cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-50572,https://securityvulnerability.io/vulnerability/CVE-2024-50572,RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) and other products remote code execution vulnerability,"A newly identified vulnerability affects several Siemens products, including the RUGGEDCOM RM1224 LTE and various SCALANCE routers. This vulnerability occurs due to improper sanitization of an input field, which may permit an authenticated remote attacker with administrative privileges to execute arbitrary code or gain access to a system root shell. Organizations utilizing vulnerable devices are advised to implement corrective measures promptly to mitigate potential exploitation.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M874-3 3g-router (cn),Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (a1),Scalance Mum853-1 (b1),Scalance Mum853-1 (eu),Scalance Mum856-1 (a1),Scalance Mum856-1 (b1),Scalance Mum856-1 (cn),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router",7.2,HIGH,0.0004799999878741801,false,,false,false,false,,false,false,2024-11-12T12:50:08.911Z,0 CVE-2024-50561,https://securityvulnerability.io/vulnerability/CVE-2024-50561,SCALANCE Mxx6-x ADSL-Router vulnerable to file sanitization attack,"A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2). Affected devices do not properly sanitize the filenames before uploading. This could allow an authenticated remote attacker to compromise of integrity of the system.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M874-3 3g-router (cn),Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (a1),Scalance Mum853-1 (b1),Scalance Mum853-1 (eu),Scalance Mum856-1 (a1),Scalance Mum856-1 (b1),Scalance Mum856-1 (cn),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router",6.1,MEDIUM,0.0004600000102072954,false,,false,false,false,,false,false,2024-11-12T12:50:06.660Z,0 CVE-2024-50560,https://securityvulnerability.io/vulnerability/CVE-2024-50560,"{""{\""name\"":\""Affected devices truncates usernames longer than 15 characters when accessed via SSH or Telnet\"",\""versions\"":[\""< V8.2\""]}""}","A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2). Affected devices truncates usernames longer than 15 characters when accessed via SSH or Telnet. This could allow an attacker to compromise system integrity.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M874-3 3g-router (cn),Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (a1),Scalance Mum853-1 (b1),Scalance Mum853-1 (eu),Scalance Mum856-1 (a1),Scalance Mum856-1 (b1),Scalance Mum856-1 (cn),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router",4.3,MEDIUM,0.00044999999227002263,false,,false,false,false,,false,false,2024-11-12T12:50:04.034Z,0 CVE-2024-50559,https://securityvulnerability.io/vulnerability/CVE-2024-50559,Siemens SCALANCE Products Vulnerability,"A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2). Affected devices do not properly validate the filenames of the certificate. This could allow an authenticated remote attacker to append arbitrary values which will lead to compromise of integrity of the system.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M874-3 3g-router (cn),Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (a1),Scalance Mum853-1 (b1),Scalance Mum853-1 (eu),Scalance Mum856-1 (a1),Scalance Mum856-1 (b1),Scalance Mum856-1 (cn),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router",4.3,MEDIUM,0.0004600000102072954,false,,false,false,false,,false,false,2024-11-12T12:50:01.376Z,0 CVE-2024-50558,https://securityvulnerability.io/vulnerability/CVE-2024-50558,Vulnerability in RUGGEDCOM RM1224 LTE(4G) Devices Could Lead to Denial of Service,"A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2). Affected devices improperly manage access control for read-only users. This could allow an attacker to cause a temporary denial of service condition.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M874-3 3g-router (cn),Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (a1),Scalance Mum853-1 (b1),Scalance Mum853-1 (eu),Scalance Mum856-1 (a1),Scalance Mum856-1 (b1),Scalance Mum856-1 (cn),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router",4.3,MEDIUM,0.0004400000034365803,false,,false,false,false,,false,false,2024-11-12T12:49:58.734Z,0 CVE-2024-50557,https://securityvulnerability.io/vulnerability/CVE-2024-50557,Input Validation Vulnerability in iperf Functionality Could Allow Arbitrary Code Execution,"A significant input validation issue has been discovered in various RUGGEDCOM RM1224 and SCALANCE M-series devices produced by Siemens. The flaw resides in the configuration fields related to the iperf functionality, which do not validate inputs properly. This oversight could enable an unauthorized remote attacker to execute arbitrary code on the affected devices, presenting serious security concerns for networks using these products. Immediate action is recommended to mitigate potential exploits.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M874-3 3g-router (cn),Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (a1),Scalance Mum853-1 (b1),Scalance Mum853-1 (eu),Scalance Mum856-1 (a1),Scalance Mum856-1 (b1),Scalance Mum856-1 (cn),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router",9.8,CRITICAL,0.0007600000244565308,false,,false,false,false,,false,false,2024-11-12T12:49:56.426Z,0 CVE-2024-41978,https://securityvulnerability.io/vulnerability/CVE-2024-41978,SCALANCE M804PB Faces Vulnerability in 2FA Log File Injection,"A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.1), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.1), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.1), SCALANCE M812-1 ADSL-Router family (All versions < V8.1), SCALANCE M816-1 ADSL-Router family (All versions < V8.1), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.1), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.1), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.1), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.1), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.1), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.1), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.1), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.1), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.1), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.1), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.1), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.1), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.1), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.1), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.1), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.1), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.1), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.1), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.1). Affected devices insert sensitive information about the generation of 2FA tokens into log files. This could allow an authenticated remote attacker to forge 2FA tokens of other users.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router Family,Scalance M816-1 Adsl-router Family,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M874-3 3g-router (cn),Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (a1),Scalance Mum853-1 (b1),Scalance Mum853-1 (eu),Scalance Mum856-1 (a1),Scalance Mum856-1 (b1),Scalance Mum856-1 (cn),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router",6.5,MEDIUM,0.0004799999878741801,false,,false,false,false,,false,false,2024-08-13T07:54:39.417Z,0 CVE-2024-41977,https://securityvulnerability.io/vulnerability/CVE-2024-41977,Devices vulnerable to attack through web server component,"A significant vulnerability has been discovered that affects multiple Siemens RUGGEDCOM and SCALANCE devices. The devices fail to enforce proper isolation between user sessions in their web server component. This oversight could potentially allow an authenticated remote attacker to escalate their privileges, thereby gaining unauthorized access to sensitive information or executing harmful commands on the affected devices. As a precaution, users are urged to update their systems to version 8.1 or later to mitigate this risk.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router Family,Scalance M816-1 Adsl-router Family,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M874-3 3g-router (cn),Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (a1),Scalance Mum853-1 (b1),Scalance Mum853-1 (eu),Scalance Mum856-1 (a1),Scalance Mum856-1 (b1),Scalance Mum856-1 (cn),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router",8,HIGH,0.0004900000058114529,false,,false,false,false,,false,false,2024-08-13T07:54:37.591Z,0 CVE-2024-41976,https://securityvulnerability.io/vulnerability/CVE-2024-41976,SCALANCE M874-3 VPN Router Vulnerability,"A notable security vulnerability affects several RUGGEDCOM and SCALANCE devices due to improper validation of input in specific VPN configuration fields. This security flaw allows an authenticated remote attacker to potentially execute arbitrary code on the affected devices, posing serious risk to network integrity and device functionality. Users of the RUGGEDCOM RM1224 LTE and SCALANCE product lines, particularly those operating on firmware version earlier than V8.1, should take immediate action to secure their systems against potential exploitation. Remedial updates and best practices for network security are recommended to mitigate any associated threats.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router Family,Scalance M816-1 Adsl-router Family,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M874-3 3g-router (cn),Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (a1),Scalance Mum853-1 (b1),Scalance Mum853-1 (eu),Scalance Mum856-1 (a1),Scalance Mum856-1 (b1),Scalance Mum856-1 (cn),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router",8.8,HIGH,0.00046999999904073775,false,,false,false,false,,false,false,2024-08-13T07:54:35.837Z,0 CVE-2023-49691,https://securityvulnerability.io/vulnerability/CVE-2023-49691,Improper Neutralization of Special Elements in DDNS Configuration Vulnerability in Siemens Devices,"An improper neutralization flaw in the handling of Dynamic DNS (DDNS) configuration can allow a malicious local administrator to execute arbitrary commands with root privileges following a successful IP address update. This vulnerability can potentially compromise the integrity and security of the affected Siemens devices, making it critical for users to apply available security updates and mitigate any risks associated with this vulnerability.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (eu),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router",6.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,2023-12-12T12:15:00.000Z,0 CVE-2023-49692,https://securityvulnerability.io/vulnerability/CVE-2023-49692,Improper Neutralization Vulnerability in Siemens RUGGEDCOM and SCALANCE Products,"A notable vulnerability has been discovered in Siemens' RUGGEDCOM and SCALANCE product lines, specifically impacting versions below V7.2.2. This security flaw is related to the improper handling of special elements during the parsing of IPSEC configurations. As a result, malicious local administrators may exploit this vulnerability to execute arbitrary commands at the system level following the establishment of a new connection. This could lead to significant breaches of security and unauthorized access to sensitive system functions.