Multiple vulnerabilities in Siemens RUGGEDCOM APE1808 Product Family



| Updated: 2023-02-22
Risk Low
Patch available NO
Number of vulnerabilities 7
CVE-ID CVE-2022-30774
CVE-2022-31243
CVE-2022-33906
CVE-2022-33907
CVE-2022-33908
CVE-2022-33982
CVE-2022-33984
CWE-ID CWE-367
Exploitation vector Local
Public exploit N/A
Vulnerable software
RUGGEDCOM APE1808 ADM
Hardware solutions / Firmware

RUGGEDCOM APE1808 ADM CC
Hardware solutions / Firmware

RUGGEDCOM APE1808 CKP
Hardware solutions / Firmware

RUGGEDCOM APE1808 CKP CC
Hardware solutions / Firmware

RUGGEDCOM APE1808 CLOUDCONNECT
Hardware solutions / Firmware

RUGGEDCOM APE1808 CLOUDCONNECT CC
Hardware solutions / Firmware

RUGGEDCOM APE1808 ELAN
Hardware solutions / Firmware

RUGGEDCOM APE1808 ELAN CC
Hardware solutions / Firmware

RUGGEDCOM APE1808 SAM-L
Hardware solutions / Firmware

RUGGEDCOM APE1808 SAM-L CC
Hardware solutions / Firmware

RUGGEDCOM APE1808CLA-P
Hardware solutions / Firmware

RUGGEDCOM APE1808CLA-P CC
Hardware solutions / Firmware

RUGGEDCOM APE1808CLA-S1
Hardware solutions / Firmware

RUGGEDCOM APE1808CLA-S1 CC
Hardware solutions / Firmware

RUGGEDCOM APE1808CLA-S3
Hardware solutions / Firmware

RUGGEDCOM APE1808CLA-S3 CC
Hardware solutions / Firmware

RUGGEDCOM APE1808CLA-S5
Hardware solutions / Firmware

RUGGEDCOM APE1808CLA-S5 CC
Hardware solutions / Firmware

RUGGEDCOM APE1808LNX
Hardware solutions / Firmware

RUGGEDCOM APE1808LNX CC
Hardware solutions / Firmware

RUGGEDCOM APE1808W10
Hardware solutions / Firmware

RUGGEDCOM APE1808W10 CC
Hardware solutions / Firmware

Vendor Siemens

Security Bulletin

This security bulletin contains information about 7 vulnerabilities.

1) Time-of-check Time-of-use (TOCTOU) Race Condition

EUVDB-ID: #VU72377

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-30774

CWE-ID: CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a time-of-check-time-of-use (TOCTOU) race condition within the PnpSmm driver. A local administrator can gain elevated privileges on the target system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

RUGGEDCOM APE1808 ADM: All versions

RUGGEDCOM APE1808 ADM CC: All versions

RUGGEDCOM APE1808 CKP: All versions

RUGGEDCOM APE1808 CKP CC: All versions

RUGGEDCOM APE1808 CLOUDCONNECT: All versions

RUGGEDCOM APE1808 CLOUDCONNECT CC: All versions

RUGGEDCOM APE1808 ELAN: All versions

RUGGEDCOM APE1808 ELAN CC: All versions

RUGGEDCOM APE1808 SAM-L: All versions

RUGGEDCOM APE1808 SAM-L CC: All versions

RUGGEDCOM APE1808CLA-P: All versions

RUGGEDCOM APE1808CLA-P CC: All versions

RUGGEDCOM APE1808CLA-S1: All versions

RUGGEDCOM APE1808CLA-S1 CC: All versions

RUGGEDCOM APE1808CLA-S3: All versions

RUGGEDCOM APE1808CLA-S3 CC: All versions

RUGGEDCOM APE1808CLA-S5: All versions

RUGGEDCOM APE1808CLA-S5 CC: All versions

RUGGEDCOM APE1808LNX: All versions

RUGGEDCOM APE1808LNX CC: All versions

RUGGEDCOM APE1808W10: All versions

RUGGEDCOM APE1808W10 CC: All versions

CPE2.3 External links

https://cert-portal.siemens.com/productcert/pdf/ssa-450613.pdf
icsa-23-047-08


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Time-of-check Time-of-use (TOCTOU) Race Condition

EUVDB-ID: #VU72378

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-31243

CWE-ID: CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a time-of-check-time-of-use (TOCTOU) race condition within the DMA transactions which are targeted at input buffers used for the software SMI handler used by the FvbServicesRuntimeDxe driver. A local administrator can gain elevated privileges on the target system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

