ID

VAR-202307-0589


CVE

CVE-2023-36748


TITLE

Cryptographic strength vulnerabilities in multiple Siemens products

Trust: 0.8

sources: JVNDB: JVNDB-2023-021737

DESCRIPTION

A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.16.0), RUGGEDCOM ROX MX5000RE (All versions < V2.16.0), RUGGEDCOM ROX RX1400 (All versions < V2.16.0), RUGGEDCOM ROX RX1500 (All versions < V2.16.0), RUGGEDCOM ROX RX1501 (All versions < V2.16.0), RUGGEDCOM ROX RX1510 (All versions < V2.16.0), RUGGEDCOM ROX RX1511 (All versions < V2.16.0), RUGGEDCOM ROX RX1512 (All versions < V2.16.0), RUGGEDCOM ROX RX1524 (All versions < V2.16.0), RUGGEDCOM ROX RX1536 (All versions < V2.16.0), RUGGEDCOM ROX RX5000 (All versions < V2.16.0). The affected devices are configured to offer weak ciphers by default. This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data passed over to and from the affected device. RUGGEDCOM ROX MX5000 firmware, ruggedcom rox mx5000re firmware, RUGGEDCOM ROX RX1400 Multiple Siemens products, including firmware, have vulnerabilities related to encryption strength.Information may be obtained and information may be tampered with. RUGGEDCOM products provide a level of robustness and reliability that sets the standard for communication networks deployed in harsh environments

Trust: 2.25

sources: NVD: CVE-2023-36748 // JVNDB: JVNDB-2023-021737 // CNVD: CNVD-2023-55708 // VULMON: CVE-2023-36748

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2023-55708

AFFECTED PRODUCTS

vendor:siemensmodel:ruggedcom rox rx1501scope:ltversion:2.16.0

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx1524scope:ltversion:2.16.0

Trust: 1.0

vendor:siemensmodel:ruggedcom rox mx5000rescope:ltversion:2.16.0

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx1511scope:ltversion:2.16.0

Trust: 1.0

vendor:siemensmodel:ruggedcom rox mx5000scope:ltversion:2.16.0

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx1500scope:ltversion:2.16.0

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx1536scope:ltversion:2.16.0

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx1400scope:ltversion:2.16.0

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx1512scope:ltversion:2.16.0

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx1510scope:ltversion:2.16.0

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx5000scope:ltversion:2.16.0

Trust: 1.0

vendor:シーメンスmodel:ruggedcom rox rx1500scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx1501scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx1524scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx5000scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox mx5000scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx1512scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx1510scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx1400scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx1511scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox mx5000rescope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx1536scope: - version: -

Trust: 0.8

vendor:siemensmodel:ruggedcom rox mx5000scope:ltversion:v2.16.0

Trust: 0.6

vendor:siemensmodel:ruggedcom rox mx5000rescope:ltversion:v2.16.0

Trust: 0.6

vendor:siemensmodel:ruggedcom rox rx1400scope:ltversion:v2.16.0

Trust: 0.6

vendor:siemensmodel:ruggedcom rox rx1500scope:ltversion:v2.16.0

Trust: 0.6

vendor:siemensmodel:ruggedcom rox rx1501scope:ltversion:v2.16.0

Trust: 0.6

vendor:siemensmodel:ruggedcom rox rx1510scope:ltversion:v2.16.0

Trust: 0.6

vendor:siemensmodel:ruggedcom rox rx1511scope:ltversion:v2.16.0

Trust: 0.6

vendor:siemensmodel:ruggedcom rox rx1512scope:ltversion:v2.16.0

Trust: 0.6

vendor:siemensmodel:ruggedcom rox rx1524scope:ltversion:v2.16.0

Trust: 0.6

vendor:siemensmodel:ruggedcom rox rx1536scope:ltversion:v2.16.0

Trust: 0.6

vendor:siemensmodel:ruggedcom rox rx5000scope:ltversion:v2.16.0

Trust: 0.6

sources: CNVD: CNVD-2023-55708 // JVNDB: JVNDB-2023-021737 // NVD: CVE-2023-36748