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (eu),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router",6.7,MEDIUM,0.0004600000102072954,false,,false,false,false,,false,false,2023-12-12T12:15:00.000Z,0 CVE-2023-44319,https://securityvulnerability.io/vulnerability/CVE-2023-44319,Weak Checksum Algorithm in Siemens Networking Products,"Siemens devices in the RUGGEDCOM and SCALANCE series are susceptible to a security issue involving a weak checksum algorithm used for configuration backups. This flaw allows an authenticated attacker with administrative privileges, or an attacker who misleads a legitimate administrator, to upload a modified configuration file. Such an action can lead to significant alterations in the device's configuration and operational behavior, potentially compromising network integrity and security.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (eu),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router,Scalance Wab762-1,Scalance Wam763-1,Scalance Wam763-1 (me),Scalance Wam763-1 (us),Scalance Wam766-1 (eu),Scalance Wam766-1 (me),Scalance Wam766-1 (us),Scalance Wam766-1 Eec (eu),Scalance Wam766-1 Eec (me),Scalance Wam766-1 Eec (us),Scalance Wub762-1,Scalance Wum763-1,Scalance Wum763-1 (us),Scalance Wum766-1 (eu),Scalance Wum766-1 (me),Scalance Wum766-1 (us)",4.9,MEDIUM,0.0011899999808520079,false,,false,false,false,,false,false,2023-11-14T11:15:00.000Z,0 CVE-2023-44317,https://securityvulnerability.io/vulnerability/CVE-2023-44317,Code Execution Vulnerability in RUGGEDCOM and SCALANCE Products,"This vulnerability affects a range of Siemens RUGGEDCOM and SCALANCE products due to improper validation of uploaded X509 certificates. Attackers who possess administrative privileges might exploit this flaw, allowing them to execute arbitrary code on the targeted devices. With various products identified, users are urged to review their system versions and apply necessary updates to mitigate potential risks associated with this vulnerability.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (eu),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router,Scalance Wab762-1,Scalance Wam763-1,Scalance Wam763-1 (me),Scalance Wam763-1 (us),Scalance Wam766-1 (eu),Scalance Wam766-1 (me),Scalance Wam766-1 (us),Scalance Wam766-1 Eec (eu),Scalance Wam766-1 Eec (me),Scalance Wam766-1 Eec (us),Scalance Wub762-1,Scalance Wum763-1,Scalance Wum763-1 (us),Scalance Wum766-1 (eu),Scalance Wum766-1 (me),Scalance Wum766-1 (us)",7.2,HIGH,0.00044999999227002263,false,,false,false,false,,false,false,2023-11-14T11:15:00.000Z,0 CVE-2023-44374,https://securityvulnerability.io/vulnerability/CVE-2023-44374,Password Change Vulnerability in Siemens RUGGEDCOM and SCALANCE Products,"A vulnerability in certain Siemens RUGGEDCOM RM1224 LTE and SCALANCE products allows authenticated attackers to change the passwords of other users, including potential administrator accounts. This flaw arises due to insufficient checks when changing passwords, which creates opportunities for privilege escalation. Organizations using affected products should evaluate their security measures and apply necessary patches to mitigate the risks associated with this vulnerability.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (eu),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router,Scalance Wab762-1,Scalance Wam763-1,Scalance Wam763-1 (me),Scalance Wam763-1 (us),Scalance Wam766-1 (eu),Scalance Wam766-1 (me),Scalance Wam766-1 (us),Scalance Wam766-1 Eec (eu),Scalance Wam766-1 Eec (me),Scalance Wam766-1 Eec (us),Scalance Wub762-1,Scalance Wum763-1,Scalance Wum763-1 (us),Scalance Wum766-1 (eu),Scalance Wum766-1 (me),Scalance Wum766-1 (us)",8.8,HIGH,0.0013800000306218863,false,,false,false,false,,false,false,2023-11-14T11:15:00.000Z,0 CVE-2023-44318,https://securityvulnerability.io/vulnerability/CVE-2023-44318,Configuration Backup Exposure in Siemens Products,"This vulnerability allows an authenticated attacker or anyone with access to an exported configuration backup to potentially exploit a hardcoded key, revealing sensitive configuration details. This poses a significant risk as it may lead to unauthorized changes or further exploitation of the affected devices. The issue underscores the importance of reviewing security practices around sensitive data handling within operational technology environments.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (eu),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router,Scalance Wab762-1,Scalance Wam763-1,Scalance Wam763-1 (me),Scalance Wam763-1 (us),Scalance Wam766-1 (eu),Scalance Wam766-1 (me),Scalance Wam766-1 (us),Scalance Wam766-1 Eec (eu),Scalance Wam766-1 Eec (me),Scalance Wam766-1 Eec (us),Scalance Wub762-1,Scalance Wum763-1,Scalance Wum763-1 (us),Scalance Wum766-1 (eu),Scalance Wum766-1 (me),Scalance Wum766-1 (us),Scalance Xb205-3 (sc, Pn),Scalance Xb205-3 (st, E/ip),Scalance Xb205-3 (st, Pn),Scalance Xb205-3ld (sc, E/ip),Scalance Xb205-3ld (sc, Pn),Scalance Xb208 (e/ip),Scalance Xb208 (pn),Scalance Xb213-3 (sc, E/ip),Scalance Xb213-3 (sc, Pn),Scalance Xb213-3 (st, E/ip),Scalance Xb213-3 (st, Pn),Scalance Xb213-3ld (sc, E/ip),Scalance Xb213-3ld (sc, Pn),Scalance Xb216 (e/ip),Scalance Xb216 (pn),Scalance Xc206-2 (sc),Scalance Xc206-2 (st/bfoc),Scalance Xc206-2g Poe,Scalance Xc206-2g Poe (54 V Dc),Scalance Xc206-2g Poe Eec (54 V Dc),Scalance Xc206-2sfp,Scalance Xc206-2sfp Eec,Scalance Xc206-2sfp G,Scalance Xc206-2sfp G (eip Def.),Scalance Xc206-2sfp G Eec,Scalance Xc208,Scalance Xc208eec,Scalance Xc208g,Scalance Xc208g (eip Def.),Scalance Xc208g Eec,Scalance Xc208g Poe,Scalance Xc208g Poe (54 V Dc),Scalance Xc216,Scalance Xc216-3g Poe,Scalance Xc216-3g Poe (54 V Dc),Scalance Xc216-4c,Scalance Xc216-4c G,Scalance Xc216-4c G (eip Def.),Scalance Xc216-4c G Eec,Scalance Xc216eec,Scalance Xc224,Scalance Xc224-4c G,Scalance Xc224-4c G (eip Def.),Scalance Xc224-4c G Eec,Scalance Xf204,Scalance Xf204 Dna,Scalance Xf204-2ba,Scalance