cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-50572,https://securityvulnerability.io/vulnerability/CVE-2024-50572,RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) and other products remote code execution vulnerability,"A newly identified vulnerability affects several Siemens products, including the RUGGEDCOM RM1224 LTE and various SCALANCE routers. This vulnerability occurs due to improper sanitization of an input field, which may permit an authenticated remote attacker with administrative privileges to execute arbitrary code or gain access to a system root shell. Organizations utilizing vulnerable devices are advised to implement corrective measures promptly to mitigate potential exploitation.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M874-3 3g-router (cn),Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (a1),Scalance Mum853-1 (b1),Scalance Mum853-1 (eu),Scalance Mum856-1 (a1),Scalance Mum856-1 (b1),Scalance Mum856-1 (cn),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router,Scalance Wab762-1,Scalance Wam763-1,Scalance Wam763-1 (me),Scalance Wam763-1 (us),Scalance Wam766-1,Scalance Wam766-1 (me),Scalance Wam766-1 (us),Scalance Wam766-1 Eec,Scalance Wam766-1 Eec (me),Scalance Wam766-1 Eec (us),Scalance Wub762-1,Scalance Wub762-1 Ifeatures,Scalance Wum763-1,Scalance Wum763-1 (us),Scalance Wum766-1,Scalance Wum766-1 (me),Scalance Wum766-1 (usa)",8.6,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-12T12:50:08.911Z,0 CVE-2024-50561,https://securityvulnerability.io/vulnerability/CVE-2024-50561,SCALANCE Mxx6-x ADSL-Router vulnerable to file sanitization attack,"A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2), SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) (All versions < V3.0.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions < V3.0.0), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions < V3.0.0), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (All versions < V3.0.0), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions < V3.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions < V3.0.0), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) (All versions < V3.0.0), SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions < V3.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (All versions < V3.0.0), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions < V3.0.0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) (All versions < V3.0.0). Affected devices do not properly sanitize the filenames before uploading. This could allow an authenticated remote attacker to compromise of integrity of the system.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M874-3 3g-router (cn),Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (a1),Scalance Mum853-1 (b1),Scalance Mum853-1 (eu),Scalance Mum856-1 (a1),Scalance Mum856-1 (b1),Scalance Mum856-1 (cn),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router,Scalance Wab762-1,Scalance Wam763-1,Scalance Wam763-1 (me),Scalance Wam763-1 (us),Scalance Wam766-1,Scalance Wam766-1 (me),Scalance Wam766-1 (us),Scalance Wam766-1 Eec,Scalance Wam766-1 Eec (me),Scalance Wam766-1 Eec (us),Scalance Wub762-1,Scalance Wub762-1 Ifeatures,Scalance Wum763-1,Scalance Wum763-1 (us),Scalance Wum766-1,Scalance Wum766-1 (me),Scalance Wum766-1 (usa)",5.1,MEDIUM,0.0004600000102072954,false,,false,false,false,,,false,false,,2024-11-12T12:50:06.660Z,0 CVE-2024-50560,https://securityvulnerability.io/vulnerability/CVE-2024-50560,"{""{\""name\"":\""Affected devices truncates usernames longer than 15 characters when accessed via SSH or Telnet\"",\""versions\"":[\""< V8.2\""]}""}","A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2), SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) (All versions < V3.0.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions < V3.0.0), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions < V3.0.0), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (All versions < V3.0.0), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions < V3.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions < V3.0.0), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) (All versions < V3.0.0), SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions < V3.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (All versions < V3.0.0), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions < V3.0.0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) (All versions < V3.0.0). Affected devices truncates usernames longer than 15 characters when accessed via SSH or Telnet. This could allow an attacker to compromise system integrity.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M874-3 3g-router (cn),Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (a1),Scalance Mum853-1 (b1),Scalance Mum853-1 (eu),Scalance Mum856-1 (a1),Scalance Mum856-1 (b1),Scalance Mum856-1 (cn),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router,Scalance Wab762-1,Scalance Wam763-1,Scalance Wam763-1 (me),Scalance Wam763-1 (us),Scalance Wam766-1,Scalance Wam766-1 (me),Scalance Wam766-1 (us),Scalance Wam766-1 Eec,Scalance Wam766-1 Eec (me),Scalance Wam766-1 Eec (us),Scalance Wub762-1,Scalance Wub762-1 Ifeatures,Scalance Wum763-1,Scalance Wum763-1 (us),Scalance Wum766-1,Scalance Wum766-1 (me),Scalance Wum766-1 (usa)",2.3,LOW,0.00044999999227002263,false,,false,false,false,,,false,false,,2024-11-12T12:50:04.034Z,0 CVE-2024-50559,https://securityvulnerability.io/vulnerability/CVE-2024-50559,Siemens SCALANCE Products Vulnerability,"A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2). Affected devices do not properly validate the filenames of the certificate. This could allow an authenticated remote attacker to append arbitrary values which will lead to compromise of integrity of the system.