. There is an IPNET security vulnerability: Heap overflow in DHCP Offer/ACK parsing inside ipdhcpc.

Action-Not Available
Vendor-windriverbeldenn/aNetApp, Inc.Siemens AGSonicWall Inc.
Product-hirschmann_rsp20ruggedcom_win7025_firmwarehirschmann_ees25sonicoshirschmann_grs1030hirschmann_grs1142ruggedcom_win7018_firmwarehirschmann_rspe32hirschmann_grs1130garrettcom_magnum_dx940ehirschmann_rspe35hirschmann_eesx20hirschmann_rspe37ruggedcom_win7018hirschmann_grs1042siprotec_5_firmwareruggedcom_win7000ruggedcom_win7200hirschmann_rsp35garrettcom_magnum_dx940e_firmwaree-series_santricity_os_controllervxworkshirschmann_msp40hirschmann_octopus_os3hirschmann_rsp30hirschmann_dragon_mach4000hirschmann_dragon_mach4500hirschmann_msp32hirschmann_rsp25hirschmann_rail_switch_power_smarthirschmann_grs1020hirschmann_eesx30hirschmann_rail_switch_power_litehirschmann_eagle20hirschmann_eagle30hirschmann_hiosruggedcom_win7025hirschmann_rspe30hirschmann_eagle_oneruggedcom_win7200_firmwaresiprotec_5hirschmann_ees20hirschmann_red25ruggedcom_win7000_firmwarehirschmann_msp30hirschmann_grs1120n/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-8744
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.16% / 37.04%
||
7 Day CHG-0.01%
Published-12 Nov, 2020 | 18:06
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper initialization in subsystem for Intel(R) CSME versions before12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE versions before 4.0.30 Intel(R) SPS versions before E3_05.01.04.200 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel CorporationSiemens AG
Product-server_platform_servicessimatic_s7-1518f-4_pn\/dp_mfp_firmwaretrusted_execution_enginesimatic_s7-1518-4_pn\/dp_mfpconverged_security_and_management_enginesimatic_s7-1518f-4_pn\/dp_mfpsimatic_s7-1500_firmwaresimatic_s7-1518-4_pn\/dp_mfp_firmwaresimatic_s7-1500Intel(R) CSME versions, Intel(R) TXE, Intel(R) SPS
CWE ID-CWE-665
Improper Initialization
CVE-2022-24287
Matching Score-6
Assigner-Siemens
ShareView Details
Matching Score-6
Assigner-Siemens
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.81%
||
7 Day CHG~0.00%
Published-10 May, 2022 | 09:46
Updated-21 Apr, 2025 | 13:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3 UC06), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1 UC01), SIMATIC WinCC Runtime Professional V16 and earlier (All versions), SIMATIC WinCC Runtime Professional V17 (All versions < V17 Upd4), SIMATIC WinCC V7.3 (All versions), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 21), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 8). A missing printer configuration on the host could allow an authenticated attacker to escape the WinCC Kiosk Mode.

Action-Not Available
Vendor-Siemens AG
Product-simatic_winccsimatic_pcs_7simatic_wincc_runtime_professionalSIMATIC PCS 7 V9.0SIMATIC WinCC Runtime Professional V17SIMATIC WinCC V7.4SIMATIC WinCC V7.5SIMATIC PCS 7 V8.2SIMATIC WinCC V7.3SIMATIC PCS 7 V9.1SIMATIC WinCC Runtime Professional V16 and earlier
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2020-11655
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-2.83% / 85.61%
||
7 Day CHG~0.00%
Published-09 Apr, 2020 | 02:49
Updated-04 Aug, 2024 | 11:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.

Action-Not Available
Vendor-sqliten/aNetApp, Inc.Debian GNU/LinuxOracle CorporationCanonical Ltd.Tenable, Inc.Siemens AG
Product-ubuntu_linuxcommunications_messaging_serversqlitecommunications_network_charging_and_controlcommunications_session_route_manageroutside_in_technologycommunications_session_report_managertenable.scmysql_workbenchsinec_infrastructure_network_servicesdebian_linuxontap_select_deploy_administration_utilityinstantis_enterprisetrackzfs_storage_appliance_kithyperion_infrastructure_technologyenterprise_manager_ops_centercommunications_element_managermysqln/a
CWE ID-CWE-665
Improper Initialization
CVE-2020-12357
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.10% / 28.86%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 18:49
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper initialization in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aNetApp, Inc.Intel CorporationSiemens AG
Product-xeon_platinum_8153xeon_e3-1230_v5xeon_e3-1558l_v5xeon_w-3245mxeon_e5-4610_v4xeon_e7-8894_v4xeon_gold_6146xeon_e5-2660_v3core_i7-1068ng7e-series_bioscore_i7-1160g7xeon_e5-1680_v3xeon_d-1527xeon_e5-2697_v4xeon_gold_5115xeon_platinum_8170xeon_gold_6136xeon_w-2125core_i9-10940xxeon_e5-4610_v3xeon_e5-4650_v4xeon_e7-8880_v4xeon_gold_6138xeon_e5-1660_v4simatic_ipc547g_firmwarexeon_e7-8891_v4xeon_platinum_8164xeon_e-2226gxeon_e3-1280_v5xeon_gold_6234xeon_e5-2699r_v4xeon_w-2255xeon_d-1518core_i7-11700core_i7-6822eqcore_i7-6700texeon_e3-1501l_v6xeon_gold_6262vcore_i7-11370hxeon_e5-2683_v4xeon_platinum_8168core_i7-7600uxeon_e5-2608l_v4xeon_e5-2640_v3xeon_e-2224xeon_gold_5218xeon_e5-1620_v4core_i7-11850hxeon_d-1567xeon_e5-2630l_v3xeon_e3-1505l_v6xeon_e-2278gexeon_e5-1607_v3xeon_e5-4640_v4xeon_gold_5117xeon_gold_5122xeon_w-2245simatic_field_pg_m6_firmwarexeon_d-1587xeon_e5-2699_v3xeon_d-2191simatic_ipc427e_firmwarexeon_gold_6248rcore_i7-7820hkxeon_e5-2689_v4xeon_e7-8870_v4xeon_w-1290tcore_i5-l16g7xeon_gold_6240core_i7-6970hqxeon_gold_6262xeon_platinum_8156xeon_e-2136core_i7-10510ucore_i7-1060g7xeon_w-2265xeon_e5-2667_v4xeon_platinum_8274xeon_w-10855mxeon_gold_6126fxeon_d-1539xeon_e3-1535m_v5xeon_e5-1680_v4core_i7-7700xeon_gold_5220rxeon_d-2146ntxeon_e3-1268l_v5xeon_platinum_8160fsimatic_ipc477e_firmwarexeon_e5-2658_v3simatic_field_pg_m6xeon_e5-4660_v4core_i7-8750hxeon_e3-1501m_v6xeon_gold_6250lxeon_gold_6210uxeon_d-2187ntxeon_platinum_8160mcore_i7-10700fxeon_d-2166ntxeon_e3-1270_v6xeon_e-2286mxeon_e3-1505m_v5core_i7-10750hxeon_silver_4216xeon_gold_6230xeon_platinum_8253xeon_e5-2630l_v4xeon_w-2195xeon_e5-4667_v4xeon_e5-2628l_v4xeon_e-2276gxeon_e5-2685_v3xeon_w-1390xeon_e-2186gxeon_d-2183itxeon_silver_4116txeon_e-2174gxeon_e5-2630_v4xeon_d-1622core_i7-8809gxeon_e5-4667_v3xeon_platinum_8160hcore_i7-8700bxeon_e5-2643_v3xeon_d-2145ntxeon_d-1581xeon_e5-1650_v4xeon_gold_6238xeon_e5-2630_v3xeon_w-1250pxeon_silver_4208xeon_e3-1585_v5xeon_w-2104xeon_e5-2623_v4core_i7-6560uxeon_w-2123xeon_gold_5220sxeon_w-3275msimatic_ipc477e_pro_firmwarexeon_platinum_9282xeon_e5-2683_v3core_i7-10700exeon_silver_4108xeon_gold_6130txeon_silver_4210core_i7-11700kfcloud_backupcore_i7-10870hxeon_e7-8867_v4xeon_bronze_3106xeon_w-2102simatic_ipc647e_firmwarexeon_e-2274gcore_i7-10700kxeon_e-2278gelxeon_d-1540xeon_e3-1280_v6hci_compute_node_biosxeon_e5-2698_v4xeon_platinum_8160tcore_i7-11700kxeon_d-1528xeon_silver_4214rcore_i7-6500uxeon_e5-2697_v3xeon_e5-4627_v4xeon_e-2124core_i7-10710uxeon_d-2141icore_i7-10700kfxeon_d-1541xeon_e5-2660_v4xeon_e7-4830_v4xeon_w-1250texeon_platinum_8268xeon_platinum_8176mxeon_e-2276mecore_i7-8565uxeon_gold_5222xeon_e5-2687w_v4xeon_e5-1603_v3core_i7-7560uxeon_gold_5117fxeon_e3-1535m_v6xeon_d-1548xeon_d-1649nxeon_d-1529xeon_platinum_9221xeon_e3-1220_v5xeon_platinum_8160xeon_e5-2428l_v3simatic_ipc847esimatic_ipc427ecore_i7-6700hqxeon_e7-4809_v4xeon_e5-4648_v3xeon_gold_6122xeon_silver_4123xeon_gold_6148fxeon_gold_6132biosxeon_e5-2618l_v4xeon_w-2155xeon_gold_6137core_i7-7500ucore_i7-8550uxeon_e-2224gxeon_w-2135xeon_d-1623nxeon_w-2145xeon_e-2226gecore_i7-6650uxeon_gold_6142core_i7-10610ucore_i7-8500ycore_i7-7567uxeon_silver_4214xeon_w-1390pxeon_d-2161ixeon_silver_4210rxeon_d-1632core_i7-7820hqxeon_e3-1585l_v5xeon_e5-2620_v3xeon_e5-2670_v3xeon_gold_5218bxeon_e5-2648l_v3xeon_gold_6142mxeon_e5-2609_v3xeon_e3-1275_v5xeon_e5-2438l_v3xeon_e3-1240_v5xeon_e5-2650_v3xeon_gold_6222core_i7-6567uxeon_e5-2648l_v4simatic_ipc677exeon_e5-4620_v4xeon_e7-8855_v4xeon_d-1513nxeon_d-1537xeon_e3-1515m_v5xeon_w-1290texeon_e3-1225_v5xeon_gold_6209uxeon_silver_4112xeon_d-1559xeon_w-3223xeon_gold_5120txeon_w-3175xxeon_gold_6134xeon_gold_6162xeon_e5-2628l_v3xeon_e-2254mexeon_w-3235core_i7-7y75xeon_e5-4669_v3xeon_w-2225xeon_gold_6130hxeon_w-2133core_i7-6700xeon_d-1557xeon_e5-4627_v3xeon_e7-4850_v4xeon_gold_6148xeon_e3-1505m_v6xeon_gold_6144xeon_gold_6140mxeon_gold_5220txeon_platinum_8276lxeon_w-2223xeon_e5-2679_v4core_i7-7700kcore_i7-8705gxeon_e-2276mcore_i7-8665uxeon_gold_6129xeon_platinum_9222xeon_gold_6230tcore_i7-7660ucore_i7-6600ucore_i7-8706gxeon_gold_6126tcore_i7-11700fxeon_platinum_8165xeon_w-3225xeon_gold_6135xeon_e3-1565l_v5xeon_e-2236xeon_w-1370core_i7-10850hxeon_e5-1603_v4core_i7-1185grexeon_e5-2408l_v3core_i7-11375hxeon_e3-1240_v6xeon_d-1573ncore_i7-8700core_i7-7700tcore_i7-10700txeon_e5-1630_v4xeon_e5-4660_v3xeon_gold_6246core_i7-8086kxeon_w-2295core_i7-6770hqcore_i7-8700kxeon_e5-2603_v3fas_biosxeon_e-2134xeon_e5-2667_v3xeon_gold_5215xeon_e5-4655_v3xeon_d-2143itxeon_d-2163itxeon_e5-2699_v4xeon_e3-1285_v6xeon_w-1390tsimatic_cpu_1518-4xeon_w-1270xeon_e3-1225_v6xeon_platinum_8284xeon_silver_4109tcore_i7-10510yxeon_e3-1240l_v5xeon_e5-2690_v3xeon_e5-4655_v4xeon_gold_5215lxeon_silver_4215rxeon_e5-2658_v4xeon_gold_6138fcore_i7-11800hxeon_e5-1630_v3simatic_ipc477exeon_silver_4210txeon_e5-2680_v3xeon_gold_6212uxeon_e3-1205_v6core_i7-7700hqxeon_w-1270texeon_silver_4114xeon_e5-2698_v3core_i7-6498duxeon_e3-1245_v5core_i7-6870hqxeon_gold_6258rxeon_bronze_3104xeon_d-1571xeon_gold_6240lxeon_gold_6238lxeon_e5-2637_v3xeon_e5-1620_v3xeon_gold_6250xeon_d-2173itcore_i7-11700txeon_w-11855mxeon_d-2123itxeon_gold_5219yxeon_e-2246gxeon_w-3265mxeon_d-1627xeon_e5-2637_v4xeon_e5-2687w_v3xeon_d-1602xeon_e7-8890_v4xeon_e5-2680_v4xeon_gold_5218tsimatic_ipc847e_firmwarexeon_e5-2697a_v4xeon_gold_6150xeon_gold_6140xeon_e5-2690_v4xeon_e5-2609_v4core_i7-7920hqxeon_platinum_8174xeon_d-1612xeon_e-2254mlxeon_e3-1545m_v5core_i7-10700simatic_ipc477e_procore_i9-10920xxeon_e3-1578l_v5core_i7-6660uxeon_e3-1270_v5xeon_gold_6126simatic_ipc647exeon_e3-1260l_v5xeon_w-1250exeon_e5-2643_v4xeon_d-1563nxeon_e5-2699a_v4simatic_cpu_1518-4_firmwarecore_i7-10875hxeon_e-2276mlxeon_e-2244gxeon_e-2176gxeon_gold_6142fcore_i3-l13g4core_i7-8709gsimatic_ipc627exeon_e5-4650_v3xeon_e5-2650l_v4xeon_gold_6130xeon_e-2104gxeon_platinum_8260core_i7-8557usimatic_ipc547gcore_i7-8700txeon_platinum_9242core_i7-6820hqxeon_platinum_8280lxeon_silver_4110core_i7-8650uxeon_bronze_3204xeon_gold_5119tcore_i7-1180g7core_i7-6700tcore_i7-6920hqxeon_gold_6246rxeon_e3-1230_v6xeon_gold_5217xeon_gold_6230nxeon_gold_6143xeon_w-3265xeon_gold_5218nxeon_e5-2620_v4xeon_gold_6138txeon_w-3245xeon_gold_5120simatic_ipc627e_firmwarecore_i7-1185g7core_i7-1195g7xeon_e-2124gcore_i7-1165g7xeon_e5-2618l_v3xeon_d-1523nxeon_e5-2608l_v3core_i7-10700texeon_e-2288gxeon_d-1653nxeon_gold_5220xeon_e-2234xeon_d-1577xeon_d-1637xeon_gold_6254xeon_gold_6269yxeon_silver_4114tcore_i7-6700kxeon_gold_6240yxeon_e5-4669_v4aff_biosxeon_gold_6154xeon_w-1250xeon_e5-2640_v4hci_storage_node_biosxeon_gold_6208uxeon_e7-8893_v4xeon_w-1290exeon_e5-1650_v3xeon_w-3275core_i7-11700bxeon_d-1553nxeon_e-2126gxeon_silver_4209txeon_e5-4620_v3xeon_silver_4116xeon_w-1270exeon_d-1633ncore_i7-7820eqxeon_gold_6252nxeon_e7-4820_v4xeon_gold_6244xeon_e5-2695_v3xeon_gold_6248xeon_e3-1220_v6xeon_w-1370pxeon_platinum_8280xeon_e-2186mxeon_e5-1660_v3xeon_d-1520simatic_itp1000_firmwarexeon_e-2176mcore_i7-6785rcore_i7-6820hkxeon_platinum_8256xeon_gold_6152core_i7-1060ng7xeon_e5-2623_v3xeon_platinum_8158xeon_e5-2658a_v3xeon_e5-2418l_v3xeon_w-1290pxeon_e-2286gxeon_gold_6222vxeon_platinum_8176xeon_gold_6242xeon_e3-1275_v6xeon_d-1531core_i7-10810uxeon_e3-1575m_v5xeon_e-2278gxeon_e5-2650_v4xeon_platinum_8260yxeon_e3-1505l_v5xeon_platinum_8270xeon_d-1533nxeon_gold_6242rxeon_e3-1245_v6xeon_gold_6128xeon_silver_4215xeon_d-2142itxeon_platinum_8180mcore_i7-8850hxeon_gold_5118xeon_w-2235xeon_e5-2695_v4xeon_gold_6130fsimatic_itp1000xeon_w-11955mcore_i7-6820eqxeon_gold_6134mcore_i9-10900xxeon_platinum_8276xeon_gold_6238txeon_e3-1235l_v5xeon_silver_4214yxeon_e5-2603_v4core_i9-10980xexeon_e5-4628l_v4xeon_e7-8860_v4xeon_w-1350xeon_silver_4106hxeon_gold_6138pcore_i7-8665uexeon_w-1290xeon_platinum_8176fxeon_d-1524nsolidfire_biosxeon_gold_6240rxeon_w-10885mxeon_w-2275xeon_d-1543nxeon_gold_6226xeon_e-2144gxeon_gold_6256xeon_d-1521xeon_w-1350pxeon_gold_6230rcore_i7-8569uxeon_gold_6252xeon_e5-4640_v3core_i7-1185g7exeon_gold_5218rxeon_gold_6226rxeon_bronze_3206rsimatic_ipc677e_firmwarexeon_e5-1607_v4core_i7-1065g7xeon_platinum_8260lxeon_e5-1428l_v3core_i7-8559uxeon_platinum_8170mxeon_e-2146gxeon_platinum_8180xeon_d-2177ntxeon_e5-2650l_v3xeon_w-2175Intel(R) Processors
CWE ID-CWE-665
Improper Initialization
CVE-2019-8259
Matching Score-6
Assigner-Kaspersky
ShareView Details
Matching Score-6
Assigner-Kaspersky
CVSS Score-7.5||HIGH
EPSS-0.87% / 74.25%
||
7 Day CHG~0.00%
Published-05 Mar, 2019 | 15:00
Updated-16 Sep, 2024 | 20:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

