cvelist/2024/38xxx/CVE-2024-38278.json
2024-07-09 13:00:35 +00:00

447 lines
22 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-38278",
"ASSIGNER": "productcert@siemens.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been identified in RUGGEDCOM RMC8388 V5.X (All versions < V5.9.0), RUGGEDCOM RMC8388NC V5.X (All versions < V5.9.0), RUGGEDCOM RS416NCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416PNCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416v2 V5.X (All versions < V5.9.0), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.9.0), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.9.0), RUGGEDCOM RS900GNC(32M) V5.X (All versions < V5.9.0), RUGGEDCOM RS900NC(32M) V5.X (All versions < V5.9.0), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.9.0), RUGGEDCOM RSG2100NC(32M) V5.X (All versions < V5.9.0), RUGGEDCOM RSG2288 V5.X (All versions < V5.9.0), RUGGEDCOM RSG2288NC V5.X (All versions < V5.9.0), RUGGEDCOM RSG2300 V5.X (All versions < V5.9.0), RUGGEDCOM RSG2300NC V5.X (All versions < V5.9.0), RUGGEDCOM RSG2300P V5.X (All versions < V5.9.0), RUGGEDCOM RSG2300PNC V5.X (All versions < V5.9.0), RUGGEDCOM RSG2488 V5.X (All versions < V5.9.0), RUGGEDCOM RSG2488NC V5.X (All versions < V5.9.0), RUGGEDCOM RSG907R (All versions < V5.9.0), RUGGEDCOM RSG908C (All versions < V5.9.0), RUGGEDCOM RSG909R (All versions < V5.9.0), RUGGEDCOM RSG910C (All versions < V5.9.0), RUGGEDCOM RSG920P V5.X (All versions < V5.9.0), RUGGEDCOM RSG920PNC V5.X (All versions < V5.9.0), RUGGEDCOM RSL910 (All versions < V5.9.0), RUGGEDCOM RSL910NC (All versions < V5.9.0), RUGGEDCOM RST2228 (All versions < V5.9.0), RUGGEDCOM RST2228P (All versions < V5.9.0), RUGGEDCOM RST916C (All versions < V5.9.0), RUGGEDCOM RST916P (All versions < V5.9.0). The affected products with IP forwarding enabled wrongly make available certain remote services in non-managed VLANs, even if these services are not intentionally activated. An attacker could leverage this vulnerability to create a remote shell to the affected system."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-266: Incorrect Privilege Assignment",
"cweId": "CWE-266"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "RUGGEDCOM RMC8388 V5.X",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RMC8388NC V5.X",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RS416NCv2 V5.X",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RS416PNCv2 V5.X",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RS416Pv2 V5.X",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RS416v2 V5.X",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RS900 (32M) V5.X",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RS900G (32M) V5.X",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RS900GNC(32M) V5.X",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RS900NC(32M) V5.X",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RSG2100 (32M) V5.X",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RSG2100NC(32M) V5.X",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RSG2288 V5.X",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RSG2288NC V5.X",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RSG2300 V5.X",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RSG2300NC V5.X",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RSG2300P V5.X",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RSG2300PNC V5.X",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RSG2488 V5.X",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RSG2488NC V5.X",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RSG907R",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RSG908C",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RSG909R",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RSG910C",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RSG920P V5.X",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RSG920PNC V5.X",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RSL910",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RSL910NC",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RST2228",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RST2228P",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RST916C",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
},
{
"product_name": "RUGGEDCOM RST916P",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V5.9.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-170375.html",
"refsource": "MISC",
"name": "https://cert-portal.siemens.com/productcert/html/ssa-170375.html"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"baseScore": 6.6,
"baseSeverity": "MEDIUM"
}
]
}
}