Xf204-2ba Dna,Scalance Xp208,Scalance Xp208 (ethernet/ip),Scalance Xp208eec,Scalance Xp208poe Eec,Scalance Xp216,Scalance Xp216 (ethernet/ip),Scalance Xp216eec,Scalance Xp216poe Eec,Scalance Xr324wg (24 X Fe, Ac 230v),Scalance Xr324wg (24 X Fe, Dc 24v),Scalance Xr326-2c Poe Wg,Scalance Xr326-2c Poe Wg (without Ul),Scalance Xr328-4c Wg (24xfe, 4xge, 24v),Scalance Xr328-4c Wg (24xfe, 4xge,dc24v),Scalance Xr328-4c Wg (24xfe,4xge,ac230v),Scalance Xr328-4c Wg (28xge, Ac 230v),Scalance Xr328-4c Wg (28xge, Dc 24v),Siplus Net Scalance Xc206-2,Siplus Net Scalance Xc206-2sfp,Siplus Net Scalance Xc208,Siplus Net Scalance Xc216-4c",4.9,MEDIUM,0.0009399999980814755,false,,false,false,false,,false,false,2023-11-14T11:15:00.000Z,0 CVE-2023-44320,https://securityvulnerability.io/vulnerability/CVE-2023-44320,Authentication Bypass in Siemens RUGGEDCOM and SCALANCE Products,"A vulnerability exists in multiple Siemens RUGGEDCOM and SCALANCE products that allows an authenticated attacker to manipulate the web interface. Improper validation of the authentication process during specific administrative modifications enables unauthorized influence over the user configuration interface. This could allow attackers to modify settings or display false information, potentially leading to further exploitations within the network.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (eu),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router",4.3,MEDIUM,0.0010499999625608325,false,,false,false,false,,false,false,2023-11-14T11:15:00.000Z,0 CVE-2023-44321,https://securityvulnerability.io/vulnerability/CVE-2023-44321,Denial of Service Risk in Siemens Configuration Interfaces,"Certain Siemens devices exhibit improper input validation during configuration changes in their web interface. This vulnerability allows authenticated attackers to exploit the input length checks, potentially leading to a denial of service condition. As a result of this vulnerability, access to the web interface may become unavailable, requiring the device to be restarted to regain access. Organizations using affected Siemens devices should take immediate action to apply mitigations and ensure network security.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router Family,Scalance M816-1 Adsl-router Family,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M874-3 3g-router (cn),Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (a1),Scalance Mum853-1 (b1),Scalance Mum853-1 (eu),Scalance Mum856-1 (a1),Scalance Mum856-1 (b1),Scalance Mum856-1 (cn),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router,Scalance Xb205-3 (sc, Pn),Scalance Xb205-3 (st, E/ip),Scalance Xb205-3 (st, Pn),Scalance Xb205-3ld (sc, E/ip),Scalance Xb205-3ld (sc, Pn),Scalance Xb208 (e/ip),Scalance Xb208 (pn),Scalance Xb213-3 (sc, E/ip),Scalance Xb213-3 (sc, Pn),Scalance Xb213-3 (st, E/ip),Scalance Xb213-3 (st, Pn),Scalance Xb213-3ld (sc, E/ip),Scalance Xb213-3ld (sc, Pn),Scalance Xb216 (e/ip),Scalance Xb216 (pn),Scalance Xc206-2 (sc),Scalance Xc206-2 (st/bfoc),Scalance Xc206-2g Poe,Scalance Xc206-2g Poe (54 V Dc),Scalance Xc206-2g Poe Eec (54 V Dc),Scalance Xc206-2sfp,Scalance Xc206-2sfp Eec,Scalance Xc206-2sfp G,Scalance Xc206-2sfp G (eip Def.),Scalance Xc206-2sfp G Eec,Scalance Xc208,Scalance Xc208eec,Scalance Xc208g,Scalance Xc208g (eip Def.),Scalance Xc208g Eec,Scalance Xc208g Poe,Scalance Xc208g Poe (54 V Dc),Scalance Xc216,Scalance Xc216-3g Poe,Scalance Xc216-3g Poe (54 V Dc),Scalance Xc216-4c,Scalance Xc216-4c G,Scalance Xc216-4c G (eip Def.),Scalance Xc216-4c G Eec,Scalance Xc216eec,Scalance Xc224,Scalance Xc224-4c G,Scalance Xc224-4c G (eip Def.),Scalance Xc224-4c G Eec,Scalance Xf204,Scalance Xf204 Dna,Scalance Xf204-2ba,Scalance Xf204-2ba Dna,Scalance Xp208,Scalance Xp208 (ethernet/ip),Scalance Xp208eec,Scalance Xp208poe Eec,Scalance Xp216,Scalance Xp216 (ethernet/ip),Scalance Xp216eec,Scalance Xp216poe Eec,Scalance Xr324wg (24 X Fe, Ac 230v),Scalance Xr324wg (24 X Fe, Dc 24v),Scalance Xr326-2c Poe Wg,Scalance Xr326-2c Poe Wg (without Ul),Scalance Xr328-4c Wg (24xfe, 4xge, 24v),Scalance Xr328-4c Wg (24xfe, 4xge,dc24v),Scalance Xr328-4c Wg (24xfe,4xge,ac230v),Scalance Xr328-4c Wg (28xge, Ac 230v),Scalance Xr328-4c Wg (28xge, Dc 24v),Siplus Net Scalance Xc206-2,Siplus Net Scalance Xc206-2sfp,Siplus Net Scalance Xc208,Siplus Net Scalance Xc216-4c",6.5,MEDIUM,0.0020200000144541264,false,,false,false,false,,false,false,2023-11-14T11:15:00.000Z,0 CVE-2023-44322,https://securityvulnerability.io/vulnerability/CVE-2023-44322,Email Disruption Vulnerability in Siemens Ruggedcom and Scalance Products,"A vulnerability found in Siemens RUGGEDCOM and SCALANCE products allows attackers with network access to disrupt email notifications. When the affected devices receive an invalid response from the SMTP server, an error is triggered which disrupts email communication. This failure can result in users not being notified of critical events, posing a risk to operational security.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (eu),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router",5.9,MEDIUM,0.00107999995816499,false,,false,false,false,,false,false,2023-11-14T11:15:00.000Z,0 CVE-2023-44373,https://securityvulnerability.io/vulnerability/CVE-2023-44373,Input Sanitization Flaw in RUGGEDCOM and SCALANCE Devices by Siemens,"The identified flaw in Siemens' RUGGEDCOM and SCALANCE devices involves inadequate sanitization of an input field. This vulnerability permits authenticated remote attackers with administrative access to execute arbitrary code or launch a system root shell, thereby compromising the integrity and security of the affected systems. Users are advised to update to the latest firmware versions to mitigate potential security risks associated with this vulnerability.