2024-05-14 18:03:25 +00:00
{
"id" : "CVE-2024-27941" ,
"sourceIdentifier" : "productcert@siemens.com" ,
"published" : "2024-05-14T16:16:26.040" ,
2025-02-06 19:03:49 +00:00
"lastModified" : "2025-02-06T18:16:12.487" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-05-14 18:03:25 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "A vulnerability has been identified in RUGGEDCOM CROSSBOW (All versions < V5.5). The affected client systems do not properly sanitize input data before sending it to the SQL server. An attacker could use this vulnerability to compromise the whole database."
2024-05-19 02:03:31 +00:00
} ,
{
"lang" : "es" ,
"value" : "Se ha identificado una vulnerabilidad en RUGGEDCOM CROSSBOW (Todas las versiones < V5.5). Los sistemas cliente afectados no sanitizan adecuadamente los datos de entrada antes de enviarlos al servidor SQL. Un atacante podr\u00eda utilizar esta vulnerabilidad para comprometer toda la base de datos."
2024-05-14 18:03:25 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "productcert@siemens.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH" ,
2024-05-14 18:03:25 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-05-14 18:03:25 +00:00
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 5.9
2025-02-06 19:03:49 +00:00
} ,
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 5.9
2024-05-14 18:03:25 +00:00
}
]
} ,
"weaknesses" : [
{
"source" : "productcert@siemens.com" ,
2024-12-08 03:06:42 +00:00
"type" : "Secondary" ,
2024-05-14 18:03:25 +00:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-89"
}
]
}
] ,
2025-02-06 19:03:49 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:siemens:ruggedcom_crossbow:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "5.5" ,
"matchCriteriaId" : "5984B129-3702-4DA7-AEA9-4B538CFE5E40"
}
]
}
]
}
] ,
2024-05-14 18:03:25 +00:00
"references" : [
{
"url" : "https://cert-portal.siemens.com/productcert/html/ssa-916916.html" ,
2025-02-06 19:03:49 +00:00
"source" : "productcert@siemens.com" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://cert-portal.siemens.com/productcert/html/ssa-916916.html" ,
2025-02-06 19:03:49 +00:00
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2024-05-14 18:03:25 +00:00
}
]
}