### [CVE-2024-37995](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37995) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20RF1140R&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20RF1170R&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20RF166C&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20RF185C&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20RF186C&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20RF186CI&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20RF188C&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20RF188CI&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20RF360R&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF610R%20CMIIT&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF610R%20ETSI&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF610R%20FCC&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF615R%20CMIIT&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF615R%20ETSI&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF615R%20FCC&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF650R%20ARIB&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF650R%20CMIIT&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF650R%20ETSI&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF650R%20FCC&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF680R%20ARIB&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF680R%20CMIIT&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF680R%20ETSI&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF680R%20FCC&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF685R%20ARIB&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF685R%20CMIIT&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF685R%20ETSI&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF685R%20FCC&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-703%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions&color=brightgreen) ### Description A vulnerability has been identified in SIMATIC Reader RF610R CMIIT (6GT2811-6BC10-2AA0) (All versions < V4.2), SIMATIC Reader RF610R ETSI (6GT2811-6BC10-0AA0) (All versions < V4.2), SIMATIC Reader RF610R FCC (6GT2811-6BC10-1AA0) (All versions < V4.2), SIMATIC Reader RF615R CMIIT (6GT2811-6CC10-2AA0) (All versions < V4.2), SIMATIC Reader RF615R ETSI (6GT2811-6CC10-0AA0) (All versions < V4.2), SIMATIC Reader RF615R FCC (6GT2811-6CC10-1AA0) (All versions < V4.2), SIMATIC Reader RF650R ARIB (6GT2811-6AB20-4AA0) (All versions < V4.2), SIMATIC Reader RF650R CMIIT (6GT2811-6AB20-2AA0) (All versions < V4.2), SIMATIC Reader RF650R ETSI (6GT2811-6AB20-0AA0) (All versions < V4.2), SIMATIC Reader RF650R FCC (6GT2811-6AB20-1AA0) (All versions < V4.2), SIMATIC Reader RF680R ARIB (6GT2811-6AA10-4AA0) (All versions < V4.2), SIMATIC Reader RF680R CMIIT (6GT2811-6AA10-2AA0) (All versions < V4.2), SIMATIC Reader RF680R ETSI (6GT2811-6AA10-0AA0) (All versions < V4.2), SIMATIC Reader RF680R FCC (6GT2811-6AA10-1AA0) (All versions < V4.2), SIMATIC Reader RF685R ARIB (6GT2811-6CA10-4AA0) (All versions < V4.2), SIMATIC Reader RF685R CMIIT (6GT2811-6CA10-2AA0) (All versions < V4.2), SIMATIC Reader RF685R ETSI (6GT2811-6CA10-0AA0) (All versions < V4.2), SIMATIC Reader RF685R FCC (6GT2811-6CA10-1AA0) (All versions < V4.2), SIMATIC RF1140R (6GT2831-6CB00) (All versions < V1.1), SIMATIC RF1170R (6GT2831-6BB00) (All versions < V1.1), SIMATIC RF166C (6GT2002-0EE20) (All versions < V2.2), SIMATIC RF185C (6GT2002-0JE10) (All versions < V2.2), SIMATIC RF186C (6GT2002-0JE20) (All versions < V2.2), SIMATIC RF186CI (6GT2002-0JE50) (All versions < V2.2), SIMATIC RF188C (6GT2002-0JE40) (All versions < V2.2), SIMATIC RF188CI (6GT2002-0JE60) (All versions < V2.2), SIMATIC RF360R (6GT2801-5BA30) (All versions < V2.2). The affected application improperly handles error while a faulty certificate upload leading to crashing of application. This vulnerability could allow an attacker to disclose sensitive information. ### POC #### Reference No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds