Risk | Low |
Patch available | NO |
Number of vulnerabilities | 7 |
CVE-ID | CVE-2022-30774 CVE-2022-31243 CVE-2022-33906 CVE-2022-33907 CVE-2022-33908 CVE-2022-33982 CVE-2022-33984 |
CWE-ID | CWE-367 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
RUGGEDCOM APE1808 ADM Hardware solutions / Firmware RUGGEDCOM APE1808 ADM CC Hardware solutions / Firmware RUGGEDCOM APE1808 CKP Hardware solutions / Firmware RUGGEDCOM APE1808 CKP CC Hardware solutions / Firmware RUGGEDCOM APE1808 CLOUDCONNECT Hardware solutions / Firmware RUGGEDCOM APE1808 CLOUDCONNECT CC Hardware solutions / Firmware RUGGEDCOM APE1808 ELAN Hardware solutions / Firmware RUGGEDCOM APE1808 ELAN CC Hardware solutions / Firmware RUGGEDCOM APE1808 SAM-L Hardware solutions / Firmware RUGGEDCOM APE1808 SAM-L CC Hardware solutions / Firmware RUGGEDCOM APE1808CLA-P Hardware solutions / Firmware RUGGEDCOM APE1808CLA-P CC Hardware solutions / Firmware RUGGEDCOM APE1808CLA-S1 Hardware solutions / Firmware RUGGEDCOM APE1808CLA-S1 CC Hardware solutions / Firmware RUGGEDCOM APE1808CLA-S3 Hardware solutions / Firmware RUGGEDCOM APE1808CLA-S3 CC Hardware solutions / Firmware RUGGEDCOM APE1808CLA-S5 Hardware solutions / Firmware RUGGEDCOM APE1808CLA-S5 CC Hardware solutions / Firmware RUGGEDCOM APE1808LNX Hardware solutions / Firmware RUGGEDCOM APE1808LNX CC Hardware solutions / Firmware RUGGEDCOM APE1808W10 Hardware solutions / Firmware RUGGEDCOM APE1808W10 CC Hardware solutions / Firmware |
Vendor | Siemens |
Security Bulletin
This security bulletin contains information about 7 vulnerabilities.
EUVDB-ID: #VU72377
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-30774
CWE-ID:
CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a time-of-check-time-of-use (TOCTOU) race condition within the PnpSmm driver. A local administrator can gain elevated privileges on the target system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsRUGGEDCOM APE1808 ADM: All versions
RUGGEDCOM APE1808 ADM CC: All versions
RUGGEDCOM APE1808 CKP: All versions
RUGGEDCOM APE1808 CKP CC: All versions
RUGGEDCOM APE1808 CLOUDCONNECT: All versions
RUGGEDCOM APE1808 CLOUDCONNECT CC: All versions
RUGGEDCOM APE1808 ELAN: All versions
RUGGEDCOM APE1808 ELAN CC: All versions
RUGGEDCOM APE1808 SAM-L: All versions
RUGGEDCOM APE1808 SAM-L CC: All versions
RUGGEDCOM APE1808CLA-P: All versions
RUGGEDCOM APE1808CLA-P CC: All versions
RUGGEDCOM APE1808CLA-S1: All versions
RUGGEDCOM APE1808CLA-S1 CC: All versions
RUGGEDCOM APE1808CLA-S3: All versions
RUGGEDCOM APE1808CLA-S3 CC: All versions
RUGGEDCOM APE1808CLA-S5: All versions
RUGGEDCOM APE1808CLA-S5 CC: All versions
RUGGEDCOM APE1808LNX: All versions
RUGGEDCOM APE1808LNX CC: All versions
RUGGEDCOM APE1808W10: All versions
RUGGEDCOM APE1808W10 CC: All versions
CPE2.3https://cert-portal.siemens.com/productcert/pdf/ssa-450613.pdf
icsa-23-047-08
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU72378
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-31243
CWE-ID:
CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a time-of-check-time-of-use (TOCTOU) race condition within the DMA transactions which are targeted at input buffers used for the software SMI handler used by the FvbServicesRuntimeDxe driver. A local administrator can gain elevated privileges on the target system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsRUGGEDCOM APE1808 ADM: All versions
RUGGEDCOM APE1808 ADM CC: All versions
RUGGEDCOM APE1808 CKP: All versions
RUGGEDCOM APE1808 CKP CC: All versions
RUGGEDCOM APE1808 CLOUDCONNECT: All versions
RUGGEDCOM APE1808 CLOUDCONNECT CC: All versions
RUGGEDCOM APE1808 ELAN: All versions
RUGGEDCOM APE1808 ELAN CC: All versions
RUGGEDCOM APE1808 SAM-L: All versions
RUGGEDCOM APE1808 SAM-L CC: All versions
RUGGEDCOM APE1808CLA-P: All versions
RUGGEDCOM APE1808CLA-P CC: All versions