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M874-3 3g-router (cn),Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (a1),Scalance Mum853-1 (b1),Scalance Mum853-1 (eu),Scalance Mum856-1 (a1),Scalance Mum856-1 (b1),Scalance Mum856-1 (cn),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router",4.3,MEDIUM,0.0004600000102072954,false,,false,false,false,,,false,false,,2024-11-12T12:50:01.376Z,0 CVE-2024-50558,https://securityvulnerability.io/vulnerability/CVE-2024-50558,Vulnerability in RUGGEDCOM RM1224 LTE(4G) Devices Could Lead to Denial of Service,"A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2). Affected devices improperly manage access control for read-only users. This could allow an attacker to cause a temporary denial of service condition.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M874-3 3g-router (cn),Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (a1),Scalance Mum853-1 (b1),Scalance Mum853-1 (eu),Scalance Mum856-1 (a1),Scalance Mum856-1 (b1),Scalance Mum856-1 (cn),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router",4.3,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2024-11-12T12:49:58.734Z,0 CVE-2024-50557,https://securityvulnerability.io/vulnerability/CVE-2024-50557,Input Validation Vulnerability in iperf Functionality Could Allow Arbitrary Code Execution,"A significant input validation issue has been discovered in various RUGGEDCOM RM1224 and SCALANCE M-series devices produced by Siemens. The flaw resides in the configuration fields related to the iperf functionality, which do not validate inputs properly. This oversight could enable an unauthorized remote attacker to execute arbitrary code on the affected devices, presenting serious security concerns for networks using these products. Immediate action is recommended to mitigate potential exploits.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M874-3 3g-router (cn),Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (a1),Scalance Mum853-1 (b1),Scalance Mum853-1 (eu),Scalance Mum856-1 (a1),Scalance Mum856-1 (b1),Scalance Mum856-1 (cn),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router",9.8,CRITICAL,0.0007600000244565308,false,,false,false,false,,,false,false,,2024-11-12T12:49:56.426Z,0 CVE-2024-41978,https://securityvulnerability.io/vulnerability/CVE-2024-41978,SCALANCE M804PB Faces Vulnerability in 2FA Log File Injection,"A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.1), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.1), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.1), SCALANCE M812-1 ADSL-Router family (All versions < V8.1), SCALANCE M816-1 ADSL-Router family (All versions < V8.1), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.1), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.1), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.1), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.1), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.1), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.1), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.1), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.1), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.1), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.1), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.1), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.1), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.1), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.1), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.1), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.1), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.1), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.1), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.1). Affected devices insert sensitive information about the generation of 2FA tokens into log files. This could allow an authenticated remote attacker to forge 2FA tokens of other users.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router Family,Scalance M816-1 Adsl-router Family,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M874-3 3g-router (cn),Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (a1),Scalance Mum853-1 (b1),Scalance Mum853-1 (eu),Scalance Mum856-1 (a1),Scalance Mum856-1 (b1),Scalance Mum856-1 (cn),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router",6.5,MEDIUM,0.0004799999878741801,false,,false,false,false,,,false,false,,2024-08-13T07:54:39.417Z,0 CVE-2024-41977,https://securityvulnerability.io/vulnerability/CVE-2024-41977,Devices vulnerable to attack through web server component,"A significant vulnerability has been discovered that affects multiple Siemens RUGGEDCOM and SCALANCE devices. The devices fail to enforce proper isolation between user sessions in their web server component. This oversight could potentially allow an authenticated remote attacker to escalate their privileges, thereby gaining unauthorized access to sensitive information or executing harmful commands on the affected devices. As a precaution, users are urged to update their systems to version 8.1 or later to mitigate this risk.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router Family,Scalance M816-1 Adsl-router Family,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M874-3 3g-router (cn),Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (a1),Scalance Mum853-1 (b1),Scalance Mum853-1 (eu),Scalance Mum856-1 (a1),Scalance Mum856-1 (b1),Scalance Mum856-1 (cn),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router",8,HIGH,0.0004900000058114529,false,,false,false,false,,,false,false,,2024-08-13T07:54:37.591Z,0 CVE-2024-41976,https://securityvulnerability.io/vulnerability/CVE-2024-41976,SCALANCE M874-3 VPN Router Vulnerability,"A notable security vulnerability affects several RUGGEDCOM and SCALANCE devices due to improper validation of input in specific VPN configuration fields. This security flaw allows an authenticated remote attacker to potentially execute arbitrary code on the affected devices, posing serious risk to network integrity and device functionality. Users of the RUGGEDCOM RM1224 LTE and SCALANCE product lines, particularly those operating on firmware version earlier than V8.1, should take immediate action to secure their systems against potential exploitation. Remedial updates and best practices for network security are recommended to mitigate any associated threats.