Today > vulnerabilities   -   You can now download lists of IOCs here!

CVE-2024-38278

July 9, 2024, 6:19 p.m.

CVSS Score

6.6 / 10

Product(s) Impacted

RUGGEDCOM RMC8388

  • V5.0 - V5.8.9

RUGGEDCOM RMC8388NC

  • V5.0 - V5.8.9

RUGGEDCOM RS416NCv2

  • V5.0 - V5.8.9

RUGGEDCOM RS416PNCv2

  • V5.0 - V5.8.9

RUGGEDCOM RS416Pv2

  • V5.0 - V5.8.9

RUGGEDCOM RS416v2

  • V5.0 - V5.8.9

RUGGEDCOM RS900 (32M)

  • V5.0 - V5.8.9

RUGGEDCOM RS900G (32M)

  • V5.0 - V5.8.9

RUGGEDCOM RS900GNC(32M)

  • V5.0 - V5.8.9

RUGGEDCOM RS900NC(32M)

  • V5.0 - V5.8.9

RUGGEDCOM RSG2100 (32M)

  • V5.0 - V5.8.9

RUGGEDCOM RSG2100NC(32M)

  • V5.0 - V5.8.9

RUGGEDCOM RSG2288

  • V5.0 - V5.8.9

RUGGEDCOM RSG2288NC

  • V5.0 - V5.8.9

RUGGEDCOM RSG2300

  • V5.0 - V5.8.9

RUGGEDCOM RSG2300NC

  • V5.0 - V5.8.9

RUGGEDCOM RSG2300P

  • V5.0 - V5.8.9

RUGGEDCOM RSG2300PNC

  • V5.0 - V5.8.9

RUGGEDCOM RSG2488

  • V5.0 - V5.8.9

RUGGEDCOM RSG2488NC

  • V5.0 - V5.8.9

RUGGEDCOM RSG907R

  • All versions

RUGGEDCOM RSG908C

  • All versions

RUGGEDCOM RSG909R

  • All versions

RUGGEDCOM RSG910C

  • All versions

RUGGEDCOM RSG920P

  • V5.0 - V5.8.9

RUGGEDCOM RSG920PNC

  • V5.0 - V5.8.9

RUGGEDCOM RSL910

  • All versions

RUGGEDCOM RSL910NC

  • All versions

RUGGEDCOM RST2228

  • All versions

RUGGEDCOM RST2228P

  • All versions

RUGGEDCOM RST916C

  • All versions

RUGGEDCOM RST916P

  • All versions

Description

A vulnerability has been identified in RUGGEDCOM RMC8388 V5.X (All versions < V5.9.0), RUGGEDCOM RMC8388NC V5.X (All versions < V5.9.0), RUGGEDCOM RS416NCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416PNCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416v2 V5.X (All versions < V5.9.0), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.9.0), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.9.0), RUGGEDCOM RS900GNC(32M) V5.X (All versions < V5.9.0), RUGGEDCOM RS900NC(32M) V5.X (All versions < V5.9.0), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.9.0), RUGGEDCOM RSG2100NC(32M) V5.X (All versions < V5.9.0), RUGGEDCOM RSG2288 V5.X (All versions < V5.9.0), RUGGEDCOM RSG2288NC V5.X (All versions < V5.9.0), RUGGEDCOM RSG2300 V5.X (All versions < V5.9.0), RUGGEDCOM RSG2300NC V5.X (All versions < V5.9.0), RUGGEDCOM RSG2300P V5.X (All versions < V5.9.0), RUGGEDCOM RSG2300PNC V5.X (All versions < V5.9.0), RUGGEDCOM RSG2488 V5.X (All versions < V5.9.0), RUGGEDCOM RSG2488NC V5.X (All versions < V5.9.0), RUGGEDCOM RSG907R (All versions < V5.9.0), RUGGEDCOM RSG908C (All versions < V5.9.0), RUGGEDCOM RSG909R (All versions < V5.9.0), RUGGEDCOM RSG910C (All versions < V5.9.0), RUGGEDCOM RSG920P V5.X (All versions < V5.9.0), RUGGEDCOM RSG920PNC V5.X (All versions < V5.9.0), RUGGEDCOM RSL910 (All versions < V5.9.0), RUGGEDCOM RSL910NC (All versions < V5.9.0), RUGGEDCOM RST2228 (All versions < V5.9.0), RUGGEDCOM RST2228P (All versions < V5.9.0), RUGGEDCOM RST916C (All versions < V5.9.0), RUGGEDCOM RST916P (All versions < V5.9.0). The affected products with IP forwarding enabled wrongly make available certain remote services in non-managed VLANs, even if these services are not intentionally activated. An attacker could leverage this vulnerability to create a remote shell to the affected system.

Weaknesses

CWE-266
Incorrect Privilege Assignment

A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.

CWE ID: 266

Date

Published: July 9, 2024, 12:15 p.m.

Last Modified: July 9, 2024, 6:19 p.m.

Status : Awaiting Analysis

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

productcert@siemens.com

CVSS Data

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

Base Score
6.6
Exploitability Score
0.7
Impact Score
5.9
Base Severity
MEDIUM
CVSS Vector String

The CVSS vector string provides an in-depth view of the vulnerability metrics.

View Vector String

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

References

https://cert-portal.siemens.com/ productcert@siemens.com