Products
SIMATIC Reader RF610R CMIIT (6GT2811-6BC10-2AA0)
- All versions < V4.2
SIMATIC Reader RF610R ETSI (6GT2811-6BC10-0AA0)
- All versions < V4.2
SIMATIC Reader RF610R FCC (6GT2811-6BC10-1AA0)
- All versions < V4.2
SIMATIC Reader RF615R CMIIT (6GT2811-6CC10-2AA0)
- All versions < V4.2
SIMATIC Reader RF615R ETSI (6GT2811-6CC10-0AA0)
- All versions < V4.2
SIMATIC Reader RF615R FCC (6GT2811-6CC10-1AA0)
- All versions < V4.2
SIMATIC Reader RF650R ARIB (6GT2811-6AB20-4AA0)
- All versions < V4.2
SIMATIC Reader RF650R CMIIT (6GT2811-6AB20-2AA0)
- All versions < V4.2
SIMATIC Reader RF650R ETSI (6GT2811-6AB20-0AA0)
- All versions < V4.2
SIMATIC Reader RF650R FCC (6GT2811-6AB20-1AA0)
- All versions < V4.2
SIMATIC Reader RF680R ARIB (6GT2811-6AA10-4AA0)
- All versions < V4.2
SIMATIC Reader RF680R CMIIT (6GT2811-6AA10-2AA0)
- All versions < V4.2
SIMATIC Reader RF680R ETSI (6GT2811-6AA10-0AA0)
- All versions < V4.2
SIMATIC Reader RF680R FCC (6GT2811-6AA10-1AA0)
- All versions < V4.2
SIMATIC Reader RF685R ARIB (6GT2811-6CA10-4AA0)
- All versions < V4.2
SIMATIC Reader RF685R CMIIT (6GT2811-6CA10-2AA0)
- All versions < V4.2
SIMATIC Reader RF685R ETSI (6GT2811-6CA10-0AA0)
- All versions < V4.2
SIMATIC Reader RF685R FCC (6GT2811-6CA10-1AA0)
- All versions < V4.2
SIMATIC RF1140R (6GT2831-6CB00)
- All versions < V1.1
SIMATIC RF1170R (6GT2831-6BB00)
- All versions < V1.1
SIMATIC RF166C (6GT2002-0EE20)
- All versions < V2.2
SIMATIC RF185C (6GT2002-0JE10)
- All versions < V2.2
SIMATIC RF186C (6GT2002-0JE20)
- All versions < V2.2
SIMATIC RF186CI (6GT2002-0JE50)
- All versions < V2.2
SIMATIC RF188C (6GT2002-0JE40)
- All versions < V2.2
SIMATIC RF188CI (6GT2002-0JE60)
- All versions < V2.2
SIMATIC RF360R (6GT2801-5BA30)
- All versions < V2.2
Source
productcert@siemens.com
Tags
CVE-2024-37990 details
Last Modified : Sept. 10, 2024, 12:09 p.m.
Description
A vulnerability has been identified in SIMATIC Reader RF610R CMIIT (6GT2811-6BC10-2AA0) (All versions < V4.2), SIMATIC Reader RF610R ETSI (6GT2811-6BC10-0AA0) (All versions < V4.2), SIMATIC Reader RF610R FCC (6GT2811-6BC10-1AA0) (All versions < V4.2), SIMATIC Reader RF615R CMIIT (6GT2811-6CC10-2AA0) (All versions < V4.2), SIMATIC Reader RF615R ETSI (6GT2811-6CC10-0AA0) (All versions < V4.2), SIMATIC Reader RF615R FCC (6GT2811-6CC10-1AA0) (All versions < V4.2), SIMATIC Reader RF650R ARIB (6GT2811-6AB20-4AA0) (All versions < V4.2), SIMATIC Reader RF650R CMIIT (6GT2811-6AB20-2AA0) (All versions < V4.2), SIMATIC Reader RF650R ETSI (6GT2811-6AB20-0AA0) (All versions < V4.2), SIMATIC Reader RF650R FCC (6GT2811-6AB20-1AA0) (All versions < V4.2), SIMATIC Reader RF680R ARIB (6GT2811-6AA10-4AA0) (All versions < V4.2), SIMATIC Reader RF680R CMIIT (6GT2811-6AA10-2AA0) (All versions < V4.2), SIMATIC Reader RF680R ETSI (6GT2811-6AA10-0AA0) (All versions < V4.2), SIMATIC Reader RF680R FCC (6GT2811-6AA10-1AA0) (All versions < V4.2), SIMATIC Reader RF685R ARIB (6GT2811-6CA10-4AA0) (All versions < V4.2), SIMATIC Reader RF685R CMIIT (6GT2811-6CA10-2AA0) (All versions < V4.2), SIMATIC Reader RF685R ETSI (6GT2811-6CA10-0AA0) (All versions < V4.2), SIMATIC Reader RF685R FCC (6GT2811-6CA10-1AA0) (All versions < V4.2), SIMATIC RF1140R (6GT2831-6CB00) (All versions < V1.1), SIMATIC RF1170R (6GT2831-6BB00) (All versions < V1.1), SIMATIC RF166C (6GT2002-0EE20) (All versions < V2.2), SIMATIC RF185C (6GT2002-0JE10) (All versions < V2.2), SIMATIC RF186C (6GT2002-0JE20) (All versions < V2.2), SIMATIC RF186CI (6GT2002-0JE50) (All versions < V2.2), SIMATIC RF188C (6GT2002-0JE40) (All versions < V2.2), SIMATIC RF188CI (6GT2002-0JE60) (All versions < V2.2), SIMATIC RF360R (6GT2801-5BA30) (All versions < V2.2). The affected applications contain configuration files which can be modified. An attacker with privilege access can modify these files and enable features that are not released for this device.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6.5 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-912 | Hidden Functionality | The product contains functionality that is not documented, not part of the specification, and not accessible through an interface or command sequence that is obvious to the product's users or administrators. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
HIGH
Base Score
6.5
Exploitability Score
1.2
Impact Score
5.2
Base Severity
MEDIUM
Vector String : CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
References
URL | Source |
---|---|
https://cert-portal.siemens.com/productcert/html/ssa-765405.html | productcert@siemens.com |