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (eu),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router,Scalance Wab762-1,Scalance Wam763-1,Scalance Wam763-1 (me),Scalance Wam763-1 (us),Scalance Wam766-1 (eu),Scalance Wam766-1 (me),Scalance Wam766-1 (us),Scalance Wam766-1 Eec (eu),Scalance Wam766-1 Eec (me),Scalance Wam766-1 Eec (us),Scalance Wub762-1,Scalance Wum763-1,Scalance Wum763-1 (us),Scalance Wum766-1 (eu),Scalance Wum766-1 (me),Scalance Wum766-1 (us)",9.1,CRITICAL,0.0008099999977275729,false,,false,false,false,,false,false,2023-11-14T11:15:00.000Z,0 CVE-2022-46142,https://securityvulnerability.io/vulnerability/CVE-2022-46142,Exposure of Encrypted Passwords in Siemens Devices,"A security vulnerability exists in Siemens devices that allows attackers with physical access to extract and decrypt CLI user passwords stored in flash memory. This could lead to unauthorized access to device management functions, highlighting the importance of securing physical access to devices.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router (annex A),Scalance M812-1 Adsl-router (annex B),Scalance M816-1 Adsl-router (annex A),Scalance M816-1 Adsl-router (annex B),Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M876-3 (evdo),Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (eu),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615,Scalance S615 Eec,Scalance Sc622-2c,Scalance Sc626-2c,Scalance Sc632-2c,Scalance Sc636-2c,Scalance Sc642-2c,Scalance Sc646-2c,Scalance W1748-1 M12,Scalance W1788-1 M12,Scalance W1788-2 Eec M12,Scalance W1788-2 M12,Scalance W1788-2ia M12,Scalance W721-1 Rj45,Scalance W722-1 Rj45,Scalance W734-1 Rj45,Scalance W734-1 Rj45 (usa),Scalance W738-1 M12,Scalance W748-1 M12,Scalance W748-1 Rj45,Scalance W761-1 Rj45,Scalance W774-1 M12 Eec,Scalance W774-1 Rj45,Scalance W774-1 Rj45 (usa),Scalance W778-1 M12,Scalance W778-1 M12 Eec,Scalance W778-1 M12 Eec (usa),Scalance W786-1 Rj45,Scalance W786-2 Rj45,Scalance W786-2 Sfp,Scalance W786-2ia Rj45,Scalance W788-1 M12,Scalance W788-1 Rj45,Scalance W788-2 M12,Scalance W788-2 M12 Eec,Scalance W788-2 Rj45,Scalance Wam763-1,Scalance Wam766-1 (eu),Scalance Wam766-1 (us),Scalance Wam766-1 6ghz,Scalance Wam766-1 Eec (eu),Scalance Wam766-1 Eec (us),Scalance Wam766-1 Eec 6ghz,Scalance Wum763-1,Scalance Wum766-1 (eu),Scalance Wum766-1 (us),Scalance Wum766-1 6ghz,Scalance Xb205-3 (sc, Pn),Scalance Xb205-3 (st, E/ip),Scalance Xb205-3 (st, Pn),Scalance Xb205-3ld (sc, E/ip),Scalance Xb205-3ld (sc, Pn),Scalance Xb208 (e/ip),Scalance Xb208 (pn),Scalance Xb213-3 (sc, E/ip),Scalance Xb213-3 (sc, Pn),Scalance Xb213-3 (st, E/ip),Scalance Xb213-3 (st, Pn),Scalance Xb213-3ld (sc, E/ip),Scalance Xb213-3ld (sc, Pn),Scalance Xb216 (e/ip),Scalance Xb216 (pn),Scalance Xc206-2 (sc),Scalance Xc206-2 (st/bfoc),Scalance Xc206-2g Poe,Scalance Xc206-2g Poe (54 V Dc),Scalance Xc206-2g Poe Eec (54 V Dc),Scalance Xc206-2sfp,Scalance Xc206-2sfp Eec,Scalance Xc206-2sfp G,Scalance Xc206-2sfp G (eip Def.),Scalance Xc206-2sfp G Eec,Scalance Xc208,Scalance Xc208eec,Scalance Xc208g,Scalance Xc208g (eip Def.),Scalance Xc208g Eec,Scalance Xc208g Poe,Scalance Xc208g Poe (54 V Dc),Scalance Xc216,Scalance Xc216-3g Poe,Scalance Xc216-3g Poe (54 V Dc),Scalance Xc216-4c,Scalance Xc216-4c G,Scalance Xc216-4c G (eip Def.),Scalance Xc216-4c G Eec,Scalance Xc216eec,Scalance Xc224,Scalance Xc224-4c G,Scalance Xc224-4c G (eip Def.),Scalance Xc224-4c G Eec,Scalance Xf204,Scalance Xf204 Dna,Scalance Xf204-2ba,Scalance Xf204-2ba Dna,Scalance Xm408-4c,Scalance Xm408-4c (l3 Int.),Scalance Xm408-8c,Scalance Xm408-8c (l3 Int.),Scalance Xm416-4c,Scalance Xm416-4c (l3 Int.),Scalance Xp208,Scalance Xp208 (ethernet/ip),Scalance Xp208eec,Scalance Xp208poe Eec,Scalance Xp216,Scalance Xp216 (ethernet/ip),Scalance Xp216eec,Scalance Xp216poe Eec,Scalance Xr324wg (24 X Fe, Ac 230v),Scalance Xr324wg (24 X Fe, Dc 24v),Scalance Xr326-2c Poe Wg,Scalance Xr326-2c Poe Wg (without Ul),Scalance Xr328-4c Wg (24xfe, 4xge, 24v),Scalance Xr328-4c Wg (24xfe, 4xge,dc24v),Scalance Xr328-4c Wg (24xfe,4xge,ac230v),Scalance Xr328-4c Wg (28xge, Ac 230v),Scalance Xr328-4c Wg (28xge, Dc 24v),Scalance Xr524-8c, 1x230v,Scalance Xr524-8c, 1x230v (l3 Int.),Scalance Xr524-8c, 24v,Scalance Xr524-8c, 24v (l3 Int.),Scalance Xr524-8c, 2x230v,Scalance Xr524-8c, 2x230v (l3 Int.),Scalance Xr526-8c, 1x230v,Scalance Xr526-8c, 1x230v (l3 Int.),Scalance Xr526-8c, 24v,Scalance Xr526-8c, 24v (l3 Int.),Scalance Xr526-8c, 2x230v,Scalance Xr526-8c, 2x230v (l3 Int.),Scalance Xr528-6m,Scalance Xr528-6m (2hr2, L3 Int.),Scalance Xr528-6m (2hr2),Scalance Xr528-6m (l3 Int.),Scalance Xr552-12m,Scalance Xr552-12m (2hr2, L3 Int.),Scalance Xr552-12m (2hr2),Siplus Net Scalance Xc206-2,Siplus Net Scalance Xc206-2sfp,Siplus Net Scalance Xc208,Siplus Net Scalance Xc216-4c",5.7,MEDIUM,0.0004400000034365803,false,,false,false,false,,false,false,2022-12-13T00:00:00.000Z,0 CVE-2022-46140,https://securityvulnerability.io/vulnerability/CVE-2022-46140,Weak Encryption Flaw in Siemens Devices Affects System Debugging,"The vulnerability arises in Siemens devices that employ a weak encryption scheme to protect debug zip files. This flaw may permit an authenticated attacker to decrypt the file’s contents, potentially exposing sensitive debug information about the system. Such information could be leveraged to exploit other vulnerabilities or gain unauthorized access. It is essential for users to apply necessary updates and review encryption practices to safeguard their systems effectively.",Siemens,"RUGGEDCOM RM1224 LTE(4G) EU,RUGGEDCOM RM1224 LTE(4G) NAM,SCALANCE M804PB,SCALANCE M812-1 ADSL-Router (Annex A),SCALANCE M812-1 ADSL-Router (Annex B),SCALANCE M816-1 ADSL-Router (Annex A),SCALANCE M816-1 ADSL-Router (Annex B),SCALANCE M826-2 SHDSL-Router,SCALANCE M874-2,SCALANCE M874-3,SCALANCE M876-3 (EVDO),SCALANCE M876-3 (ROK),SCALANCE M876-4,SCALANCE M876-4 (EU),SCALANCE M876-4 (NAM),SCALANCE MUM853-1 (EU),SCALANCE MUM856-1 (EU),SCALANCE MUM856-1 (RoW),SCALANCE S615,SCALANCE S615 EEC,SCALANCE SC622-2C,SCALANCE SC626-2C,SCALANCE SC632-2C,SCALANCE SC636-2C,SCALANCE SC642-2C,SCALANCE SC646-2C,SCALANCE W1748-1 M12,SCALANCE W1788-1 M12,SCALANCE W1788-2 EEC M12,SCALANCE W1788-2 M12,SCALANCE W1788-2IA M12,SCALANCE W721-1 RJ45,SCALANCE W722-1 RJ45,SCALANCE W734-1 RJ45,SCALANCE W734-1 RJ45 (USA),SCALANCE W738-1 M12,SCALANCE W748-1 M12,SCALANCE W748-1 RJ45,SCALANCE W761-1 RJ45,SCALANCE W774-1 M12 EEC,SCALANCE W774-1 RJ45,SCALANCE W774-1 RJ45 (USA),SCALANCE W778-1 M12,SCALANCE W778-1 M12 EEC,SCALANCE W778-1 M12 EEC (USA),SCALANCE W786-1 RJ45,SCALANCE W786-2 RJ45,SCALANCE W786-2 SFP,SCALANCE W786-2IA RJ45,SCALANCE W788-1 M12,SCALANCE W788-1 RJ45,SCALANCE W788-2 M12,SCALANCE W788-2 M12 EEC,SCALANCE W788-2 RJ45,SCALANCE WAM763-1,SCALANCE WAM766-1 (EU),SCALANCE WAM766-1 (US),SCALANCE WAM766-1 EEC (EU),SCALANCE WAM766-1 EEC (US),SCALANCE WUM763-1,SCALANCE WUM766-1 (EU),SCALANCE WUM766-1 (US),SCALANCE XB205-3 (SC, PN),SCALANCE XB205-3 (ST, E/IP),SCALANCE XB205-3 (ST, PN),SCALANCE XB205-3LD (SC, E/IP),SCALANCE XB205-3LD (SC, PN),SCALANCE XB208 (E/IP),SCALANCE XB208 (PN),SCALANCE XB213-3 (SC, E/IP),SCALANCE XB213-3 (SC, PN),SCALANCE XB213-3 (ST, E/IP),SCALANCE XB213-3 (ST, PN),SCALANCE XB213-3LD (SC, E/IP),SCALANCE XB213-3LD (SC, PN),SCALANCE XB216 (E/IP),SCALANCE XB216 (PN),SCALANCE XC206-2 (SC),SCALANCE XC206-2 (ST/BFOC),SCALANCE XC206-2G PoE,SCALANCE XC206-2G PoE (54 V DC),SCALANCE XC206-2G PoE EEC (54 V DC),SCALANCE XC206-2SFP,SCALANCE XC206-2SFP EEC,SCALANCE XC206-2SFP G,SCALANCE XC206-2SFP G (EIP DEF.),SCALANCE XC206-2SFP G EEC,SCALANCE XC208,SCALANCE XC208EEC,SCALANCE XC208G,SCALANCE XC208G (EIP def.),SCALANCE XC208G EEC,SCALANCE XC208G PoE,SCALANCE XC208G PoE (54 V DC),SCALANCE XC216,SCALANCE XC216-3G PoE,SCALANCE XC216-3G PoE (54 V DC),SCALANCE XC216-4C,SCALANCE XC216-4C G,SCALANCE XC216-4C G (EIP Def.),SCALANCE XC216-4C G EEC,SCALANCE XC216EEC,SCALANCE XC224,SCALANCE XC224-4C G,SCALANCE XC224-4C G (EIP Def.),SCALANCE XC224-4C G EEC,SCALANCE XF204,SCALANCE XF204 DNA,SCALANCE XF204-2BA,SCALANCE XF204-2BA DNA,SCALANCE XM408-4C,SCALANCE XM408-4C (L3 int.),SCALANCE XM408-8C,SCALANCE XM408-8C (L3 int.),SCALANCE XM416-4C,SCALANCE XM416-4C (L3 int.),SCALANCE XP208,SCALANCE XP208 (Ethernet/IP),SCALANCE XP208EEC,SCALANCE XP208PoE EEC,SCALANCE XP216,SCALANCE XP216 (Ethernet/IP),SCALANCE XP216EEC,SCALANCE XP216POE EEC,SCALANCE XR324WG (24 x FE, AC 230V),SCALANCE XR324WG (24 X FE, DC 24V),SCALANCE XR326-2C PoE WG,SCALANCE XR326-2C PoE WG (without UL),SCALANCE XR328-4C WG (24XFE, 4XGE, 24V),SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V),SCALANCE XR328-4C WG (24xFE,4xGE,AC230V),SCALANCE XR328-4C WG (28xGE, AC 230V),SCALANCE XR328-4C WG (28xGE, DC 24V),SCALANCE XR524-8C, 1x230V,SCALANCE XR524-8C, 1x230V (L3 int.),SCALANCE XR524-8C, 24V,SCALANCE XR524-8C, 24V (L3 int.),SCALANCE XR524-8C, 2x230V,SCALANCE XR524-8C, 2x230V (L3 int.),SCALANCE XR526-8C, 1x230V,SCALANCE XR526-8C, 1x230V (L3 int.),SCALANCE XR526-8C, 24V,SCALANCE XR526-8C, 24V (L3 int.),SCALANCE XR526-8C, 2x230V,SCALANCE XR526-8C, 2x230V (L3 int.),SCALANCE XR528-6M,SCALANCE XR528-6M (2HR2, L3 int.),SCALANCE XR528-6M (2HR2),SCALANCE XR528-6M (L3 int.),SCALANCE XR552-12M,SCALANCE XR552-12M (2HR2, L3 int.),SCALANCE XR552-12M (2HR2),SIPLUS NET SCALANCE XC206-2,SIPLUS NET SCALANCE XC206-2SFP,SIPLUS NET SCALANCE XC208,SIPLUS NET SCALANCE XC216-4C",6.5,MEDIUM,0.0004400000034365803,false,,false,false,false,,false,false,2022-12-13T00:00:00.000Z,0 CVE-2022-46143,https://securityvulnerability.io/vulnerability/CVE-2022-46143,Buffer Read Vulnerability in Siemens Devices Due to TFTP Misconfiguration,"The vulnerability arises from Siemens devices failing to correctly validate the TFTP blocksize. An authenticated attacker can exploit this oversight to read from an uninitialized buffer, potentially exposing previously allocated data. This presents a significant security concern as it could lead to unauthorized access to sensitive information stored in the affected devices.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (eu),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router,Scalance Sc622-2c,Scalance Sc626-2c,Scalance Sc632-2c,Scalance Sc636-2c,Scalance Sc642-2c,Scalance Sc646-2c,Scalance W1748-1 M12,Scalance W1788-1 M12,Scalance W1788-2 Eec M12,Scalance W1788-2 M12,Scalance W1788-2ia M12,Scalance W721-1 Rj45,Scalance W722-1 Rj45,Scalance W734-1 Rj45,Scalance W734-1 Rj45 (usa),Scalance W738-1 M12,Scalance W748-1 M12,Scalance W748-1 Rj45,Scalance W761-1 Rj45,Scalance W774-1 M12 Eec,Scalance W774-1 Rj45,Scalance W774-1 Rj45 (usa),Scalance W778-1 M12,Scalance W778-1 M12 Eec,Scalance W778-1 M12 Eec (usa),Scalance W786-1 Rj45,Scalance W786-2 Rj45,Scalance W786-2 Sfp,Scalance W786-2ia Rj45,Scalance W788-1 M12,Scalance W788-1 Rj45,Scalance W788-2 M12,Scalance W788-2 M12 Eec,Scalance W788-2 Rj45,Scalance Wam763-1,Scalance Wam766-1 (eu),Scalance Wam766-1 (us),Scalance Wam766-1 Eec (eu),Scalance Wam766-1 Eec (us),Scalance Wum763-1,Scalance Wum766-1 (eu),Scalance Wum766-1 (us),Scalance Xb205-3 (sc, Pn),Scalance Xb205-3 (st, E/ip),Scalance Xb205-3 (st, Pn),Scalance Xb205-3ld (sc, E/ip),Scalance Xb205-3ld (sc, Pn),Scalance Xb208 (e/ip),Scalance Xb208 (pn),Scalance Xb213-3 (sc, E/ip),Scalance Xb213-3 (sc, Pn),Scalance Xb213-3 (st, E/ip),Scalance Xb213-3 (st, Pn),Scalance Xb213-3ld (sc, E/ip),Scalance Xb213-3ld (sc, Pn),Scalance Xb216 (e/ip),Scalance Xb216 (pn),Scalance Xc206-2 (sc),Scalance Xc206-2 (st/bfoc),Scalance Xc206-2g Poe,Scalance Xc206-2g Poe (54 V Dc),Scalance Xc206-2g Poe Eec (54 V Dc),Scalance Xc206-2sfp,Scalance Xc206-2sfp Eec,Scalance Xc206-2sfp G,Scalance Xc206-2sfp G (eip Def.),Scalance Xc206-2sfp G Eec,Scalance Xc208,Scalance Xc208eec,Scalance Xc208g,Scalance