ID

VAR-202308-0469


CVE

CVE-2023-39269


TITLE

Siemens'  RUGGEDCOM ROS  Vulnerability in resource allocation without restrictions or throttling in

Trust: 0.8

sources: JVNDB: JVNDB-2023-021984

DESCRIPTION

A vulnerability has been identified in RUGGEDCOM i800, RUGGEDCOM i800NC, RUGGEDCOM i801, RUGGEDCOM i801NC, RUGGEDCOM i802, RUGGEDCOM i802NC, RUGGEDCOM i803, RUGGEDCOM i803NC, RUGGEDCOM M2100, RUGGEDCOM M2100F, RUGGEDCOM M2100NC, RUGGEDCOM M2200, RUGGEDCOM M2200F, RUGGEDCOM M2200NC, RUGGEDCOM M969, RUGGEDCOM M969F, RUGGEDCOM M969NC, RUGGEDCOM RMC30, RUGGEDCOM RMC30NC, RUGGEDCOM RMC8388 V4.X, RUGGEDCOM RMC8388 V5.X, RUGGEDCOM RMC8388NC V4.X, RUGGEDCOM RMC8388NC V5.X, RUGGEDCOM RP110, RUGGEDCOM RP110NC, RUGGEDCOM RS1600, RUGGEDCOM RS1600F, RUGGEDCOM RS1600FNC, RUGGEDCOM RS1600NC, RUGGEDCOM RS1600T, RUGGEDCOM RS1600TNC, RUGGEDCOM RS400, RUGGEDCOM RS400F, RUGGEDCOM RS400NC, RUGGEDCOM RS401, RUGGEDCOM RS401NC, RUGGEDCOM RS416, RUGGEDCOM RS416F, RUGGEDCOM RS416NC, RUGGEDCOM RS416NCv2 V4.X, RUGGEDCOM RS416NCv2 V5.X, RUGGEDCOM RS416P, RUGGEDCOM RS416PF, RUGGEDCOM RS416PNC, RUGGEDCOM RS416PNCv2 V4.X, RUGGEDCOM RS416PNCv2 V5.X, RUGGEDCOM RS416Pv2 V4.X, RUGGEDCOM RS416Pv2 V5.X, RUGGEDCOM RS416v2 V4.X, RUGGEDCOM RS416v2 V5.X, RUGGEDCOM RS8000, RUGGEDCOM RS8000A, RUGGEDCOM RS8000ANC, RUGGEDCOM RS8000H, RUGGEDCOM RS8000HNC, RUGGEDCOM RS8000NC, RUGGEDCOM RS8000T, RUGGEDCOM RS8000TNC, RUGGEDCOM RS900, RUGGEDCOM RS900 (32M) V4.X, RUGGEDCOM RS900 (32M) V5.X, RUGGEDCOM RS900F, RUGGEDCOM RS900G, RUGGEDCOM RS900G (32M) V4.X, RUGGEDCOM RS900G (32M) V5.X, RUGGEDCOM RS900GF, RUGGEDCOM RS900GNC, RUGGEDCOM RS900GNC(32M) V4.X, RUGGEDCOM RS900GNC(32M) V5.X, RUGGEDCOM RS900GP, RUGGEDCOM RS900GPF, RUGGEDCOM RS900GPNC, RUGGEDCOM RS900L, RUGGEDCOM RS900LNC, RUGGEDCOM RS900M-GETS-C01, RUGGEDCOM RS900M-GETS-XX, RUGGEDCOM RS900M-STND-C01, RUGGEDCOM RS900M-STND-XX, RUGGEDCOM RS900MNC-GETS-C01, RUGGEDCOM RS900MNC-GETS-XX, RUGGEDCOM RS900MNC-STND-XX, RUGGEDCOM RS900MNC-STND-XX-C01, RUGGEDCOM RS900NC, RUGGEDCOM RS900NC(32M) V4.X, RUGGEDCOM RS900NC(32M) V5.X, RUGGEDCOM RS900W, RUGGEDCOM RS910, RUGGEDCOM RS910L, RUGGEDCOM RS910LNC, RUGGEDCOM RS910NC, RUGGEDCOM RS910W, RUGGEDCOM RS920L, RUGGEDCOM RS920LNC, RUGGEDCOM RS920W, RUGGEDCOM RS930L, RUGGEDCOM RS930LNC, RUGGEDCOM RS930W, RUGGEDCOM RS940G, RUGGEDCOM RS940GF, RUGGEDCOM RS940GNC, RUGGEDCOM RS969, RUGGEDCOM RS969NC, RUGGEDCOM RSG2100, RUGGEDCOM RSG2100 (32M) V4.X, RUGGEDCOM RSG2100 (32M) V5.X, RUGGEDCOM RSG2100F, RUGGEDCOM RSG2100NC, RUGGEDCOM RSG2100NC(32M) V4.X, RUGGEDCOM RSG2100NC(32M) V5.X, RUGGEDCOM RSG2100P, RUGGEDCOM RSG2100PF, RUGGEDCOM RSG2100PNC, RUGGEDCOM RSG2200, RUGGEDCOM RSG2200F, RUGGEDCOM RSG2200NC, RUGGEDCOM RSG2288 V4.X, RUGGEDCOM RSG2288 V5.X, RUGGEDCOM RSG2288NC V4.X, RUGGEDCOM RSG2288NC V5.X, RUGGEDCOM RSG2300 V4.X, RUGGEDCOM RSG2300 V5.X, RUGGEDCOM RSG2300F, RUGGEDCOM RSG2300NC V4.X, RUGGEDCOM RSG2300NC V5.X, RUGGEDCOM RSG2300P V4.X, RUGGEDCOM RSG2300P V5.X, RUGGEDCOM RSG2300PF, RUGGEDCOM RSG2300PNC V4.X, RUGGEDCOM RSG2300PNC V5.X, RUGGEDCOM RSG2488 V4.X, RUGGEDCOM RSG2488 V5.X, RUGGEDCOM RSG2488F, RUGGEDCOM RSG2488NC V4.X, RUGGEDCOM RSG2488NC V5.X, RUGGEDCOM RSG907R, RUGGEDCOM RSG908C, RUGGEDCOM RSG909R, RUGGEDCOM RSG910C, RUGGEDCOM RSG920P V4.X, RUGGEDCOM RSG920P V5.X, RUGGEDCOM RSG920PNC V4.X, RUGGEDCOM RSG920PNC V5.X, RUGGEDCOM RSL910, RUGGEDCOM RSL910NC, RUGGEDCOM RST2228, RUGGEDCOM RST2228P, RUGGEDCOM RST916C, RUGGEDCOM RST916P. The web server of the affected devices contains a vulnerability that may lead to a denial of service condition. An attacker may cause total loss of availability of the web server, which might recover after the attack is over. Siemens' RUGGEDCOM ROS Exists in a vulnerability in resource allocation without restrictions or throttling.Service operation interruption (DoS) It may be in a state. RUGGEDCOM Ethernet switches are designed to operate reliably in electrically harsh and climate demanding environments such as power substations and traffic control cabinets