UltraVNC revision 1198 contains multiple memory leaks (CWE-655) in VNC client code, which allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1199.

Action-Not Available
Vendor-uvncUltraVNCSiemens AG
Product-sinumerik_pcu_base_win10_software\/ipcultravncsinumerik_pcu_base_win7_software\/ipcsinumerik_access_mymachine\/p2pUltraVNC
CWE ID-CWE-665
Improper Initialization
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CVE-2022-0847
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-84.35% / 99.27%
||
7 Day CHG~0.00%
Published-07 Mar, 2022 | 00:00
Updated-30 Jul, 2025 | 19:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-05-16||Apply updates per vendor instructions.

A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.

Action-Not Available
Vendor-ovirtn/aSiemens AGNetApp, Inc.Linux Kernel Organization, IncSonicWall Inc.Fedora ProjectRed Hat, Inc.
Product-h300s_firmwareenterprise_linux_for_power_little_endianfedorah700eh410ch500s_firmwareh700senterprise_linux_server_aush300e_firmwareh500sh500eenterprise_linux_for_ibm_z_systemsenterprise_linux_for_real_time_for_nfvh500e_firmwareenterprise_linux_for_real_time_tussma1000_firmwarescalance_lpe9403enterprise_linux_for_ibm_z_systems_eusenterprise_linux_server_update_services_for_sap_solutionsenterprise_linux_for_real_time_for_nfv_tussma1000h300sh300eh410s_firmwareenterprise_linux_eusenterprise_linux_server_tusscalance_lpe9403_firmwareenterprise_linux_for_power_little_endian_eush410sh410c_firmwareenterprise_linuxcodeready_linux_builderh700e_firmwareenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutionsenterprise_linux_for_real_timeovirt-enginevirtualization_hostlinux_kernelh700s_firmwarekernelKernel
CWE ID-CWE-665
Improper Initialization
CVE-2019-8277
Matching Score-6
Assigner-Kaspersky
ShareView Details
Matching Score-6
Assigner-Kaspersky
CVSS Score-7.5||HIGH
EPSS-0.87% / 74.25%
||
7 Day CHG~0.00%
Published-09 Mar, 2019 | 00:00
Updated-04 Aug, 2024 | 21:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

UltraVNC revision 1211 contains multiple memory leaks (CWE-665) in VNC server code, which allows an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1212.

Action-Not Available
Vendor-uvncSiemens AGKaspersky Lab
Product-sinumerik_pcu_base_win10_software\/ipcultravncsinumerik_pcu_base_win7_software\/ipcsinumerik_access_mymachine\/p2pUltraVNC
CWE ID-CWE-665
Improper Initialization
CVE-2017-12739
Matching Score-6
Assigner-Siemens
ShareView Details
Matching Score-6
Assigner-Siemens
CVSS Score-9.8||CRITICAL
EPSS-3.14% / 86.35%
||
7 Day CHG~0.00%
Published-15 Nov, 2017 | 08:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Siemens SICAM RTUs SM-2556 COM Modules with the firmware variants ENOS00, ERAC00, ETA2, ETLS00, MODi00, and DNPi00. The integrated web server (port 80/tcp) of the affected devices could allow unauthenticated remote attackers to execute arbitrary code on the affected device.

