Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 6 |
CVE-ID | CVE-2021-37208 CVE-2021-42016 CVE-2021-42017 CVE-2021-42018 CVE-2021-42019 CVE-2021-42020 |
CWE-ID | CWE-79 CWE-208 CWE-358 CWE-122 CWE-754 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
RUGGEDCOM ROS M2100 Hardware solutions / Firmware RUGGEDCOM ROS RMC8388 Hardware solutions / Firmware RUGGEDCOM ROS RS416V2 Hardware solutions / Firmware RUGGEDCOM ROS RS900G Hardware solutions / Firmware RUGGEDCOM ROS RS900G (32M) Hardware solutions / Firmware RUGGEDCOM ROS RSG900 Hardware solutions / Firmware RUGGEDCOM ROS RSG920P Hardware solutions / Firmware RUGGEDCOM ROS RSG2100 (32M) Hardware solutions / Firmware RUGGEDCOM ROS RSG2100P (32M) Hardware solutions / Firmware RUGGEDCOM ROS RSG2288 Hardware solutions / Firmware RUGGEDCOM ROS RSG2300 Hardware solutions / Firmware RUGGEDCOM ROS RSG2300P Hardware solutions / Firmware RUGGEDCOM ROS RSG2488 Hardware solutions / Firmware RUGGEDCOM ROS RSL910 Hardware solutions / Firmware RUGGEDCOM ROS RST916C Hardware solutions / Firmware RUGGEDCOM ROS RST916P Hardware solutions / Firmware RUGGEDCOM ROS RST2228 Hardware solutions / Firmware RUGGEDCOM ROS RSG2100P Hardware solutions / Firmware |
Vendor |
Security Bulletin
This security bulletin contains information about 6 vulnerabilities.
EUVDB-ID: #VU61238
Risk: Low
CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-37208
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote user can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationInstall updates from vendor's website.
Vulnerable software versionsRUGGEDCOM ROS M2100: before 5.6.0
RUGGEDCOM ROS RMC8388: before 5.6.0
RUGGEDCOM ROS RS416V2: before 5.6.0
RUGGEDCOM ROS RS900G: before 5.6.0
RUGGEDCOM ROS RS900G (32M): before 5.6.0
RUGGEDCOM ROS RSG900: before 5.6.0
RUGGEDCOM ROS RSG920P: before 5.6.0
RUGGEDCOM ROS RSG2100 (32M): before 5.6.0
RUGGEDCOM ROS RSG2100P (32M): before 5.6.0
RUGGEDCOM ROS RSG2288: before 5.6.0
RUGGEDCOM ROS RSG2300: before 5.6.0
RUGGEDCOM ROS RSG2300P: before 5.6.0
RUGGEDCOM ROS RSG2488: before 5.6.0
RUGGEDCOM ROS RSL910: before 5.6.0
RUGGEDCOM ROS RST916C: before 5.6.0
RUGGEDCOM ROS RST916P: before 5.6.0
RUGGEDCOM ROS RST2228: before 5.6.0
RUGGEDCOM ROS RSG2100P: before 5.6.0
External linkshttp://cert-portal.siemens.com/productcert/pdf/ssa-256353.pdf
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61239
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-42016
CWE-ID:
CWE-208 - Information Exposure Through Timing Discrepancy
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to the an exploitable timing discrepancy issue. A remote attacker can disclose sensitive information on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsRUGGEDCOM ROS M2100: before 5.6.0
RUGGEDCOM ROS RMC8388: before 5.6.0
RUGGEDCOM ROS RS416V2: before 5.6.0
RUGGEDCOM ROS RS900G: before 5.6.0
RUGGEDCOM ROS RS900G (32M): before 5.6.0
RUGGEDCOM ROS RSG900: before 5.6.0
RUGGEDCOM ROS RSG920P: before 5.6.0
RUGGEDCOM ROS RSG2100 (32M): before 5.6.0
RUGGEDCOM ROS RSG2100P (32M): before 5.6.0
RUGGEDCOM ROS RSG2288: before 5.6.0
RUGGEDCOM ROS RSG2300: before 5.6.0
RUGGEDCOM ROS RSG2300P: before 5.6.0
RUGGEDCOM ROS RSG2488: before 5.6.0
RUGGEDCOM ROS RSL910: before 5.6.0
RUGGEDCOM ROS RST916C: before 5.6.0
RUGGEDCOM ROS RST916P: before 5.6.0
RUGGEDCOM ROS RST2228: before 5.6.0
RUGGEDCOM ROS RSG2100P: before 5.6.0
External linkshttp://cert-portal.siemens.com/productcert/pdf/ssa-256353.pdf
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61240
Risk: Medium
CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-42017
CWE-ID:
CWE-358 - Improperly Implemented Security Check for Standard
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to the implementation flaws of the CBC encryption mode. A remote attacker can perform a man-in-the-middle attack and eavesdrop on encrypted communications.
MitigationInstall updates from vendor's website.