RUGGEDCOM APE1808 ADM: All versions

RUGGEDCOM APE1808 ADM CC: All versions

RUGGEDCOM APE1808 CKP: All versions

RUGGEDCOM APE1808 CKP CC: All versions

RUGGEDCOM APE1808 CLOUDCONNECT: All versions

RUGGEDCOM APE1808 CLOUDCONNECT CC: All versions

RUGGEDCOM APE1808 ELAN: All versions

RUGGEDCOM APE1808 ELAN CC: All versions

RUGGEDCOM APE1808 SAM-L: All versions

RUGGEDCOM APE1808 SAM-L CC: All versions

RUGGEDCOM APE1808CLA-P: All versions

RUGGEDCOM APE1808CLA-P CC: All versions

RUGGEDCOM APE1808CLA-S1: All versions

RUGGEDCOM APE1808CLA-S1 CC: All versions

RUGGEDCOM APE1808CLA-S3: All versions

RUGGEDCOM APE1808CLA-S3 CC: All versions

RUGGEDCOM APE1808CLA-S5: All versions

RUGGEDCOM APE1808CLA-S5 CC: All versions

RUGGEDCOM APE1808LNX: All versions

RUGGEDCOM APE1808LNX CC: All versions

RUGGEDCOM APE1808W10: All versions

RUGGEDCOM APE1808W10 CC: All versions

CPE2.3 External links

https://cert-portal.siemens.com/productcert/pdf/ssa-450613.pdf
icsa-23-047-08


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Time-of-check Time-of-use (TOCTOU) Race Condition

EUVDB-ID: #VU72380

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-33906

CWE-ID: CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a time-of-check-time-of-use (TOCTOU) race condition within the DMA transactions which are targeted at input buffers used for the FwBlockServiceSmm software SMI handler. A local administrator can gain elevated privileges on the target system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

RUGGEDCOM APE1808 ADM: All versions

RUGGEDCOM APE1808 ADM CC: All versions

RUGGEDCOM APE1808 CKP: All versions

RUGGEDCOM APE1808 CKP CC: All versions

RUGGEDCOM APE1808 CLOUDCONNECT: All versions

RUGGEDCOM APE1808 CLOUDCONNECT CC: All versions

RUGGEDCOM APE1808 ELAN: All versions

RUGGEDCOM APE1808 ELAN CC: All versions

RUGGEDCOM APE1808 SAM-L: All versions

RUGGEDCOM APE1808 SAM-L CC: All versions

RUGGEDCOM APE1808CLA-P: All versions

RUGGEDCOM APE1808CLA-P CC: All versions

RUGGEDCOM APE1808CLA-S1: All versions

RUGGEDCOM APE1808CLA-S1 CC: All versions

RUGGEDCOM APE1808CLA-S3: All versions

RUGGEDCOM APE1808CLA-S3 CC: All versions

RUGGEDCOM APE1808CLA-S5: All versions

RUGGEDCOM APE1808CLA-S5 CC: All versions

RUGGEDCOM APE1808LNX: All versions

RUGGEDCOM APE1808LNX CC: All versions

RUGGEDCOM APE1808W10: All versions

RUGGEDCOM APE1808W10 CC: All versions

CPE2.3 External links

https://cert-portal.siemens.com/productcert/pdf/ssa-450613.pdf
icsa-23-047-08


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Time-of-check Time-of-use (TOCTOU) Race Condition

EUVDB-ID: #VU72382

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-33907

CWE-ID: CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a time-of-check-time-of-use (TOCTOU) race condition within the DMA transactions which are targeted at input buffers used for the software SMI handler used by the IdeBusDxe driver. A local administrator can gain elevated privileges on the target system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

RUGGEDCOM APE1808 ADM: All versions

RUGGEDCOM APE1808 ADM CC: All versions

RUGGEDCOM APE1808 CKP: All versions

RUGGEDCOM APE1808 CKP CC: All versions

RUGGEDCOM APE1808 CLOUDCONNECT: All versions

RUGGEDCOM APE1808 CLOUDCONNECT CC: All versions

RUGGEDCOM APE1808 ELAN: All versions

RUGGEDCOM APE1808 ELAN CC: All versions

RUGGEDCOM APE1808 SAM-L: All versions

RUGGEDCOM APE1808 SAM-L CC: All versions

RUGGEDCOM APE1808CLA-P: All versions

RUGGEDCOM APE1808CLA-P CC: All versions

RUGGEDCOM APE1808CLA-S1: All versions

RUGGEDCOM APE1808CLA-S1 CC: All versions

RUGGEDCOM APE1808CLA-S3: All versions

RUGGEDCOM APE1808CLA-S3 CC: All versions

RUGGEDCOM APE1808CLA-S5: All versions

RUGGEDCOM APE1808CLA-S5 CC: All versions

RUGGEDCOM APE1808LNX: All versions

RUGGEDCOM APE1808LNX CC: All versions

RUGGEDCOM APE1808W10: All versions

RUGGEDCOM APE1808W10 CC: All versions

CPE2.3 External links

https://cert-portal.siemens.com/productcert/pdf/ssa-450613.pdf
icsa-23-047-08


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Time-of-check Time-of-use (TOCTOU) Race Condition

EUVDB-ID: #VU72385

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-33908

CWE-ID: CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a time-of-check-time-of-use (TOCTOU) race condition within the DMA transactions which are targeted at input buffers used for the software SMI handler used by the SdHostDriver driver. A local administrator can gain elevated privileges on the target system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