Action-Not Available
Vendor-n/aSiemens AG
Product-sm-2556sm-2556_firmwareSiemens SICAM RTUs SM-2556 COM Modules with the firmware variants ENOS00, ERAC00, ETA2, ETLS00, MODi00, and DNPi00
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2019-15681
Matching Score-6
Assigner-Kaspersky
ShareView Details
Matching Score-6
Assigner-Kaspersky
CVSS Score-7.5||HIGH
EPSS-3.34% / 86.78%
||
7 Day CHG~0.00%
Published-29 Oct, 2019 | 16:04
Updated-05 Aug, 2024 | 00:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

LibVNC commit before d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a contains a memory leak (CWE-655) in VNC server code, which allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appear to be exploitable via network connectivity. These vulnerabilities have been fixed in commit d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a.

Action-Not Available
Vendor-libvnc_projectDebian GNU/LinuxSiemens AGCanonical Ltd.Kaspersky Lab
Product-simatic_itc1500_pro_firmwareubuntu_linuxdebian_linuxsimatic_itc1500_prosimatic_itc1500simatic_itc1900simatic_itc1900_firmwaresimatic_itc1900_pro_firmwaresimatic_itc1500_firmwaresimatic_itc2200_firmwaresimatic_itc2200_prosimatic_itc2200_pro_firmwarelibvncserversimatic_itc1900_prosimatic_itc2200LibVNC
CWE ID-CWE-665
Improper Initialization
CVE-2020-24507
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.10% / 27.43%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 18:47
Updated-04 Aug, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper initialization in a subsystem in the Intel(R) CSME versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32, 13.50.11 and 15.0.22 may allow a privileged user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel CorporationSiemens AG
Product-core_i7-7700kcore_i7-8705gcore_i7-8665uz270c627core_i3-8300tcore_i7-7660ucore_i7-8706gcore_i7-1068ng7core_i7-11700fcore_i7-1160g7core_i5-1035g7pentium_gold_g5420core_i7-10850hcore_i7-1185grecore_i7-11375hcore_i5-8400hcore_i7-8700core_i5-10400fc621aceleron_n6210core_i5-8400core_i5-7y54core_i3-10300core_i3-7100tcore_i7-7700tcore_i7-10700tcore_i3-1110g4core_i7-8086kceleron_4305ucore_i5-10210usimatic_ipc547g_firmwareceleron_n2815core_i5-8257ucore_i7-8700kcore_i5-10200hpentium_gold_g5400tpentium_gold_g6405tceleron_n2940q150core_i5-1035g4core_i3-8145ucore_i5-10400hceleron_4205uceleron_n5105core_i7-11700core_i5-7442eqcore_i3-10100ycore_i3-7020ucore_i5-10400tcore_i3-8109upentium_silver_n6000core_i7-11370hcore_i5-10310ucore_i7-7600ucore_i9-11900tcore_i9-11900kbcore_i5-10505c246core_i5-1030g7xeon_w-1270celeron_n4500core_i3-1000ng4core_i3-7100ecore_i5-11600tcore_i3-7300pentium_gold_4417ucore_i7-11850hcore_i9-11900core_i3-1000g1core_i7-10510ycore_i3-10110ucore_i7-11800hcore_i5_l16g7simatic_field_pg_m6_firmwarec625celeron_n3150simatic_ipc477eceleron_n4100celeron_n3060core_i5-10400simatic_ipc427e_firmwarexeon_w-1270tecore_i5-8400bcore_i7-7700hqcore_i5-1155g7core_i5-10500tecore_i3-10105fcore_i7-7820hkcore_i3-8100hpentium_gold_4415ypentium_gold_g5620core_i9-11950hxeon_w-1290tcore_i5-11600h110core_i5-10300hceleron_n4120pentium_gold_g6505tcore_i5-8350ucore_i9-10980hkcore_i5-7300uq270pentium_silver_a1030core_i7-11700tcore_i5-8600xeon_w-11855mcore_i5-8500tcore_i7-10510uceleron_n2840core_i5-7500core_i3-10100ecore_i5-1030ng7core_i3-8100core_i7-1060g7simatic_ipc527gcore_i9-11900hcore_i9-10900celeron_n2930celeron_n2910h410pentium_gold_g6500txeon_w-10855mcore_i5-7200ucore_i9-11900kcore_i3-10100tsimatic_ipc847e_firmwarecore_i9-8950hksimatic_ipc527g_firmwarecore_i9-10900ecore_i7-7700simatic_field_pg_m5core_i9-10850kcore_i9-10900kcore_i7-7920hqcore_i3-7102eh270core_i5-8600ksimatic_ipc477e_firmwareq470core_i9-10900fpentium_gold_g6400tcore_i5-8400tpentium_gold_g5600tsimatic_field_pg_m6xeon_w-1270pcore_i7-8750hcore_i7-10700simatic_ipc477e_procore_i5