Vulnerable software versionsRUGGEDCOM ROS M2100: before 5.6.0
RUGGEDCOM ROS RMC8388: before 5.6.0
RUGGEDCOM ROS RS416V2: before 5.6.0
RUGGEDCOM ROS RS900G: before 5.6.0
RUGGEDCOM ROS RS900G (32M): before 5.6.0
RUGGEDCOM ROS RSG900: before 5.6.0
RUGGEDCOM ROS RSG920P: before 5.6.0
RUGGEDCOM ROS RSG2100 (32M): before 5.6.0
RUGGEDCOM ROS RSG2100P (32M): before 5.6.0
RUGGEDCOM ROS RSG2288: before 5.6.0
RUGGEDCOM ROS RSG2300: before 5.6.0
RUGGEDCOM ROS RSG2300P: before 5.6.0
RUGGEDCOM ROS RSG2488: before 5.6.0
RUGGEDCOM ROS RSL910: before 5.6.0
RUGGEDCOM ROS RST916C: before 5.6.0
RUGGEDCOM ROS RST916P: before 5.6.0
RUGGEDCOM ROS RST2228: before 5.6.0
RUGGEDCOM ROS RSG2100P: before 5.6.0
External linkshttp://cert-portal.siemens.com/productcert/pdf/ssa-256353.pdf
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61242
Risk: Low
CVSSv3.1: 5.8 [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-42018
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote administrator can pass specially crafted data to the application, trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsRUGGEDCOM ROS M2100: before 5.6.0
RUGGEDCOM ROS RMC8388: before 5.6.0
RUGGEDCOM ROS RS416V2: before 5.6.0
RUGGEDCOM ROS RS900G: before 5.6.0
RUGGEDCOM ROS RS900G (32M): before 5.6.0
RUGGEDCOM ROS RSG900: before 5.6.0
RUGGEDCOM ROS RSG920P: before 5.6.0
RUGGEDCOM ROS RSG2100 (32M): before 5.6.0
RUGGEDCOM ROS RSG2100P (32M): before 5.6.0
RUGGEDCOM ROS RSG2288: before 5.6.0
RUGGEDCOM ROS RSG2300: before 5.6.0
RUGGEDCOM ROS RSG2300P: before 5.6.0
RUGGEDCOM ROS RSG2488: before 5.6.0
RUGGEDCOM ROS RSL910: before 5.6.0
RUGGEDCOM ROS RST916C: before 5.6.0
RUGGEDCOM ROS RST916P: before 5.6.0
RUGGEDCOM ROS RST2228: before 5.6.0
RUGGEDCOM ROS RSG2100P: before 5.6.0
External linkshttp://cert-portal.siemens.com/productcert/pdf/ssa-256353.pdf
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61243
Risk: Low
CVSSv3.1: 5.8 [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-42019
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow. A remote administrator can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsRUGGEDCOM ROS M2100: before 5.6.0
RUGGEDCOM ROS RMC8388: before 5.6.0
RUGGEDCOM ROS RS416V2: before 5.6.0
RUGGEDCOM ROS RS900G: before 5.6.0
RUGGEDCOM ROS RS900G (32M): before 5.6.0
RUGGEDCOM ROS RSG900: before 5.6.0
RUGGEDCOM ROS RSG920P: before 5.6.0
RUGGEDCOM ROS RSG2100 (32M): before 5.6.0
RUGGEDCOM ROS RSG2100P (32M): before 5.6.0
RUGGEDCOM ROS RSG2288: before 5.6.0
RUGGEDCOM ROS RSG2300: before 5.6.0
RUGGEDCOM ROS RSG2300P: before 5.6.0
RUGGEDCOM ROS RSG2488: before 5.6.0
RUGGEDCOM ROS RSL910: before 5.6.0
RUGGEDCOM ROS RST916C: before 5.6.0
RUGGEDCOM ROS RST916P: before 5.6.0
RUGGEDCOM ROS RST2228: before 5.6.0
RUGGEDCOM ROS RSG2100P: before 5.6.0
External linkshttp://cert-portal.siemens.com/productcert/pdf/ssa-256353.pdf
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61244
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-42020
CWE-ID:
CWE-754 - Improper Check for Unusual or Exceptional Conditions
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to third-party component in its TFTP functionality fails to check for null terminations in file names. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Vulnerable software versionsRUGGEDCOM ROS M2100: before 5.6.0
RUGGEDCOM ROS RMC8388: before 5.6.0
RUGGEDCOM ROS RS416V2: before 5.6.0
RUGGEDCOM ROS RS900G: before 5.6.0
RUGGEDCOM ROS RS900G (32M): before 5.6.0
RUGGEDCOM ROS RSG900: before 5.6.0
RUGGEDCOM ROS RSG920P: before 5.6.0
RUGGEDCOM ROS RSG2100 (32M): before 5.6.0
RUGGEDCOM ROS RSG2100P (32M): before 5.6.0
RUGGEDCOM ROS RSG2288: before 5.6.0
RUGGEDCOM ROS RSG2300: before 5.6.0
RUGGEDCOM ROS RSG2300P: before 5.6.0
RUGGEDCOM ROS RSG2488: before 5.6.0
RUGGEDCOM ROS RSL910: before 5.6.0
RUGGEDCOM ROS RST916C: before 5.6.0
RUGGEDCOM ROS RST916P: before 5.6.0
RUGGEDCOM ROS RST2228: before 5.6.0
RUGGEDCOM ROS RSG2100P: before 5.6.0
External linkshttp://cert-portal.siemens.com/productcert/pdf/ssa-256353.pdf
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.