RUGGEDCOM APE1808 ADM: All versions

RUGGEDCOM APE1808 ADM CC: All versions

RUGGEDCOM APE1808 CKP: All versions

RUGGEDCOM APE1808 CKP CC: All versions

RUGGEDCOM APE1808 CLOUDCONNECT: All versions

RUGGEDCOM APE1808 CLOUDCONNECT CC: All versions

RUGGEDCOM APE1808 ELAN: All versions

RUGGEDCOM APE1808 ELAN CC: All versions

RUGGEDCOM APE1808 SAM-L: All versions

RUGGEDCOM APE1808 SAM-L CC: All versions

RUGGEDCOM APE1808CLA-P: All versions

RUGGEDCOM APE1808CLA-P CC: All versions

RUGGEDCOM APE1808CLA-S1: All versions

RUGGEDCOM APE1808CLA-S1 CC: All versions

RUGGEDCOM APE1808CLA-S3: All versions

RUGGEDCOM APE1808CLA-S3 CC: All versions

RUGGEDCOM APE1808CLA-S5: All versions

RUGGEDCOM APE1808CLA-S5 CC: All versions

RUGGEDCOM APE1808LNX: All versions

RUGGEDCOM APE1808LNX CC: All versions

RUGGEDCOM APE1808W10: All versions

RUGGEDCOM APE1808W10 CC: All versions

CPE2.3 External links

https://cert-portal.siemens.com/productcert/pdf/ssa-450613.pdf
icsa-23-047-08


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Time-of-check Time-of-use (TOCTOU) Race Condition

EUVDB-ID: #VU72387

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-33982

CWE-ID: CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a time-of-check-time-of-use (TOCTOU) race condition within the DMA attacks on the parameter buffer used by the Int15ServiceSmm software SMI handler. A local administrator can gain elevated privileges on the target system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

RUGGEDCOM APE1808 ADM: All versions

RUGGEDCOM APE1808 ADM CC: All versions

RUGGEDCOM APE1808 CKP: All versions

RUGGEDCOM APE1808 CKP CC: All versions

RUGGEDCOM APE1808 CLOUDCONNECT: All versions

RUGGEDCOM APE1808 CLOUDCONNECT CC: All versions

RUGGEDCOM APE1808 ELAN: All versions

RUGGEDCOM APE1808 ELAN CC: All versions

RUGGEDCOM APE1808 SAM-L: All versions

RUGGEDCOM APE1808 SAM-L CC: All versions

RUGGEDCOM APE1808CLA-P: All versions

RUGGEDCOM APE1808CLA-P CC: All versions

RUGGEDCOM APE1808CLA-S1: All versions

RUGGEDCOM APE1808CLA-S1 CC: All versions

RUGGEDCOM APE1808CLA-S3: All versions

RUGGEDCOM APE1808CLA-S3 CC: All versions

RUGGEDCOM APE1808CLA-S5: All versions

RUGGEDCOM APE1808CLA-S5 CC: All versions

RUGGEDCOM APE1808LNX: All versions

RUGGEDCOM APE1808LNX CC: All versions

RUGGEDCOM APE1808W10: All versions

RUGGEDCOM APE1808W10 CC: All versions

CPE2.3 External links

https://cert-portal.siemens.com/productcert/pdf/ssa-450613.pdf
icsa-23-047-08


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Time-of-check Time-of-use (TOCTOU) Race Condition

EUVDB-ID: #VU72388

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-33984

CWE-ID: CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a time-of-check-time-of-use (TOCTOU) race condition within the DMA transactions which are targeted at input buffers used for the SdMmcDevice software SMI handler. A local administrator can gain elevated privileges on the target system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

RUGGEDCOM APE1808 ADM: All versions

RUGGEDCOM APE1808 ADM CC: All versions

RUGGEDCOM APE1808 CKP: All versions

RUGGEDCOM APE1808 CKP CC: All versions

RUGGEDCOM APE1808 CLOUDCONNECT: All versions

RUGGEDCOM APE1808 CLOUDCONNECT CC: All versions

RUGGEDCOM APE1808 ELAN: All versions

RUGGEDCOM APE1808 ELAN CC: All versions

RUGGEDCOM APE1808 SAM-L: All versions

RUGGEDCOM APE1808 SAM-L CC: All versions

RUGGEDCOM APE1808CLA-P: All versions

RUGGEDCOM APE1808CLA-P CC: All versions

RUGGEDCOM APE1808CLA-S1: All versions

RUGGEDCOM APE1808CLA-S1 CC: All versions

RUGGEDCOM APE1808CLA-S3: All versions

RUGGEDCOM APE1808CLA-S3 CC: All versions

RUGGEDCOM APE1808CLA-S5: All versions

RUGGEDCOM APE1808CLA-S5 CC: All versions

RUGGEDCOM APE1808LNX: All versions

RUGGEDCOM APE1808LNX CC: All versions

RUGGEDCOM APE1808W10: All versions

RUGGEDCOM APE1808W10 CC: All versions

CPE2.3 External links

https://cert-portal.siemens.com/productcert/pdf/ssa-450613.pdf
icsa-23-047-08


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###