-8365ub150celeron_n3160core_i3-10100tecore_i9-10910core_i5-7600simatic_ipc647ecore_i3-10105txeon_w-1250ecore_i7-10700fcore_i9-10885hcore_i5-11400tpentium_silver_n5000core_i5-11300hcore_i9-11900kfcore_i3-10325celeron_n4000ccore_i3-1125g4core_i5-1145g7core_i7-10750hq470ecore_i3-7100hcore_i3-8300core_i3-1000g4core_i5-7400tcore_i7-10875hq370core_i3-7100core_i7-8809gcore_i3-8145uecore_i5-7260ucore_i7-8700bcore_i7-8709gsimatic_ipc627ecore_i3-10100pentium_gold_g6505core_i5-7267uxeon_w-1250pcore_i3-1115g4celeron_6305core_i3-8100tceleron_n4505core_i3-8121uh170core_i5-10210yh310core_i5-1140g7core_i7-8557ucore_i5-10500esimatic_ipc547gcore_i7-8700tsimatic_ipc477e_pro_firmwarecore_i5-8300hcore_i5-10600tcore_m3-7y32core_i3-10110ycore_i5-7400core_i5-10600kfcore_i7-8650ucore_i5-11400fc629acore_i7-10700ecore_i5-1145grecore_i3-7320core_i7-1180g7c242pentium_gold_4410ycore_i5-11600kfz370pentium_gold_g5500tcore_i7-11700kfcore_i7-10870hpentium_gold_4415uw480core_i5-1035g1pentium_silver_n5030core_i5-1038ng7h420ecore_i5-11500bz170c624mobile_cm246simatic_ipc647e_firmwarex299pentium_gold_6405uceleron_n3350simatic_ipc627e_firmwarecore_i5-8500bc627acore_i7-10700kcore_i5-11500tc622core_i7-1185g7core_i7-1165g7celeron_n3050core_i7-1195g7core_i5-8269uceleron_n5095pentium_silver_j5005core_i5-11600kcore_i7-11390hcore_i5-1030g4core_i7-10700teceleron_n3000celeron_n2807core_i5-10500core_i7-11700kcore_i7-10710ucore_i5-7287ucore_i7-10700kfcore_i5-7440eqh370xeon_w-1250texeon_w-1250core_i5-8279uw480exeon_w-1290ecore_i3-7100ucore_i7-8565ucore_i3-7101tecore_i3-7350kcore_i5-11400hcore_i7-11700bcore_i5-7600kcore_i5-8250ucore_i3-10305celeron_n2820b365core_i5-7300hqcore_i7-7560uxeon_w-1270epentium_gold_g5420tcore_i7-7820eqcore_i9-11900fcore_i5-8259ucore_i5-7360uceleron_n2805celeron_n2806core_i9-11980hkpentium_gold_g5500core_i5-10600kceleron_4305uesimatic_ipc847ecore_i3-8140usimatic_ipc427ecore_m3-8100ycore_i9-10900kfcore_i3-10105core_i3-11100bq170b460simatic_itp1000_firmwarecore_i5-1130g7celeron_n3350ecore_i3-1120g4core_i5-7600tcore_i7-1060ng7core_i7-7500ucore_i7-8550ucore_i5-10310yxeon_w-1290pceleron_n3010core_i5-10500hcore_i5-8260uceleron_n2808core_i5-11320hpentium_gold_4425yb250core_i7-10810upentium_gold_g6500core_i3-1115grecore_i7-8850hcore_i5-11500hcore_i3-7130ucore_i7-10610usimatic_itp1000xeon_w-11955mcore_i3-10100fcore_i3-7167upentium_gold_g6400ecore_i7-8500ycore_i7-7567uceleron_n2920c629pentium_gold_7505b360core_i5-10600c621core_i5-11260hsimatic_field_pg_m5_firmwarecore_i3-1115g4epentium_silver_n6005pentium_gold_g6400core_i7-7820hqcore_i5-8210ycore_m3-7y30celeron_n6211core_i3-7300tcore_i5-8365uecore_i7-8665uexeon_w-1290celeron_n4000celeron_n2830celeron_6305ecore_i5-1145g7exeon_w-10885mcore_i3-10320core_i9-10900tcore_i5-8200ypentium_gold_g5400simatic_ipc677ecore_i3-10300tcore_i3-7101ecore_i5-8310yceleron_n3450celeron_n5100xeon_w-1290tecore_i5-1135g7core_i5-11500celeron_n4020core_i5-8500c626core_i5-7440hqpentium_gold_g6600celeron_n2810core_i7-8569uq250z490core_i5-8265ucore_i5-10500tpentium_gold_g6605core_i7-1185g7econverged_security_and_manageability_enginecore_i3_l13g4pentium_gold_5405ucore_i7-7y75core_i3-1005g1celeron_n4020cpentium_gold_g6405core_i3-8100bcore_i5-7y57simatic_ipc677e_firmwarecore_i3-10305tcore_i3-8350kcore_i5-11400core_i5-8600tcore_i5-7500tpentium_silver_j5040core_i5-8305gcore_i7-1065g7core_i7-8559ucore_i9-10900tepentium_gold_g6400tez390core_i3-8130uc420h470pentium_gold_6500yc628pentium_gold_g5600Intel(R) CSME versions
CWE ID-CWE-665
Improper Initialization
CVE-2025-25271
Matching Score-4
Assigner-CERT@VDE
ShareView Details
Matching Score-4
Assigner-CERT@VDE
CVSS Score-8.8||HIGH
EPSS-0.04% / 10.65%
||
7 Day CHG~0.00%
Published-08 Jul, 2025 | 07:01
Updated-22 Jul, 2025 | 07:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OCPP Backend Configuration via Insecure Defaults