Xc208g (eip Def.),Scalance Xc208g Eec,Scalance Xc208g Poe,Scalance Xc208g Poe (54 V Dc),Scalance Xc216,Scalance Xc216-3g Poe,Scalance Xc216-3g Poe (54 V Dc),Scalance Xc216-4c,Scalance Xc216-4c G,Scalance Xc216-4c G (eip Def.),Scalance Xc216-4c G Eec,Scalance Xc216eec,Scalance Xc224,Scalance Xc224-4c G,Scalance Xc224-4c G (eip Def.),Scalance Xc224-4c G Eec,Scalance Xf204,Scalance Xf204 Dna,Scalance Xf204-2ba,Scalance Xf204-2ba Dna,Scalance Xm408-4c,Scalance Xm408-4c (l3 Int.),Scalance Xm408-8c,Scalance Xm408-8c (l3 Int.),Scalance Xm416-4c,Scalance Xm416-4c (l3 Int.),Scalance Xp208,Scalance Xp208 (ethernet/ip),Scalance Xp208eec,Scalance Xp208poe Eec,Scalance Xp216,Scalance Xp216 (ethernet/ip),Scalance Xp216eec,Scalance Xp216poe Eec,Scalance Xr324wg (24 X Fe, Ac 230v),Scalance Xr324wg (24 X Fe, Dc 24v),Scalance Xr326-2c Poe Wg,Scalance Xr326-2c Poe Wg (without Ul),Scalance Xr328-4c Wg (24xfe, 4xge, 24v),Scalance Xr328-4c Wg (24xfe, 4xge,dc24v),Scalance Xr328-4c Wg (24xfe,4xge,ac230v),Scalance Xr328-4c Wg (28xge, Ac 230v),Scalance Xr328-4c Wg (28xge, Dc 24v),Scalance Xr524-8c, 1x230v,Scalance Xr524-8c, 1x230v (l3 Int.),Scalance Xr524-8c, 24v,Scalance Xr524-8c, 24v (l3 Int.),Scalance Xr524-8c, 2x230v,Scalance Xr524-8c, 2x230v (l3 Int.),Scalance Xr526-8c, 1x230v,Scalance Xr526-8c, 1x230v (l3 Int.),Scalance Xr526-8c, 24v,Scalance Xr526-8c, 24v (l3 Int.),Scalance Xr526-8c, 2x230v,Scalance Xr526-8c, 2x230v (l3 Int.),Scalance Xr528-6m,Scalance Xr528-6m (2hr2, L3 Int.),Scalance Xr528-6m (2hr2),Scalance Xr528-6m (l3 Int.),Scalance Xr552-12m,Scalance Xr552-12m (2hr2, L3 Int.),Scalance Xr552-12m (2hr2),Siplus Net Scalance Xc206-2,Siplus Net Scalance Xc206-2sfp,Siplus Net Scalance Xc208,Siplus Net Scalance Xc216-4c",2.7,LOW,0.00044999999227002263,false,,false,false,false,,false,false,2022-12-13T00:00:00.000Z,0 CVE-2022-31766,https://securityvulnerability.io/vulnerability/CVE-2022-31766,Denial of Service in RUGGEDCOM and SCALANCE Products by Siemens,"A vulnerability has been found in select RUGGEDCOM and SCALANCE devices, where enabling TCP Event service can lead to improper handling of malformed packets. This can lead to an unauthenticated remote attacker causing a denial of service, resulting in device reboot and potential impact on network resources. Users are encouraged to update to versions V7.1.2 or higher to mitigate this risk.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router (annex A),Scalance M812-1 Adsl-router (annex B),Scalance M816-1 Adsl-router (annex A),Scalance M816-1 Adsl-router (annex B),Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M876-3 (evdo),Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (eu),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615,Scalance S615 Eec,Scalance Wam763-1,Scalance Wam766-1 (eu),Scalance Wam766-1 (us),Scalance Wam766-1 Eec (eu),Scalance Wam766-1 Eec (us),Scalance Wum763-1,Scalance Wum766-1 (eu),Scalance Wum766-1 (us)",8.6,HIGH,0.0005099999834783375,false,,false,false,false,,false,false,2022-10-11T00:00:00.000Z,0 CVE-2022-31765,https://securityvulnerability.io/vulnerability/CVE-2022-31765,Authorization Flaw in Siemens Devices' Web Interface,"An authorization flaw in Siemens devices enables low-privileged users to initiate password changes via the web interface. This vulnerability exploits insufficient validation checks, potentially leading to unauthorized privilege escalation. Effective security measures must be put in place to prevent misuse and safeguard against unauthorized access.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router (annex A),Scalance M812-1 Adsl-router (annex B),Scalance M816-1 Adsl-router (annex A),Scalance M816-1 Adsl-router (annex B),Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M876-3 (evdo),Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (eu),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615,Scalance S615 Eec,Scalance Sc622-2c,Scalance Sc632-2c,Scalance Sc636-2c,Scalance Sc642-2c,Scalance Sc646-2c,Scalance W1748-1 M12,Scalance W1788-1 M12,Scalance W1788-2 Eec M12,Scalance W1788-2 M12,Scalance W1788-2ia M12,Scalance W721-1 Rj45,Scalance W722-1 Rj45,Scalance W734-1 Rj45,Scalance W734-1 Rj45 (usa),Scalance W738-1 M12,Scalance W748-1 M12,Scalance W748-1 Rj45,Scalance W761-1 Rj45,Scalance W774-1 M12 Eec,Scalance W774-1 Rj45,Scalance W774-1 Rj45 (usa),Scalance W778-1 M12,Scalance W778-1 M12 Eec,Scalance W778-1 M12 Eec (usa),Scalance W786-1 Rj45,Scalance W786-2 Rj45,Scalance W786-2 Sfp,Scalance W786-2ia Rj45,Scalance W788-1 M12,Scalance W788-1 Rj45,Scalance W788-2 M12,Scalance W788-2 M12 Eec,Scalance W788-2 Rj45,Scalance Wam763-1,Scalance Wam766-1 (eu),Scalance Wam766-1 (us),Scalance Wam766-1 Eec (eu),Scalance Wam766-1 Eec (us),Scalance Wum763-1,Scalance Wum766-1 (eu),Scalance Wum766-1 (us),Scalance Xb205-3 (sc, Pn),Scalance Xb205-3 (st, E/ip),Scalance Xb205-3 (st, Pn),Scalance Xb205-3ld (sc, E/ip),Scalance Xb205-3ld (sc, Pn),Scalance Xb208 (e/ip),Scalance Xb208 (pn),Scalance Xb213-3 (sc, E/ip),Scalance Xb213-3 (sc, Pn),Scalance Xb213-3 (st, E/ip),Scalance Xb213-3 (st, Pn),Scalance Xb213-3ld (sc, E/ip),Scalance Xb213-3ld (sc, Pn),Scalance Xb216 (e/ip),Scalance Xb216 (pn),Scalance Xc206-2 (sc),Scalance Xc206-2 (st/bfoc),Scalance Xc206-2g Poe,Scalance Xc206-2g Poe (54 V Dc),Scalance Xc206-2g Poe Eec (54 V Dc),Scalance Xc206-2sfp,Scalance Xc206-2sfp Eec,Scalance Xc206-2sfp G,Scalance Xc206-2sfp G (eip Def.),Scalance Xc206-2sfp G Eec,Scalance Xc208,Scalance Xc208eec,Scalance Xc208g,Scalance Xc208g (eip Def.),Scalance Xc208g Eec,Scalance Xc208g Poe,Scalance Xc208g Poe (54 V Dc),Scalance Xc216,Scalance Xc216-3g Poe,Scalance Xc216-3g Poe (54 V Dc),Scalance Xc216-4c,Scalance Xc216-4c G,Scalance Xc216-4c G (eip Def.),Scalance Xc216-4c G Eec,Scalance Xc216eec,Scalance Xc224,Scalance Xc224-4c G,Scalance Xc224-4c G (eip Def.),Scalance Xc224-4c G