RUGGEDCOM APE1808CLA-S1: All versions
RUGGEDCOM APE1808CLA-S1 CC: All versions
RUGGEDCOM APE1808CLA-S3: All versions
RUGGEDCOM APE1808CLA-S3 CC: All versions
RUGGEDCOM APE1808CLA-S5: All versions
RUGGEDCOM APE1808CLA-S5 CC: All versions
RUGGEDCOM APE1808LNX: All versions
RUGGEDCOM APE1808LNX CC: All versions
RUGGEDCOM APE1808W10: All versions
RUGGEDCOM APE1808W10 CC: All versions
CPE2.3https://cert-portal.siemens.com/productcert/pdf/ssa-450613.pdf
icsa-23-047-08
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU72380
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-33906
CWE-ID:
CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a time-of-check-time-of-use (TOCTOU) race condition within the DMA transactions which are targeted at input buffers used for the FwBlockServiceSmm software SMI handler. A local administrator can gain elevated privileges on the target system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsRUGGEDCOM APE1808 ADM: All versions
RUGGEDCOM APE1808 ADM CC: All versions
RUGGEDCOM APE1808 CKP: All versions
RUGGEDCOM APE1808 CKP CC: All versions
RUGGEDCOM APE1808 CLOUDCONNECT: All versions
RUGGEDCOM APE1808 CLOUDCONNECT CC: All versions
RUGGEDCOM APE1808 ELAN: All versions
RUGGEDCOM APE1808 ELAN CC: All versions
RUGGEDCOM APE1808 SAM-L: All versions
RUGGEDCOM APE1808 SAM-L CC: All versions
RUGGEDCOM APE1808CLA-P: All versions
RUGGEDCOM APE1808CLA-P CC: All versions
RUGGEDCOM APE1808CLA-S1: All versions
RUGGEDCOM APE1808CLA-S1 CC: All versions
RUGGEDCOM APE1808CLA-S3: All versions
RUGGEDCOM APE1808CLA-S3 CC: All versions
RUGGEDCOM APE1808CLA-S5: All versions
RUGGEDCOM APE1808CLA-S5 CC: All versions
RUGGEDCOM APE1808LNX: All versions
RUGGEDCOM APE1808LNX CC: All versions
RUGGEDCOM APE1808W10: All versions
RUGGEDCOM APE1808W10 CC: All versions
CPE2.3https://cert-portal.siemens.com/productcert/pdf/ssa-450613.pdf
icsa-23-047-08
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU72382
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-33907
CWE-ID:
CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a time-of-check-time-of-use (TOCTOU) race condition within the DMA transactions which are targeted at input buffers used for the software SMI handler used by the IdeBusDxe driver. A local administrator can gain elevated privileges on the target system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsRUGGEDCOM APE1808 ADM: All versions
RUGGEDCOM APE1808 ADM CC: All versions
RUGGEDCOM APE1808 CKP: All versions
RUGGEDCOM APE1808 CKP CC: All versions
RUGGEDCOM APE1808 CLOUDCONNECT: All versions
RUGGEDCOM APE1808 CLOUDCONNECT CC: All versions
RUGGEDCOM APE1808 ELAN: All versions
RUGGEDCOM APE1808 ELAN CC: All versions
RUGGEDCOM APE1808 SAM-L: All versions
RUGGEDCOM APE1808 SAM-L CC: All versions
RUGGEDCOM APE1808CLA-P: All versions
RUGGEDCOM APE1808CLA-P CC: All versions
RUGGEDCOM APE1808CLA-S1: All versions
RUGGEDCOM APE1808CLA-S1 CC: All versions
RUGGEDCOM APE1808CLA-S3: All versions
RUGGEDCOM APE1808CLA-S3 CC: All versions
RUGGEDCOM APE1808CLA-S5: All versions
RUGGEDCOM APE1808CLA-S5 CC: All versions
RUGGEDCOM APE1808LNX: All versions
RUGGEDCOM APE1808LNX CC: All versions
RUGGEDCOM APE1808W10: All versions
RUGGEDCOM APE1808W10 CC: All versions
CPE2.3https://cert-portal.siemens.com/productcert/pdf/ssa-450613.pdf
icsa-23-047-08
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU72385
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-33908
CWE-ID:
CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a time-of-check-time-of-use (TOCTOU) race condition within the DMA transactions which are targeted at input buffers used for the software SMI handler used by the SdHostDriver driver. A local administrator can gain elevated privileges on the target system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsRUGGEDCOM APE1808 ADM: All versions