An unauthenticated adjacent attacker is able to configure a new OCPP backend, due to insecure defaults for the configuration interface.

Action-Not Available
Vendor-Phoenix Contact GmbH & Co. KG
Product-charx_sec-3100charx_sec-3150charx_sec-3050_firmwarecharx_sec-3050charx_sec-3100_firmwarecharx_sec-3150_firmwarecharx_sec-3000_firmwarecharx_sec-3000CHARX SEC-3100CHARX SEC-3150CHARX SEC-3000CHARX SEC-3050
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2017-12262
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-8.8||HIGH
EPSS-0.60% / 68.53%
||
7 Day CHG~0.00%
Published-02 Nov, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability within the firewall configuration of the Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) could allow an unauthenticated, adjacent attacker to gain privileged access to services only available on the internal network of the device. The vulnerability is due to an incorrect firewall rule on the device. The misconfiguration could allow traffic sent to the public interface of the device to be forwarded to the internal virtual network of the APIC-EM. An attacker that is logically adjacent to the network on which the public interface of the affected APIC-EM resides could leverage this behavior to gain access to services listening on the internal network with elevated privileges. This vulnerability affects appliances or virtual devices running Cisco Application Policy Infrastructure Controller Enterprise Module prior to version 1.5. Cisco Bug IDs: CSCve89638.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-application_policy_infrastructure_controller_enterprise_moduleCisco Application Policy Infrastructure Controller Enterprise Module
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-665
Improper Initialization
CVE-2018-17906
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-8.8||HIGH
EPSS-0.43% / 61.72%
||
7 Day CHG~0.00%
Published-19 Nov, 2018 | 20:00
Updated-05 Aug, 2024 | 11:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Philips iSite and IntelliSpace PACS, iSite PACS, all versions, and IntelliSpace PACS, all versions. Default credentials and no authentication within third party software may allow an attacker to compromise a component of the system.

Action-Not Available
Vendor-n/aPhilips
Product-intellispace_pacsisite_pacsPhilips iSite and IntelliSpace PACS
CWE ID-CWE-521
Weak Password Requirements
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CWE ID-CWE-306
Missing Authentication for Critical Function
Details not found