cve/2024/CVE-2024-50572.md

58 lines
7.6 KiB
Markdown
Raw Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2024-50572](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50572)
![](https://img.shields.io/static/v1?label=Product&message=RUGGEDCOM%20RM1224%20LTE(4G)%20EU&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=RUGGEDCOM%20RM1224%20LTE(4G)%20NAM&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20M804PB&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20M812-1%20ADSL-Router&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20M816-1%20ADSL-Router&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20M826-2%20SHDSL-Router&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20M874-2&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20M874-3%203G-Router%20(CN)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20M874-3&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20M876-3%20(ROK)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20M876-3&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20M876-4%20(EU)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20M876-4%20(NAM)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20M876-4&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20MUM853-1%20(A1)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20MUM853-1%20(B1)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20MUM853-1%20(EU)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20MUM856-1%20(A1)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20MUM856-1%20(B1)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20MUM856-1%20(CN)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20MUM856-1%20(EU)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20MUM856-1%20(RoW)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20S615%20EEC%20LAN-Router&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20S615%20LAN-Router&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20WAB762-1&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20WAM763-1%20(ME)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20WAM763-1%20(US)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20WAM763-1&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20WAM766-1%20(ME)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20WAM766-1%20(US)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20WAM766-1%20EEC%20(ME)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20WAM766-1%20EEC%20(US)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20WAM766-1%20EEC&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20WAM766-1&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20WUB762-1%20iFeatures&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20WUB762-1&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20WUM763-1%20(US)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20WUM763-1&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20WUM766-1%20(ME)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20WUM766-1%20(USA)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20WUM766-1&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20('Injection')&color=brightgreen)
### Description
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2), SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) (All versions < V3.0.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions < V3.0.0), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions < V3.0.0), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (All versions < V3.0.0), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions < V3.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions < V3.0.0), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) (All versions < V3.0.0), SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions < V3.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (All versions < V3.0.0), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions < V3.0.0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) (All versions < V3.0.0). Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell.
### POC
#### Reference
- https://cert-portal.siemens.com/productcert/html/ssa-354112.html
#### Github
No PoCs found on GitHub currently.