Vulnerability identifier: #VU72377
Vulnerability risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-367
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
RUGGEDCOM APE1808 ADM
Hardware solutions /
Firmware
RUGGEDCOM APE1808 ADM CC
Hardware solutions /
Firmware
RUGGEDCOM APE1808 CKP
Hardware solutions /
Firmware
RUGGEDCOM APE1808 CKP CC
Hardware solutions /
Firmware
RUGGEDCOM APE1808 CLOUDCONNECT
Hardware solutions /
Firmware
RUGGEDCOM APE1808 CLOUDCONNECT CC
Hardware solutions /
Firmware
RUGGEDCOM APE1808 ELAN
Hardware solutions /
Firmware
RUGGEDCOM APE1808 ELAN CC
Hardware solutions /
Firmware
RUGGEDCOM APE1808 SAM-L
Hardware solutions /
Firmware
RUGGEDCOM APE1808 SAM-L CC
Hardware solutions /
Firmware
RUGGEDCOM APE1808CLA-P
Hardware solutions /
Firmware
RUGGEDCOM APE1808CLA-P CC
Hardware solutions /
Firmware
RUGGEDCOM APE1808CLA-S1
Hardware solutions /
Firmware
RUGGEDCOM APE1808CLA-S1 CC
Hardware solutions /
Firmware
RUGGEDCOM APE1808CLA-S3
Hardware solutions /
Firmware
RUGGEDCOM APE1808CLA-S3 CC
Hardware solutions /
Firmware
RUGGEDCOM APE1808CLA-S5
Hardware solutions /
Firmware
RUGGEDCOM APE1808CLA-S5 CC
Hardware solutions /
Firmware
RUGGEDCOM APE1808LNX
Hardware solutions /
Firmware
RUGGEDCOM APE1808LNX CC
Hardware solutions /
Firmware
RUGGEDCOM APE1808W10
Hardware solutions /
Firmware
RUGGEDCOM APE1808W10 CC
Hardware solutions /
Firmware
Vendor: Siemens
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a time-of-check-time-of-use (TOCTOU) race condition within the PnpSmm driver. A local administrator can gain elevated privileges on the target system.
Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versions
RUGGEDCOM APE1808 ADM: All versions
RUGGEDCOM APE1808 ADM CC: All versions
RUGGEDCOM APE1808 CKP: All versions
RUGGEDCOM APE1808 CKP CC: All versions
RUGGEDCOM APE1808 CLOUDCONNECT: All versions
RUGGEDCOM APE1808 CLOUDCONNECT CC: All versions
RUGGEDCOM APE1808 ELAN: All versions
RUGGEDCOM APE1808 ELAN CC: All versions
RUGGEDCOM APE1808 SAM-L: All versions
RUGGEDCOM APE1808 SAM-L CC: All versions
RUGGEDCOM APE1808CLA-P: All versions
RUGGEDCOM APE1808CLA-P CC: All versions
RUGGEDCOM APE1808CLA-S1: All versions
RUGGEDCOM APE1808CLA-S1 CC: All versions
RUGGEDCOM APE1808CLA-S3: All versions
RUGGEDCOM APE1808CLA-S3 CC: All versions
RUGGEDCOM APE1808CLA-S5: All versions
RUGGEDCOM APE1808CLA-S5 CC: All versions
RUGGEDCOM APE1808LNX: All versions
RUGGEDCOM APE1808LNX CC: All versions
RUGGEDCOM APE1808W10: All versions
RUGGEDCOM APE1808W10 CC: All versions
External links
https://cert-portal.siemens.com/productcert/pdf/ssa-450613.pdf
icsa-23-047-08
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.