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router Family,Scalance M816-1 Adsl-router Family,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M874-3 3g-router (cn),Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (a1),Scalance Mum853-1 (b1),Scalance Mum853-1 (eu),Scalance Mum856-1 (a1),Scalance Mum856-1 (b1),Scalance Mum856-1 (cn),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router",8.8,HIGH,0.00046999999904073775,false,,false,false,false,,,false,false,,2024-08-13T07:54:35.837Z,0 CVE-2023-49692,https://securityvulnerability.io/vulnerability/CVE-2023-49692,Improper Neutralization Vulnerability in Siemens RUGGEDCOM and SCALANCE Products,"A notable vulnerability has been discovered in Siemens' RUGGEDCOM and SCALANCE product lines, specifically impacting versions below V7.2.2. This security flaw is related to the improper handling of special elements during the parsing of IPSEC configurations. As a result, malicious local administrators may exploit this vulnerability to execute arbitrary commands at the system level following the establishment of a new connection. This could lead to significant breaches of security and unauthorized access to sensitive system functions.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (eu),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router",6.7,MEDIUM,0.0004600000102072954,false,,false,false,false,,,false,false,,2023-12-12T12:15:00.000Z,0 CVE-2023-49691,https://securityvulnerability.io/vulnerability/CVE-2023-49691,Improper Neutralization of Special Elements in DDNS Configuration Vulnerability in Siemens Devices,"An improper neutralization flaw in the handling of Dynamic DNS (DDNS) configuration can allow a malicious local administrator to execute arbitrary commands with root privileges following a successful IP address update. This vulnerability can potentially compromise the integrity and security of the affected Siemens devices, making it critical for users to apply available security updates and mitigate any risks associated with this vulnerability.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (eu),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router",6.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2023-12-12T12:15:00.000Z,0 CVE-2023-44374,https://securityvulnerability.io/vulnerability/CVE-2023-44374,Password Change Vulnerability in Siemens RUGGEDCOM and SCALANCE Products,"A vulnerability in certain Siemens RUGGEDCOM RM1224 LTE and SCALANCE products allows authenticated attackers to change the passwords of other users, including potential administrator accounts. This flaw arises due to insufficient checks when changing passwords, which creates opportunities for privilege escalation. Organizations using affected products should evaluate their security measures and apply necessary patches to mitigate the risks associated with this vulnerability.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (eu),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router,Scalance Wab762-1,Scalance Wam763-1,Scalance Wam763-1 (me),Scalance Wam763-1 (us),Scalance Wam766-1 (eu),Scalance Wam766-1 (me),Scalance Wam766-1 (us),Scalance Wam766-1 Eec (eu),Scalance Wam766-1 Eec (me),Scalance Wam766-1 Eec (us),Scalance Wub762-1,Scalance Wum763-1,Scalance Wum763-1 (us),Scalance Wum766-1 (eu),Scalance Wum766-1 (me),Scalance Wum766-1 (us)",8.8,HIGH,0.0014600000577047467,false,,false,false,false,,,false,false,,2023-11-14T11:15:00.000Z,0 CVE-2023-44317,https://securityvulnerability.io/vulnerability/CVE-2023-44317,Code Execution Vulnerability in RUGGEDCOM and SCALANCE Products,"This vulnerability affects a range of Siemens RUGGEDCOM and SCALANCE products due to improper validation of uploaded X509 certificates. Attackers who possess administrative privileges might exploit this flaw, allowing them to execute arbitrary code on the targeted devices. With various products identified, users are urged to review their system versions and apply necessary updates to mitigate potential risks associated with this vulnerability.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (eu),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router,Scalance Wab762-1,Scalance Wam763-1,Scalance Wam763-1 (me),Scalance Wam763-1 (us),Scalance Wam766-1 (eu),Scalance Wam766-1 (me),Scalance Wam766-1 (us),Scalance Wam766-1 Eec (eu),Scalance Wam766-1 Eec (me),Scalance Wam766-1 Eec (us),Scalance Wub762-1,Scalance Wum763-1,Scalance Wum763-1 (us),Scalance Wum766-1 (eu),Scalance Wum766-1 (me),Scalance Wum766-1 (us)",7.2,HIGH,0.0004799999878741801,false,,false,false,false,,,false,false,,2023-11-14T11:15:00.000Z,0 CVE-2023-44318,https://securityvulnerability.io/vulnerability/CVE-2023-44318,Configuration Backup Exposure in Siemens Products,"This vulnerability allows an authenticated attacker or anyone with access to an exported configuration backup to potentially exploit a hardcoded key, revealing sensitive configuration details. This poses a significant risk as it may lead to unauthorized changes or further exploitation of the affected devices. The issue underscores the importance of reviewing security practices around sensitive data handling within operational technology environments.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (eu),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router,Scalance Wab762-1,Scalance Wam763-1,Scalance Wam763-1 (me),Scalance Wam763-1 (us),Scalance Wam766-1 (eu),Scalance Wam766-1 (me),Scalance Wam766-1 (us),Scalance Wam766-1 Eec (eu),Scalance Wam766-1 Eec (me),Scalance Wam766-1 Eec (us),Scalance Wub762-1,Scalance Wum763-1,Scalance Wum763-1 (us),Scalance Wum766-1 (eu),Scalance Wum766-1 (me),Scalance Wum766-1 (us),Scalance Xb205-3 (sc, Pn),Scalance Xb205-3 (st, E/ip),Scalance Xb205-3 (st, Pn),Scalance Xb205-3ld (sc, E/ip),Scalance Xb205-3ld (sc, Pn),Scalance Xb208 (e/ip),Scalance Xb208 (pn),Scalance Xb213-3 (sc, E/ip),Scalance Xb213-3 (sc, Pn),Scalance Xb213-3 (st, E/ip),Scalance Xb213-3 (st, Pn),Scalance Xb213-3ld (sc, E/ip),Scalance Xb213-3ld (sc, Pn),Scalance Xb216 (e/ip),Scalance Xb216 (pn),Scalance Xc206-2 (sc),Scalance Xc206-2 (st/bfoc),Scalance Xc206-2g Poe,Scalance Xc206-2g Poe (54 V Dc),Scalance Xc206-2g Poe Eec (54 V Dc),Scalance Xc206-2sfp,Scalance Xc206-2sfp Eec,Scalance Xc206-2sfp G,Scalance Xc206-2sfp G (eip Def.),Scalance Xc206-2sfp G Eec,Scalance Xc208,Scalance Xc208eec,Scalance Xc208g,Scalance Xc208g (eip Def.),Scalance Xc208g Eec,Scalance Xc208g Poe,Scalance Xc208g Poe (54 V Dc),Scalance Xc216,Scalance Xc216-3g Poe,Scalance Xc216-3g Poe (54 V Dc),Scalance Xc216-4c,Scalance Xc216-4c G,Scalance Xc216-4c G (eip Def.),Scalance Xc216-4c G Eec,Scalance Xc216eec,Scalance Xc224,Scalance Xc224-4c G,Scalance Xc224-4c G (eip Def.),Scalance Xc224-4c G Eec,Scalance Xf204,Scalance Xf204 Dna,Scalance Xf204-2ba,Scalance Xf204-2ba Dna,Scalance Xp208,Scalance Xp208 (ethernet/ip),Scalance Xp208eec,Scalance Xp208poe Eec,Scalance Xp216,Scalance Xp216 (ethernet/ip),Scalance Xp216eec,Scalance Xp216poe Eec,Scalance Xr324wg (24 X Fe, Ac 230v),Scalance Xr324wg (24 X Fe, Dc 24v),Scalance Xr326-2c Poe Wg,Scalance Xr326-2c Poe Wg (without Ul),Scalance Xr328-4c Wg (24xfe, 4xge, 24v),Scalance Xr328-4c Wg (24xfe, 4xge,dc24v),Scalance Xr328-4c Wg (24xfe,4xge,ac230v),Scalance Xr328-4c Wg (28xge, Ac 230v),Scalance Xr328-4c Wg (28xge, Dc 24v),Siplus Net Scalance Xc206-2,Siplus Net Scalance Xc206-2sfp,Siplus Net Scalance Xc208,Siplus Net Scalance Xc216-4c",4.9,MEDIUM,0.0009899999713525176,false,,false,false,false,,,false,false,,2023-11-14T11:15:00.000Z,0 CVE-2023-44319,https://securityvulnerability.io/vulnerability/CVE-2023-44319,Weak Checksum Algorithm in Siemens Networking Products,"Siemens devices in the RUGGEDCOM and SCALANCE series are susceptible to a security issue involving a weak checksum algorithm used for configuration backups. This flaw allows an authenticated attacker with administrative privileges, or an attacker who misleads a legitimate administrator, to upload a modified configuration file. Such an action can lead to significant alterations in the device's configuration and operational behavior, potentially compromising network integrity and security.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (eu),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router,Scalance Wab762-1,Scalance Wam763-1,Scalance Wam763-1 (me),Scalance Wam763-1 (us),Scalance Wam766-1 (eu),Scalance Wam766-1 (me),Scalance Wam766-1 (us),Scalance Wam766-1 Eec (eu),Scalance Wam766-1 Eec (me),Scalance Wam766-1 Eec (us),Scalance Wub762-1,Scalance Wum763-1,Scalance Wum763-1 (us),Scalance Wum766-1 (eu),Scalance Wum766-1 (me),Scalance Wum766-1 (us)",4.9,MEDIUM,0.0012600000482052565,false,,false,false,false,,,false,false,,2023-11-14T11:15:00.000Z,0 CVE-2023-44320,https://securityvulnerability.io/vulnerability/CVE-2023-44320,Authentication Bypass in Siemens RUGGEDCOM and SCALANCE Products,"A vulnerability exists in multiple Siemens RUGGEDCOM and SCALANCE products that allows an authenticated attacker to manipulate the web interface. Improper validation of the authentication process during specific administrative modifications enables unauthorized influence over the user configuration interface. This could allow attackers to modify settings or display false information, potentially leading to further exploitations within the network.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (eu),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router,Scalance Wab762-1,Scalance Wam763-1,Scalance Wam763-1 (me),Scalance Wam763-1 (us),Scalance Wam766-1,Scalance Wam766-1 (me),Scalance Wam766-1 (us),Scalance Wam766-1 Eec,Scalance Wam766-1 Eec (me),Scalance Wam766-1 Eec (us),Scalance Wub762-1,Scalance Wub762-1 Ifeatures,Scalance Wum763-1,Scalance Wum763-1 (us),Scalance Wum766-1,Scalance Wum766-1 (me),Scalance Wum766-1 (usa)",4.3,MEDIUM,0.0012499999720603228,false,,false,false,false,,,false,false,,2023-11-14T11:15:00.000Z,0 CVE-2023-44321,https://securityvulnerability.io/vulnerability/CVE-2023-44321,Denial of Service Risk in Siemens Configuration Interfaces,"Certain Siemens devices exhibit improper input validation during configuration changes in their web interface. This vulnerability allows authenticated attackers to exploit the input length checks, potentially leading to a denial of service condition. As a result of this vulnerability, access to the web interface may become unavailable, requiring the device to be restarted to regain access. Organizations using affected Siemens devices should take immediate action to apply mitigations and ensure network security.