cve/2024/CVE-2024-50558.md
2025-09-29 21:09:30 +02:00

41 lines
4.6 KiB
Markdown

### [CVE-2024-50558](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50558)
![](https://img.shields.io/static/v1?label=Product&message=RUGGEDCOM%20RM1224%20LTE(4G)%20EU&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=RUGGEDCOM%20RM1224%20LTE(4G)%20NAM&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20M804PB&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20M812-1%20ADSL-Router&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20M816-1%20ADSL-Router&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20M826-2%20SHDSL-Router&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20M874-2&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20M874-3%203G-Router%20(CN)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20M874-3&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20M876-3%20(ROK)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20M876-3&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20M876-4%20(EU)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20M876-4%20(NAM)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20M876-4&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20MUM853-1%20(A1)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20MUM853-1%20(B1)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20MUM853-1%20(EU)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20MUM856-1%20(A1)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20MUM856-1%20(B1)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20MUM856-1%20(CN)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20MUM856-1%20(EU)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20MUM856-1%20(RoW)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20S615%20EEC%20LAN-Router&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SCALANCE%20S615%20LAN-Router&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-284%3A%20Improper%20Access%20Control&color=brightgreen)
### Description
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2). Affected devices improperly manage access control for read-only users. This could allow an attacker to cause a temporary denial of service condition.
### POC
#### Reference
- https://cert-portal.siemens.com/productcert/html/ssa-354112.html
#### Github
No PoCs found on GitHub currently.