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-36748
value: MEDIUM

Trust: 1.0

productcert@siemens.com: CVE-2023-36748
value: MEDIUM

Trust: 1.0

NVD: CVE-2023-36748
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2023-55708
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202307-738
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2023-55708
severity: MEDIUM
baseScore: 5.8
vectorString: AV:A/AC:H/AU:N/C:P/I:C/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: COMPLETE
availabilityImpact: PARTIAL
exploitabilityScore: 3.2
impactScore: 8.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2023-36748
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 1.6
impactScore: 5.2
version: 3.1

Trust: 1.0

productcert@siemens.com: CVE-2023-36748
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:L
attackVector: ADJACENT
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: HIGH
availabilityImpact: LOW
exploitabilityScore: 1.2
impactScore: 4.7
version: 3.1

Trust: 1.0

NVD: CVE-2023-36748
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2023-55708 // JVNDB: JVNDB-2023-021737 // CNNVD: CNNVD-202307-738 // NVD: CVE-2023-36748 // NVD: CVE-2023-36748

PROBLEMTYPE DATA

problemtype:CWE-326

Trust: 1.0

problemtype:Inappropriate cryptographic strength (CWE-326) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-021737 // NVD: CVE-2023-36748

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202307-738

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-202307-738

PATCH

title:Patch for Siemens RUGGEDCOM ROX Weak Password Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/440291

Trust: 0.6

title:Siemens RUGGEDCOM ROX A series of products Fixes for encryption problem vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=246661

Trust: 0.6

sources: CNVD: CNVD-2023-55708 // CNNVD: CNNVD-202307-738

EXTERNAL IDS

db:NVDid:CVE-2023-36748

Trust: 3.9

db:SIEMENSid:SSA-146325

Trust: 3.1

db:ICS CERTid:ICSA-23-194-01

Trust: 0.8

db:JVNid:JVNVU95292697

Trust: 0.8

db:JVNDBid:JVNDB-2023-021737

Trust: 0.8

db:CNVDid:CNVD-2023-55708

Trust: 0.6

db:CNNVDid:CNNVD-202307-738

Trust: 0.6

db:VULMONid:CVE-2023-36748

Trust: 0.1

sources: CNVD: CNVD-2023-55708 // VULMON: CVE-2023-36748 // JVNDB: JVNDB-2023-021737 // CNNVD: CNNVD-202307-738 // NVD: CVE-2023-36748

REFERENCES

url:https://cert-portal.siemens.com/productcert/pdf/ssa-146325.pdf

Trust: 2.5

url:https://jvn.jp/vu/jvnvu95292697/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-36748

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-194-01

Trust: 0.8

url:https://cert-portal.siemens.com/productcert/html/ssa-146325.html

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2023-36748/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2023-55708 // VULMON: CVE-2023-36748 // JVNDB: JVNDB-2023-021737 // CNNVD: CNNVD-202307-738 // NVD: CVE-2023-36748

SOURCES

db:CNVDid:CNVD-2023-55708
db:VULMONid:CVE-2023-36748
db:JVNDBid:JVNDB-2023-021737
db:CNNVDid:CNNVD-202307-738
db:NVDid:CVE-2023-36748

LAST UPDATE DATE

2024-08-14T12:56:53.690000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2023-55708date:2023-07-12T00:00:00
db:VULMONid:CVE-2023-36748date:2023-07-11T00:00:00
db:JVNDBid:JVNDB-2023-021737date:2024-01-19T08:07:00
db:CNNVDid:CNNVD-202307-738date:2023-07-19T00:00:00
db:NVDid:CVE-2023-36748date:2023-07-18T16:40:40.913

SOURCES RELEASE DATE

db:CNVDid:CNVD-2023-55708date:2023-07-12T00:00:00
db:VULMONid:CVE-2023-36748date:2023-07-11T00:00:00
db:JVNDBid:JVNDB-2023-021737date:2024-01-19T00:00:00
db:CNNVDid:CNNVD-202307-738date:2023-07-11T00:00:00
db:NVDid:CVE-2023-36748date:2023-07-11T10:15:11.033