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router Family,Scalance M816-1 Adsl-router Family,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M874-3 3g-router (cn),Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (a1),Scalance Mum853-1 (b1),Scalance Mum853-1 (eu),Scalance Mum856-1 (a1),Scalance Mum856-1 (b1),Scalance Mum856-1 (cn),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router,Scalance Xb205-3 (sc, Pn),Scalance Xb205-3 (st, E/ip),Scalance Xb205-3 (st, Pn),Scalance Xb205-3ld (sc, E/ip),Scalance Xb205-3ld (sc, Pn),Scalance Xb208 (e/ip),Scalance Xb208 (pn),Scalance Xb213-3 (sc, E/ip),Scalance Xb213-3 (sc, Pn),Scalance Xb213-3 (st, E/ip),Scalance Xb213-3 (st, Pn),Scalance Xb213-3ld (sc, E/ip),Scalance Xb213-3ld (sc, Pn),Scalance Xb216 (e/ip),Scalance Xb216 (pn),Scalance Xc206-2 (sc),Scalance Xc206-2 (st/bfoc),Scalance Xc206-2g Poe,Scalance Xc206-2g Poe (54 V Dc),Scalance Xc206-2g Poe Eec (54 V Dc),Scalance Xc206-2sfp,Scalance Xc206-2sfp Eec,Scalance Xc206-2sfp G,Scalance Xc206-2sfp G (eip Def.),Scalance Xc206-2sfp G Eec,Scalance Xc208,Scalance Xc208eec,Scalance Xc208g,Scalance Xc208g (eip Def.),Scalance Xc208g Eec,Scalance Xc208g Poe,Scalance Xc208g Poe (54 V Dc),Scalance Xc216,Scalance Xc216-3g Poe,Scalance Xc216-3g Poe (54 V Dc),Scalance Xc216-4c,Scalance Xc216-4c G,Scalance Xc216-4c G (eip Def.),Scalance Xc216-4c G Eec,Scalance Xc216eec,Scalance Xc224,Scalance Xc224-4c G,Scalance Xc224-4c G (eip Def.),Scalance Xc224-4c G Eec,Scalance Xf204,Scalance Xf204 Dna,Scalance Xf204-2ba,Scalance Xf204-2ba Dna,Scalance Xp208,Scalance Xp208 (ethernet/ip),Scalance Xp208eec,Scalance Xp208poe Eec,Scalance Xp216,Scalance Xp216 (ethernet/ip),Scalance Xp216eec,Scalance Xp216poe Eec,Scalance Xr324wg (24 X Fe, Ac 230v),Scalance Xr324wg (24 X Fe, Dc 24v),Scalance Xr326-2c Poe Wg,Scalance Xr326-2c Poe Wg (without Ul),Scalance Xr328-4c Wg (24xfe, 4xge, 24v),Scalance Xr328-4c Wg (24xfe, 4xge,dc24v),Scalance Xr328-4c Wg (24xfe,4xge,ac230v),Scalance Xr328-4c Wg (28xge, Ac 230v),Scalance Xr328-4c Wg (28xge, Dc 24v),Siplus Net Scalance Xc206-2,Siplus Net Scalance Xc206-2sfp,Siplus Net Scalance Xc208,Siplus Net Scalance Xc216-4c",6.5,MEDIUM,0.0021299999207258224,false,,false,false,false,,,false,false,,2023-11-14T11:15:00.000Z,0 CVE-2023-44322,https://securityvulnerability.io/vulnerability/CVE-2023-44322,Email Disruption Vulnerability in Siemens Ruggedcom and Scalance Products,"A vulnerability found in Siemens RUGGEDCOM and SCALANCE products allows attackers with network access to disrupt email notifications. When the affected devices receive an invalid response from the SMTP server, an error is triggered which disrupts email communication. This failure can result in users not being notified of critical events, posing a risk to operational security.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (eu),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router,Scalance Wab762-1,Scalance Wam763-1,Scalance Wam763-1 (me),Scalance Wam763-1 (us),Scalance Wam766-1,Scalance Wam766-1 (me),Scalance Wam766-1 (us),Scalance Wam766-1 Eec,Scalance Wam766-1 Eec (me),Scalance Wam766-1 Eec (us),Scalance Wub762-1,Scalance Wub762-1 Ifeatures,Scalance Wum763-1,Scalance Wum763-1 (us),Scalance Wum766-1,Scalance Wum766-1 (me),Scalance Wum766-1 (usa)",5.9,MEDIUM,0.00203999993391335,false,,false,false,false,,,false,false,,2023-11-14T11:15:00.000Z,0 CVE-2023-44373,https://securityvulnerability.io/vulnerability/CVE-2023-44373,Input Sanitization Flaw in RUGGEDCOM and SCALANCE Devices by Siemens,"The identified flaw in Siemens' RUGGEDCOM and SCALANCE devices involves inadequate sanitization of an input field. This vulnerability permits authenticated remote attackers with administrative access to execute arbitrary code or launch a system root shell, thereby compromising the integrity and security of the affected systems. Users are advised to update to the latest firmware versions to mitigate potential security risks associated with this vulnerability.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (eu),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router,Scalance Wab762-1,Scalance Wam763-1,Scalance Wam763-1 (me),Scalance Wam763-1 (us),Scalance Wam766-1 (eu),Scalance Wam766-1 (me),Scalance Wam766-1 (us),Scalance Wam766-1 Eec (eu),Scalance Wam766-1 Eec (me),Scalance Wam766-1 Eec (us),Scalance Wub762-1,Scalance Wum763-1,Scalance Wum763-1 (us),Scalance Wum766-1 (eu),Scalance Wum766-1 (me),Scalance Wum766-1 (us)",9.1,CRITICAL,0.000859999970998615,false,,false,false,false,,,false,false,,2023-11-14T11:15:00.000Z,0 CVE-2022-46143,https://securityvulnerability.io/vulnerability/CVE-2022-46143,Buffer Read Vulnerability in Siemens Devices Due to TFTP Misconfiguration,"The vulnerability arises from Siemens devices failing to correctly validate the TFTP blocksize. An authenticated attacker can exploit this oversight to read from an uninitialized buffer, potentially exposing previously allocated data. This presents a significant security concern as it could lead to unauthorized access to sensitive information stored in the affected devices.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (eu),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router,Scalance Sc622-2c,Scalance Sc626-2c,Scalance Sc632-2c,Scalance Sc636-2c,Scalance Sc642-2c,Scalance Sc646-2c,Scalance W1748-1 M12,Scalance W1788-1 M12,Scalance W1788-2 Eec M12,Scalance W1788-2 M12,Scalance W1788-2ia M12,Scalance W721-1 Rj45,Scalance W722-1 Rj45,Scalance W734-1 Rj45,Scalance W734-1 Rj45 (usa),Scalance W738-1 M12,Scalance W748-1 M12,Scalance W748-1 Rj45,Scalance W761-1 Rj45,Scalance W774-1 M12 Eec,Scalance W774-1 Rj45,Scalance W774-1 Rj45 (usa),Scalance W778-1 M12,Scalance W778-1 M12 Eec,Scalance W778-1 M12 Eec (usa),Scalance W786-1 Rj45,Scalance W786-2 Rj45,Scalance W786-2 Sfp,Scalance W786-2ia Rj45,Scalance W788-1 M12,Scalance W788-1 Rj45,Scalance W788-2 M12,Scalance W788-2 M12 Eec,Scalance W788-2 Rj45,Scalance Wam763-1,Scalance Wam766-1 (eu),Scalance Wam766-1 (us),Scalance Wam766-1 Eec (eu),Scalance Wam766-1 Eec (us),Scalance Wum763-1,Scalance Wum766-1 (eu),Scalance Wum766-1 (us),Scalance Xb205-3 (sc, Pn),Scalance Xb205-3 (st, E/ip),Scalance Xb205-3 (st, Pn),Scalance Xb205-3ld (sc, E/ip),Scalance Xb205-3ld (sc, Pn),Scalance Xb208 (e/ip),Scalance Xb208 (pn),Scalance Xb213-3 (sc, E/ip),Scalance