RUGGEDCOM APE1808 ADM CC: All versions
RUGGEDCOM APE1808 CKP: All versions
RUGGEDCOM APE1808 CKP CC: All versions
RUGGEDCOM APE1808 CLOUDCONNECT: All versions
RUGGEDCOM APE1808 CLOUDCONNECT CC: All versions
RUGGEDCOM APE1808 ELAN: All versions
RUGGEDCOM APE1808 ELAN CC: All versions
RUGGEDCOM APE1808 SAM-L: All versions
RUGGEDCOM APE1808 SAM-L CC: All versions
RUGGEDCOM APE1808CLA-P: All versions
RUGGEDCOM APE1808CLA-P CC: All versions
RUGGEDCOM APE1808CLA-S1: All versions
RUGGEDCOM APE1808CLA-S1 CC: All versions
RUGGEDCOM APE1808CLA-S3: All versions
RUGGEDCOM APE1808CLA-S3 CC: All versions
RUGGEDCOM APE1808CLA-S5: All versions
RUGGEDCOM APE1808CLA-S5 CC: All versions
RUGGEDCOM APE1808LNX: All versions
RUGGEDCOM APE1808LNX CC: All versions
RUGGEDCOM APE1808W10: All versions
RUGGEDCOM APE1808W10 CC: All versions
CPE2.3https://cert-portal.siemens.com/productcert/pdf/ssa-450613.pdf
icsa-23-047-08
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU72387
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-33982
CWE-ID:
CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a time-of-check-time-of-use (TOCTOU) race condition within the DMA attacks on the parameter buffer used by the Int15ServiceSmm software SMI handler. A local administrator can gain elevated privileges on the target system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsRUGGEDCOM APE1808 ADM: All versions
RUGGEDCOM APE1808 ADM CC: All versions
RUGGEDCOM APE1808 CKP: All versions
RUGGEDCOM APE1808 CKP CC: All versions
RUGGEDCOM APE1808 CLOUDCONNECT: All versions
RUGGEDCOM APE1808 CLOUDCONNECT CC: All versions
RUGGEDCOM APE1808 ELAN: All versions
RUGGEDCOM APE1808 ELAN CC: All versions
RUGGEDCOM APE1808 SAM-L: All versions
RUGGEDCOM APE1808 SAM-L CC: All versions
RUGGEDCOM APE1808CLA-P: All versions
RUGGEDCOM APE1808CLA-P CC: All versions
RUGGEDCOM APE1808CLA-S1: All versions
RUGGEDCOM APE1808CLA-S1 CC: All versions
RUGGEDCOM APE1808CLA-S3: All versions
RUGGEDCOM APE1808CLA-S3 CC: All versions
RUGGEDCOM APE1808CLA-S5: All versions
RUGGEDCOM APE1808CLA-S5 CC: All versions
RUGGEDCOM APE1808LNX: All versions
RUGGEDCOM APE1808LNX CC: All versions
RUGGEDCOM APE1808W10: All versions
RUGGEDCOM APE1808W10 CC: All versions
CPE2.3https://cert-portal.siemens.com/productcert/pdf/ssa-450613.pdf
icsa-23-047-08
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU72388
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-33984
CWE-ID:
CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a time-of-check-time-of-use (TOCTOU) race condition within the DMA transactions which are targeted at input buffers used for the SdMmcDevice software SMI handler. A local administrator can gain elevated privileges on the target system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsRUGGEDCOM APE1808 ADM: All versions
RUGGEDCOM APE1808 ADM CC: All versions
RUGGEDCOM APE1808 CKP: All versions
RUGGEDCOM APE1808 CKP CC: All versions
RUGGEDCOM APE1808 CLOUDCONNECT: All versions
RUGGEDCOM APE1808 CLOUDCONNECT CC: All versions
RUGGEDCOM APE1808 ELAN: All versions
RUGGEDCOM APE1808 ELAN CC: All versions
RUGGEDCOM APE1808 SAM-L: All versions
RUGGEDCOM APE1808 SAM-L CC: All versions
RUGGEDCOM APE1808CLA-P: All versions
RUGGEDCOM APE1808CLA-P CC: All versions
RUGGEDCOM APE1808CLA-S1: All versions
RUGGEDCOM APE1808CLA-S1 CC: All versions
RUGGEDCOM APE1808CLA-S3: All versions
RUGGEDCOM APE1808CLA-S3 CC: All versions
RUGGEDCOM APE1808CLA-S5: All versions
RUGGEDCOM APE1808CLA-S5 CC: All versions
RUGGEDCOM APE1808LNX: All versions
RUGGEDCOM APE1808LNX CC: All versions
RUGGEDCOM APE1808W10: All versions
RUGGEDCOM APE1808W10 CC: All versions
CPE2.3https://cert-portal.siemens.com/productcert/pdf/ssa-450613.pdf
icsa-23-047-08
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.