Eec,Scalance Xf204,Scalance Xf204 Dna,Scalance Xf204-2ba,Scalance Xf204-2ba Dna,Scalance Xm408-4c,Scalance Xm408-4c (l3 Int.),Scalance Xm408-8c,Scalance Xm408-8c (l3 Int.),Scalance Xm416-4c,Scalance Xm416-4c (l3 Int.),Scalance Xp208,Scalance Xp208 (ethernet/ip),Scalance Xp208eec,Scalance Xp208poe Eec,Scalance Xp216,Scalance Xp216 (ethernet/ip),Scalance Xp216eec,Scalance Xp216poe Eec,Scalance Xr324wg (24 X Fe, Ac 230v),Scalance Xr324wg (24 X Fe, Dc 24v),Scalance Xr326-2c Poe Wg,Scalance Xr326-2c Poe Wg (without Ul),Scalance Xr328-4c Wg (24xfe, 4xge, 24v),Scalance Xr328-4c Wg (24xfe, 4xge,dc24v),Scalance Xr328-4c Wg (24xfe,4xge,ac230v),Scalance Xr328-4c Wg (28xge, Ac 230v),Scalance Xr328-4c Wg (28xge, Dc 24v),Scalance Xr524-8c, 1x230v,Scalance Xr524-8c, 1x230v (l3 Int.),Scalance Xr524-8c, 24v,Scalance Xr524-8c, 24v (l3 Int.),Scalance Xr524-8c, 2x230v,Scalance Xr524-8c, 2x230v (l3 Int.),Scalance Xr526-8c, 1x230v,Scalance Xr526-8c, 1x230v (l3 Int.),Scalance Xr526-8c, 24v,Scalance Xr526-8c, 24v (l3 Int.),Scalance Xr526-8c, 2x230v,Scalance Xr526-8c, 2x230v (l3 Int.),Scalance Xr528-6m,Scalance Xr528-6m (2hr2, L3 Int.),Scalance Xr528-6m (2hr2),Scalance Xr528-6m (l3 Int.),Scalance Xr552-12m,Scalance Xr552-12m (2hr2, L3 Int.),Scalance Xr552-12m (2hr2),Siplus Net Scalance Xc206-2,Siplus Net Scalance Xc206-2sfp,Siplus Net Scalance Xc208,Siplus Net Scalance Xc216-4c",8.8,HIGH,0.0004400000034365803,false,,false,false,false,,false,false,2022-10-11T00:00:00.000Z,0 CVE-2022-36325,https://securityvulnerability.io/vulnerability/CVE-2022-36325,DOM-Based XSS Vulnerability in Siemens Web Interface,"This vulnerability arises from the inadequate sanitization of user-supplied data in the Siemens web interface. An authenticated attacker with administrative privileges can exploit this flaw to inject malicious code, potentially resulting in a DOM-based Cross-Site Scripting (XSS) attack. Such an attack could enable unauthorized actions on behalf of users, compromising their data and the integrity of the web application.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router (annex A),Scalance M812-1 Adsl-router (annex B),Scalance M816-1 Adsl-router (annex A),Scalance M816-1 Adsl-router (annex B),Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M876-3 (evdo),Scalance M876-3 (rok),Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (eu),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615,Scalance Sc622-2c,Scalance Sc626-2c,Scalance Sc632-2c,Scalance Sc636-2c,Scalance Sc642-2c,Scalance Sc646-2c,Scalance W1748-1 M12,Scalance W1788-1 M12,Scalance W1788-2 Eec M12,Scalance W1788-2 M12,Scalance W1788-2ia M12,Scalance W721-1 Rj45,Scalance W722-1 Rj45,Scalance W734-1 Rj45,Scalance W734-1 Rj45 (usa),Scalance W738-1 M12,Scalance W748-1 M12,Scalance W748-1 Rj45,Scalance W761-1 Rj45,Scalance W774-1 M12 Eec,Scalance W774-1 Rj45,Scalance W774-1 Rj45 (usa),Scalance W778-1 M12,Scalance W778-1 M12 Eec,Scalance W778-1 M12 Eec (usa),Scalance W786-1 Rj45,Scalance W786-2 Rj45,Scalance W786-2 Sfp,Scalance W786-2ia Rj45,Scalance W788-1 M12,Scalance W788-1 Rj45,Scalance W788-2 M12,Scalance W788-2 M12 Eec,Scalance W788-2 Rj45,Scalance Wam763-1,Scalance Wam766-1 (eu),Scalance Wam766-1 (us),Scalance Wam766-1 Eec (eu),Scalance Wam766-1 Eec (us),Scalance Wum763-1,Scalance Wum766-1 (eu),Scalance Wum766-1 (us),Scalance Xb205-3 (sc, Pn),Scalance Xb205-3 (st, E/ip),Scalance Xb205-3 (st, Pn),Scalance Xb205-3ld (sc, E/ip),Scalance Xb205-3ld (sc, Pn),Scalance Xb208 (e/ip),Scalance Xb208 (pn),Scalance Xb213-3 (sc, E/ip),Scalance Xb213-3 (sc, Pn),Scalance Xb213-3 (st, E/ip),Scalance Xb213-3 (st, Pn),Scalance Xb213-3ld (sc, E/ip),Scalance Xb213-3ld (sc, Pn),Scalance Xb216 (e/ip),Scalance Xb216 (pn),Scalance Xc206-2 (sc),Scalance Xc206-2 (st/bfoc),Scalance Xc206-2g Poe,Scalance Xc206-2g Poe (54 V Dc),Scalance Xc206-2g Poe Eec (54 V Dc),Scalance Xc206-2sfp,Scalance Xc206-2sfp Eec,Scalance Xc206-2sfp G,Scalance Xc206-2sfp G (eip Def.),Scalance Xc206-2sfp G Eec,Scalance Xc208,Scalance Xc208eec,Scalance Xc208g,Scalance Xc208g (eip Def.),Scalance Xc208g Eec,Scalance Xc208g Poe,Scalance Xc208g Poe (54 V Dc),Scalance Xc216,Scalance Xc216-3g Poe,Scalance Xc216-3g Poe (54 V Dc),Scalance Xc216-4c,Scalance Xc216-4c G,Scalance Xc216-4c G (eip Def.),Scalance Xc216-4c G Eec,Scalance Xc216eec,Scalance Xc224,Scalance Xc224-4c G,Scalance Xc224-4c G (eip Def.),Scalance Xc224-4c G Eec,Scalance Xf204,Scalance Xf204 Dna,Scalance Xf204-2ba,Scalance Xf204-2ba Dna,Scalance Xm408-4c,Scalance Xm408-4c (l3 Int.),Scalance Xm408-8c,Scalance Xm408-8c (l3 Int.),Scalance Xm416-4c,Scalance Xm416-4c (l3 Int.),Scalance Xp208,Scalance Xp208 (ethernet/ip),Scalance Xp208eec,Scalance Xp208poe Eec,Scalance Xp216,Scalance Xp216 (ethernet/ip),Scalance Xp216eec,Scalance Xp216poe Eec,Scalance Xr324wg (24 X Fe, Ac 230v),Scalance Xr324wg (24 X Fe, Dc 24v),Scalance Xr326-2c Poe Wg,Scalance Xr326-2c Poe Wg (without Ul),Scalance Xr328-4c Wg (24xfe, 4xge, 24v),Scalance Xr328-4c Wg (24xfe, 4xge,dc24v),Scalance Xr328-4c Wg (24xfe,4xge,ac230v),Scalance Xr328-4c Wg (28xge, Ac 230v),Scalance Xr328-4c Wg (28xge, Dc 24v),Scalance Xr524-8c, 1x230v,Scalance Xr524-8c, 1x230v (l3 Int.),Scalance Xr524-8c, 24v,Scalance Xr524-8c, 24v (l3 Int.),Scalance Xr524-8c, 2x230v,Scalance Xr524-8c, 2x230v (l3 Int.),Scalance Xr526-8c, 1x230v,Scalance Xr526-8c, 1x230v (l3 Int.),Scalance Xr526-8c, 24v,Scalance Xr526-8c, 24v (l3 Int.),Scalance Xr526-8c, 2x230v,Scalance Xr526-8c, 2x230v (l3 Int.),Scalance Xr528-6m,Scalance Xr528-6m (2hr2, L3 Int.),Scalance Xr528-6m (2hr2),Scalance Xr528-6m (l3 Int.),Scalance Xr552-12m,Scalance Xr552-12m (2hr2, L3 Int.),Scalance Xr552-12m (2hr2),Siplus Net Scalance Xc206-2,Siplus Net Scalance Xc206-2sfp,Siplus Net Scalance Xc208,Siplus Net Scalance Xc216-4c",6.8,MEDIUM,0.0007099999929778278,false,,false,false,false,,false,false,2022-08-10T11:18:45.000Z,0