Xb213-3 (sc, Pn),Scalance Xb213-3 (st, E/ip),Scalance Xb213-3 (st, Pn),Scalance Xb213-3ld (sc, E/ip),Scalance Xb213-3ld (sc, Pn),Scalance Xb216 (e/ip),Scalance Xb216 (pn),Scalance Xc206-2 (sc),Scalance Xc206-2 (st/bfoc),Scalance Xc206-2g Poe,Scalance Xc206-2g Poe (54 V Dc),Scalance Xc206-2g Poe Eec (54 V Dc),Scalance Xc206-2sfp,Scalance Xc206-2sfp Eec,Scalance Xc206-2sfp G,Scalance Xc206-2sfp G (eip Def.),Scalance Xc206-2sfp G Eec,Scalance Xc208,Scalance Xc208eec,Scalance Xc208g,Scalance Xc208g (eip Def.),Scalance Xc208g Eec,Scalance Xc208g Poe,Scalance Xc208g Poe (54 V Dc),Scalance Xc216,Scalance Xc216-3g Poe,Scalance Xc216-3g Poe (54 V Dc),Scalance Xc216-4c,Scalance Xc216-4c G,Scalance Xc216-4c G (eip Def.),Scalance Xc216-4c G Eec,Scalance Xc216eec,Scalance Xc224,Scalance Xc224-4c G,Scalance Xc224-4c G (eip Def.),Scalance Xc224-4c G Eec,Scalance Xf204,Scalance Xf204 Dna,Scalance Xf204-2ba,Scalance Xf204-2ba Dna,Scalance Xm408-4c,Scalance Xm408-4c (l3 Int.),Scalance Xm408-8c,Scalance Xm408-8c (l3 Int.),Scalance Xm416-4c,Scalance Xm416-4c (l3 Int.),Scalance Xp208,Scalance Xp208 (ethernet/ip),Scalance Xp208eec,Scalance Xp208poe Eec,Scalance Xp216,Scalance Xp216 (ethernet/ip),Scalance Xp216eec,Scalance Xp216poe Eec,Scalance Xr324wg (24 X Fe, Ac 230v),Scalance Xr324wg (24 X Fe, Dc 24v),Scalance Xr326-2c Poe Wg,Scalance Xr326-2c Poe Wg (without Ul),Scalance Xr328-4c Wg (24xfe, 4xge, 24v),Scalance Xr328-4c Wg (24xfe, 4xge,dc24v),Scalance Xr328-4c Wg (24xfe,4xge,ac230v),Scalance Xr328-4c Wg (28xge, Ac 230v),Scalance Xr328-4c Wg (28xge, Dc 24v),Scalance Xr524-8c, 1x230v,Scalance Xr524-8c, 1x230v (l3 Int.),Scalance Xr524-8c, 24v,Scalance Xr524-8c, 24v (l3 Int.),Scalance Xr524-8c, 2x230v,Scalance Xr524-8c, 2x230v (l3 Int.),Scalance Xr526-8c, 1x230v,Scalance Xr526-8c, 1x230v (l3 Int.),Scalance Xr526-8c, 24v,Scalance Xr526-8c, 24v (l3 Int.),Scalance Xr526-8c, 2x230v,Scalance Xr526-8c, 2x230v (l3 Int.),Scalance Xr528-6m,Scalance Xr528-6m (2hr2, L3 Int.),Scalance Xr528-6m (2hr2),Scalance Xr528-6m (l3 Int.),Scalance Xr552-12m,Scalance Xr552-12m (2hr2, L3 Int.),Scalance Xr552-12m (2hr2),Siplus Net Scalance Xc206-2,Siplus Net Scalance Xc206-2sfp,Siplus Net Scalance Xc208,Siplus Net Scalance Xc216-4c",2.7,LOW,0.00044999999227002263,false,,false,false,false,,,false,false,,2022-12-13T00:00:00.000Z,0 CVE-2022-31766,https://securityvulnerability.io/vulnerability/CVE-2022-31766,Denial of Service in RUGGEDCOM and SCALANCE Products by Siemens,"A vulnerability has been found in select RUGGEDCOM and SCALANCE devices, where enabling TCP Event service can lead to improper handling of malformed packets. This can lead to an unauthenticated remote attacker causing a denial of service, resulting in device reboot and potential impact on network resources. Users are encouraged to update to versions V7.1.2 or higher to mitigate this risk.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (eu),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router,Scalance Wam763-1,Scalance Wam766-1,Scalance Wam766-1 (us),Scalance Wam766-1 Eec,Scalance Wam766-1 Eec (us),Scalance Wum763-1,Scalance Wum766-1,Scalance Wum766-1 (usa)",8.6,HIGH,0.0005099999834783375,false,,false,false,false,,,false,false,,2022-10-11T00:00:00.000Z,0 CVE-2022-34821,https://securityvulnerability.io/vulnerability/CVE-2022-34821,Arbitrary Code Execution Vulnerability in Siemens Networking Products,"A vulnerability exists in certain Siemens devices that allows an attacker to execute arbitrary code with elevated privileges by injecting malicious commands into specific OpenVPN configuration options. This can lead to significant security risks, potentially allowing unauthorized access to sensitive systems and data.",Siemens,"Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (eu),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router,Scalance Sc622-2c,Scalance Sc626-2c,Scalance Sc632-2c,Scalance Sc636-2c,Scalance Sc642-2c,Scalance Sc646-2c,Scalance Wab762-1,Scalance Wam763-1,Scalance Wam763-1 (me),Scalance Wam763-1 (us),Scalance Wam766-1,Scalance Wam766-1 (me),Scalance Wam766-1 (us),Scalance Wam766-1 Eec,Scalance Wam766-1 Eec (me),Scalance Wam766-1 Eec (us),Scalance Wub762-1,Scalance Wub762-1 Ifeatures,Scalance Wum763-1,Scalance Wum763-1 (us),Scalance Wum766-1,Scalance Wum766-1 (me),Scalance Wum766-1 (usa),Simatic Cp 1242-7 V2,Simatic Cp 1243-1,Simatic Cp 1243-7 Lte Eu,Simatic Cp 1243-7 Lte Us,Simatic Cp 1243-8 Irc,Simatic Cp 1542sp-1 Irc,Simatic Cp 1543-1,Simatic Cp 1543sp-1,Siplus Et 200sp Cp 1542sp-1 Irc Tx Rail,Siplus Et 200sp Cp 1543sp-1 Isec,Siplus Et 200sp Cp 1543sp-1 Isec Tx Rail,Siplus Net Cp 1242-7 V2,Siplus Net Cp 1543-1,Siplus S7-1200 Cp 1243-1,Siplus S7-1200 Cp 1243-1 Rail",8.8,HIGH,0.0006399999838322401,false,,false,false,false,,,false,false,,2022-07-12T00:00:00.000Z,0 CVE-2020-28400,https://securityvulnerability.io/vulnerability/CVE-2020-28400,Denial of Service Vulnerability in Siemens Industrial Devices,"Siemens Industrial Devices are susceptible to a vulnerability that enables unauthenticated attackers to induce a denial of service. By sending a large volume of DCP reset packets to the device, attackers can disrupt device operations, leading to potential outages and service degradation. This poses significant risks for systems relying on these devices, affecting both functionality and availability.",Siemens,"Development/evaluation Kits For Profinet Io: Dk Standard Ethernet Controller,Development/evaluation Kits For Profinet Io: Ek-ertec 200,Development/evaluation Kits For Profinet Io: Ek-ertec 200p,Ruggedcom Rm1224 Lte(4g) Eu,Ruggedcom Rm1224 Lte(4g) Nam,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M874-3 3g-router (cn),Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4,Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance Mum853-1 (a1),Scalance Mum853-1 (b1),Scalance Mum853-1 (eu),Scalance Mum856-1 (a1),Scalance Mum856-1 (b1),Scalance Mum856-1 (cn),Scalance Mum856-1 (eu),Scalance Mum856-1 (row),Scalance S615 Eec Lan-router,Scalance S615 Lan-router,Scalance W1748-1 M12,Scalance W1788-1 M12,Scalance W1788-2 Eec M12,Scalance W1788-2 M12,Scalance W1788-2ia M12,Scalance W721-1 Rj45,Scalance W722-1 Rj45,Scalance W734-1 Rj45,Scalance W734-1 Rj45 (usa),Scalance W738-1 M12,Scalance W748-1 M12,Scalance W748-1 Rj45,Scalance W761-1 Rj45,Scalance W774-1 M12 Eec,Scalance W774-1 Rj45,Scalance W774-1 Rj45 (usa),Scalance W778-1 M12,Scalance W778-1 M12 Eec,Scalance W778-1 M12 Eec (usa),Scalance W786-1 Rj45,Scalance W786-2 Rj45,Scalance W786-2 Sfp,Scalance W786-2ia Rj45,Scalance W788-1 M12,Scalance W788-1 Rj45,Scalance W788-2 M12,Scalance W788-2 M12 Eec,Scalance W788-2 Rj45,Scalance X200-4p Irt,Scalance X201-3p Irt,Scalance X201-3p Irt Pro,Scalance X202-2irt,Scalance X202-2p Irt,Scalance X202-2p Irt Pro,Scalance X204-2,Scalance X204-2fm,Scalance X204-2ld,Scalance X204-2ld Ts,Scalance X204-2ts,Scalance X204irt,Scalance X204irt Pro,Scalance X206-1,Scalance X206-1ld,Scalance X208,Scalance X208pro,Scalance X212-2,Scalance X212-2ld,Scalance X216,Scalance X224,Scalance X302-7 Eec (230v, Coated),Scalance X302-7 Eec (230v),Scalance X302-7 Eec (24v, Coated),Scalance X302-7 Eec (24v),Scalance X302-7 Eec (2x 230v, Coated),Scalance X302-7 Eec (2x 230v),Scalance X302-7 Eec (2x 24v, Coated),Scalance X302-7 Eec (2x 24v),Scalance X304-2fe,Scalance X306-1ld Fe,Scalance X307-2 Eec (230v, Coated),Scalance X307-2 Eec (230v),Scalance X307-2 Eec (24v, Coated),Scalance X307-2 Eec (24v),Scalance X307-2 Eec (2x 230v, Coated),Scalance X307-2 Eec (2x 230v),Scalance X307-2 Eec (2x 24v, Coated),Scalance X307-2 Eec (2x 24v),Scalance X307-3,Scalance X307-3ld,Scalance X308-2,Scalance X308-2ld,Scalance X308-2lh,Scalance X308-2lh+,Scalance X308-2m,Scalance X308-2m Poe,Scalance X308-2m Ts,Scalance X310,Scalance X310fe,Scalance X320-1 Fe,Scalance X320-1-2ld Fe,Scalance X408-2,Scalance Xb205-3 (sc, Pn),Scalance Xb205-3 (st, E/ip),Scalance Xb205-3 (st, Pn),Scalance Xb205-3ld (sc, E/ip),Scalance Xb205-3ld (sc, Pn),Scalance Xb208 (e/ip),Scalance Xb208 (pn),Scalance Xb213-3 (sc, E/ip),Scalance Xb213-3 (sc, Pn),Scalance Xb213-3 (st, E/ip),Scalance Xb213-3 (st, Pn),Scalance Xb213-3ld (sc, E/ip),Scalance Xb213-3ld (sc, Pn),Scalance Xb216 (e/ip),Scalance Xb216 (pn),Scalance Xc206-2 (sc),Scalance Xc206-2 (st/bfoc),Scalance Xc206-2g Poe,Scalance Xc206-2g Poe (54 V Dc),Scalance Xc206-2g Poe Eec (54 V Dc),Scalance Xc206-2sfp,Scalance Xc206-2sfp Eec,Scalance Xc206-2sfp G,Scalance Xc206-2sfp G (eip Def.),Scalance Xc206-2sfp G Eec,Scalance Xc208,Scalance Xc208eec,Scalance Xc208g,Scalance Xc208g (eip Def.),Scalance Xc208g Eec,Scalance Xc208g Poe,Scalance Xc208g Poe (54 V Dc),Scalance Xc216,Scalance Xc216-3g Poe,Scalance Xc216-3g Poe (54 V Dc),Scalance Xc216-4c,Scalance Xc216-4c G,Scalance Xc216-4c G (eip Def.),Scalance Xc216-4c G Eec,Scalance Xc216eec,Scalance Xc224,Scalance Xc224-4c G,Scalance Xc224-4c G (eip Def.),Scalance Xc224-4c G Eec,Scalance Xf201-3p Irt,Scalance Xf202-2p Irt,Scalance Xf204,Scalance Xf204 Dna,Scalance Xf204-2,Scalance Xf204-2ba,Scalance Xf204-2ba Dna,Scalance Xf204-2ba Irt,Scalance Xf204irt,Scalance Xf206-1,Scalance Xf208,Scalance Xm408-4c,Scalance Xm408-4c (l3 Int.),Scalance Xm408-8c,Scalance Xm408-8c (l3 Int.),Scalance Xm416-4c,Scalance Xm416-4c (l3 Int.),Scalance Xp208,Scalance Xp208 (ethernet/ip),Scalance Xp208eec,Scalance Xp208poe Eec,Scalance Xp216,Scalance Xp216 (ethernet/ip),Scalance Xp216eec,Scalance Xp216poe Eec,Scalance Xr324-12m (230v, Ports On Front),Scalance Xr324-12m (230v, Ports On Rear),Scalance Xr324-12m (24v, Ports On Front),Scalance Xr324-12m (24v, Ports On Rear),Scalance Xr324-12m Ts (24v),Scalance Xr324-4m Eec (100-240vac/60-250vdc, Ports On Front),Scalance Xr324-4m Eec (100-240vac/60-250vdc, Ports On Rear),Scalance Xr324-4m Eec (24v, Ports On Front),Scalance Xr324-4m Eec (24v, Ports On Rear),Scalance Xr324-4m Eec (2x 100-240vac/60-250vdc, Ports On Front),Scalance Xr324-4m Eec (2x 100-240vac/60-250vdc, Ports On Rear),Scalance Xr324-4m Eec (2x 24v, Ports On Front),Scalance Xr324-4m Eec (2x 24v, Ports On Rear),Scalance Xr324-4m Poe (230v, Ports On Front),Scalance Xr324-4m Poe (230v, Ports On Rear),Scalance Xr324-4m Poe (24v, Ports On Front),Scalance Xr324-4m Poe (24v, Ports On Rear),Scalance Xr324-4m Poe Ts (24v, Ports On Front),Scalance Xr324wg (24 X Fe, Ac 230v),Scalance Xr324wg (24 X Fe, Dc 24v),Scalance Xr326-2c Poe Wg,Scalance Xr326-2c Poe Wg (without Ul),Scalance Xr328-4c Wg (24xfe, 4xge, 24v),Scalance Xr328-4c Wg (24xfe, 4xge,dc24v),Scalance Xr328-4c Wg (24xfe,4xge,ac230v),Scalance Xr328-4c Wg (28xge, Ac 230v),Scalance Xr328-4c Wg (28xge, Dc 24v),Scalance Xr524-8c, 1x230v,Scalance Xr524-8c, 1x230v (l3 Int.),Scalance Xr524-8c, 24v,Scalance Xr524-8c, 24v (l3 Int.),Scalance Xr524-8c, 2x230v,Scalance Xr524-8c, 2x230v (l3 Int.),Scalance Xr526-8c, 1x230v,Scalance Xr526-8c, 1x230v (l3 Int.),Scalance Xr526-8c, 24v,Scalance Xr526-8c, 24v (l3 Int.),Scalance Xr526-8c, 2x230v,Scalance Xr526-8c, 2x230v (l3 Int.),Scalance Xr528-6m,Scalance Xr528-6m (2hr2, L3 Int.),Scalance Xr528-6m (2hr2),Scalance Xr528-6m (l3 Int.),Scalance Xr552-12m,Scalance Xr552-12m (2hr2, L3 Int.),Scalance Xr552-12m (2hr2),Simatic Cfu Diq,Simatic Cfu Pa,Simatic Cm 1542-1,Simatic Cp 1604,Simatic Cp 1616,Simatic Cp 1626,Simatic Ie/pb-link,Simatic Mv540 H,Simatic Mv540 S,Simatic Mv550 H,Simatic Mv550 S,Simatic Mv560 U,Simatic Mv560 X,Simatic Net Dk-16xx Pn Io,Simatic Power Line Booster Plb, Base Module,Simatic Profinet Driver,Simatic S7-1200 Cpu Family (incl. Siplus Variants),Simocode Pro V Ethernet/ip (incl. Siplus Variants),Simocode Pro V Profinet (incl. Siplus Variants),Siplus Net Scalance X308-2,Siplus Net Scalance Xc206-2,Siplus Net Scalance Xc206-2sfp,Siplus Net Scalance Xc208,Siplus Net Scalance Xc216-4c,Softnet-ie Pnio",7.5,HIGH,0.002850000048056245,false,,false,false,false,,,false,false,,2021-07-13T11:02:49.000Z,0 CVE-2019-13946,https://securityvulnerability.io/vulnerability/CVE-2019-13946,Denial of Service Vulnerability in Profinet-IO Stack by Siemens,"The Profinet-IO stack versions prior to V06.00 are susceptible to a denial of service vulnerability stemming from inadequate limitations on internal resource allocation. When multiple legitimate diagnostic package requests are sent to the DCE-RPC interface, an attacker with network access can exploit this issue to deplete memory resources, potentially leading to the unavailability of the device. The exploitation of this vulnerability does not require system privileges or user interaction, making it particularly concerning for network management.",Siemens,"Development/evaluation Kits For Profinet Io: Dk Standard Ethernet Controller,Development/evaluation Kits For Profinet Io: Ek-ertec 200,Development/evaluation Kits For Profinet Io: Ek-ertec 200p,Profinet Driver For Controller,Ruggedcom Rm1224 Family,Scalance M804pb,Scalance M812-1 Adsl-router,Scalance M816-1 Adsl-router,Scalance M826-2 Shdsl-router,Scalance M874-2,Scalance M874-3,Scalance M876-3,Scalance M876-3 (rok),Scalance M876-4 (eu),Scalance M876-4 (nam),Scalance S615 Lan-router,Scalance W-700 Ieee 802.11n Family,Scalance X200-4p Irt,Scalance X201-3p Irt,Scalance X201-3p Irt Pro,Scalance X202-2irt,Scalance X202-2p Irt,Scalance X202-2p Irt Pro,Scalance X204-2,Scalance X204-2fm,Scalance X204-2ld,Scalance X204-2ld Ts,Scalance X204-2ts,Scalance X204irt,Scalance X204irt Pro,Scalance X206-1,Scalance X206-1ld,Scalance X208,Scalance X208pro,Scalance X212-2,Scalance X212-2ld,Scalance X216,Scalance X224,Scalance X302-7 Eec (230v, Coated),Scalance X302-7 Eec (230v),Scalance X302-7 Eec (24v, Coated),Scalance X302-7 Eec (24v),Scalance X302-7 Eec (2x 230v, Coated),Scalance X302-7 Eec (2x 230v),Scalance X302-7 Eec (2x 24v, Coated),Scalance X302-7 Eec (2x 24v),Scalance X304-2fe,Scalance X306-1ld Fe,Scalance X307-2 Eec (230v, Coated),Scalance X307-2 Eec (230v),Scalance X307-2 Eec (24v, Coated),Scalance X307-2 Eec (24v),Scalance X307-2 Eec (2x 230v, Coated),Scalance X307-2 Eec (2x 230v),Scalance X307-2 Eec (2x 24v, Coated),Scalance X307-2 Eec (2x 24v),Scalance X307-3,Scalance X307-3ld,Scalance X308-2,Scalance X308-2ld,Scalance X308-2lh,Scalance X308-2lh+,Scalance X308-2m,Scalance X308-2m Poe,Scalance X308-2m Ts,Scalance X310,Scalance X310fe,Scalance X320-1 Fe,Scalance X320-1-2ld Fe,Scalance X408-2,Scalance Xb-200 Family,Scalance Xc-200,Scalance Xf-200ba,Scalance Xf201-3p Irt,Scalance Xf202-2p Irt,Scalance Xf204,Scalance Xf204-2,Scalance Xf204-2ba Irt,Scalance Xf204irt,Scalance Xf206-1,Scalance Xf208,Scalance Xm-400 Family,Scalance Xp-200,Scalance Xr-300wg Family,Scalance Xr-500 Family,Scalance Xr324-12m (230v, Ports On Front),Scalance Xr324-12m (230v, Ports On Rear),Scalance Xr324-12m (24v, Ports On Front),Scalance Xr324-12m (24v, Ports On Rear),Scalance Xr324-12m Ts (24v),Scalance Xr324-4m Eec (100-240vac/60-250vdc, Ports On Front),Scalance Xr324-4m Eec (100-240vac/60-250vdc, Ports On Rear),Scalance Xr324-4m Eec (24v, Ports On Front),Scalance Xr324-4m Eec (24v, Ports On Rear),Scalance Xr324-4m Eec (2x 100-240vac/60-250vdc, Ports On Front),Scalance Xr324-4m Eec (2x 100-240vac/60-250vdc, Ports On Rear),Scalance Xr324-4m Eec (2x 24v, Ports On Front),Scalance Xr324-4m Eec (2x 24v, Ports On Rear),Scalance Xr324-4m Poe (230v, Ports On Front),Scalance Xr324-4m Poe (230v, Ports On Rear),Scalance Xr324-4m Poe (24v, Ports On Front),Scalance Xr324-4m Poe (24v, Ports On Rear),Scalance Xr324-4m Poe Ts (24v, Ports On Front),Simatic Cp 1616 And Cp 1604,Simatic Cp 343-1,Simatic Cp 343-1 Advanced,Simatic Cp 343-1 Erpc,Simatic Cp 343-1 Lean,Simatic Cp 443-1,Simatic Cp 443-1 Advanced,Simatic Cp 443-1 Opc Ua,Simatic Et 200al Im 157-1 Pn,Simatic Et 200m Im 153-4 Pn Io Hf (incl. Siplus Variants),Simatic Et 200m Im 153-4 Pn Io St (incl. Siplus Variants),Simatic Et 200mp Im 155-5 Pn Hf,Simatic Et 200mp Im 155-5 Pn St,Simatic Et 200pro Im 154-3 Pn Hf,Simatic Et 200pro Im 154-4 Pn Hf,Simatic Et 200sp Im 155-6 Pn Ba,Simatic Et 200sp Im 155-6 Pn Hf,Simatic Et 200sp Im 155-6 Pn St,Simatic Et 200sp Im 155-6 Pn St Ba,Simatic Et200ecopn, 16di, Dc24v, 8xm12,Simatic Et200ecopn, 16do Dc24v/1,3a, 8xm12,Simatic Et200ecopn, 4ao U/i 4xm12,Simatic Et200ecopn, 8 Dio, Dc24v/1,3a, 8xm12,Simatic Et200ecopn, 8 Do, Dc24v/2a, 8xm12,Simatic Et200ecopn, 8ai Rtd/tc 8xm12,Simatic Et200ecopn, 8ai; 4 U/i; 4 Rtd/tc 8xm12,Simatic Et200ecopn, 8di, Dc24v, 4xm12,Simatic Et200ecopn, 8di, Dc24v, 8xm12,Simatic Et200ecopn, 8do, Dc24v/0,5a, 4xm12,Simatic Et200ecopn, 8do, Dc24v/1,3a, 4xm12,Simatic Et200ecopn, 8do, Dc24v/1,3a, 8xm12,Simatic Et200ecopn: Io-link Master,Simatic Et200s (incl. Siplus Variants),Simatic Ipc Support, Package For Vxworks,Simatic Mv420 Sr-b,Simatic Mv420 Sr-b Body,Simatic Mv420 Sr-p,Simatic Mv420 Sr-p Body,Simatic Mv440 Hr,Simatic Mv440 Sr,Simatic Mv440 Ur,Simatic Pn/pn Coupler (incl. Siplus Net Variants),Simatic Rf180c,Simatic Rf182c,Simatic Rf600r Family,Simotion C,Simotion D,Simotion P,Sinamics Dcp,Siplus Et 200mp Im 155-5 Pn Hf,Siplus Et 200mp Im 155-5 Pn Hf T1 Rail,Siplus Et 200mp Im 155-5 Pn St,Siplus Et 200mp Im 155-5 Pn St Tx Rail,Siplus Et 200sp Im 155-6 Pn Hf,Siplus Et 200sp Im 155-6 Pn Hf T1 Rail,Siplus Et 200sp Im 155-6 Pn St,Siplus Et 200sp Im 155-6 Pn St Ba,Siplus Et 200sp Im 155-6 Pn St Ba Tx Rail,Siplus Et 200sp Im 155-6 Pn St Tx Rail,Siplus Net Cp 343-1,Siplus Net Cp 343-1 Advanced,Siplus Net Cp 343-1 Lean,Siplus Net Cp 443-1,Siplus Net Cp 443-1 Advanced,Siplus Net Scalance X308-2,Softnet-ie Pnio",7.5,HIGH,0.0012000000569969416,false,,false,false,false,,,false,false,,2020-02-11T15:36:10.000Z,0