Trust: 2.25

sources: NVD: CVE-2023-39269 // JVNDB: JVNDB-2023-021984 // CNVD: CNVD-2023-62040 // VULMON: CVE-2023-39269

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2023-62040

AFFECTED PRODUCTS

vendor:siemensmodel:ruggedcom rsg2100scope:ltversion:4.3.8

Trust: 1.2

vendor:siemensmodel:ruggedcom rsg2100ncscope:ltversion:4.3.8

Trust: 1.2

vendor:siemensmodel:ruggedcom rs900ncscope:ltversion:4.3.8

Trust: 1.2

vendor:siemensmodel:ruggedcom rs900scope:ltversion:4.3.8

Trust: 1.2

vendor:siemensmodel:ruggedcom rs900gscope:ltversion:4.3.8

Trust: 1.2

vendor:siemensmodel:ruggedcom rs900gncscope:ltversion:4.3.8

Trust: 1.2

vendor:siemensmodel:ruggedcom rosscope:eqversion:*

Trust: 1.0

vendor:siemensmodel:ruggedcom rosscope:ltversion:4.3.8

Trust: 1.0

vendor:siemensmodel:ruggedcom rosscope:gteversion:5.0.0

Trust: 1.0

vendor:siemensmodel:ruggedcom rosscope:gteversion:4.0.0

Trust: 1.0

vendor:シーメンスmodel:ruggedcom rosscope:eqversion: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rosscope:eqversion:4.0.0 that's all 4.3.8

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rosscope:eqversion:4.3.8

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rosscope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rosscope:eqversion:5.0.0 that's all

Trust: 0.8

vendor:siemensmodel:ruggedcom rsg2100ncscope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2100pscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2100pfscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2100pncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2200scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2200fscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2200ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2288scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2288scope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2288ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2288ncscope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2300scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2300scope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2300fscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2300ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2300ncscope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2300pscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2300pscope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2300pfscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2300pncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs8000ancscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs8000hscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs8000hncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs8000ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs8000tscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs8000tncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg907rscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg908cscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg909rscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg910cscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg920pscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg920pscope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg920pncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg920pncscope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2100scope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2100fscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs910wscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs920lscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs920lncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs920wscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs930lscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs930lncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs930wscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs940gscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs940gfscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs940gncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs969scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs969ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs1600scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs1600fscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs1600fncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs1600ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs1600tscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs1600tncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs8000scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs8000ascope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900gpfscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900gpncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900lscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900lncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900m-gets-c01scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900m-gets-xxscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900m-stnd-c01scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900m-stnd-xxscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900mnc-gets-c01scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900mnc-gets-xxscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900mnc-stnd-xxscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900mnc-stnd-xx-c01scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900ncscope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900wscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs910scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs910lscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs910lncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs910ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs416fscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs416ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs416ncscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs416pscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs416pncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs416pncscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs416pv2scope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs416v2scope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900scope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900fscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900gscope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900gfscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900gncscope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900gpscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2300pncscope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2488scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2488scope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2488fscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2488ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2488ncscope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rsl910scope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rsl910ncscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rst916cscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rst916pscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rst2228scope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rst2228pscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs416pfscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom m2100scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom m2100fscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom m2100ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom m2200scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom m2200fscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom m2200ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rmc30scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rmc30ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rmc8388scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rmc8388scope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rmc8388ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rmc8388ncscope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rp110scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rp110ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs400scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs400fscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs400ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs401scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs401ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs416scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom i800scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom i800ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom i801scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom i801ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom i802scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom i802ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom i803scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom i803ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom m969scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom m969fscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom m969ncscope:ltversion:4.3.8

Trust: 0.6

sources: CNVD: CNVD-2023-62040 // JVNDB: JVNDB-2023-021984 // NVD: CVE-2023-39269

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-39269
value: HIGH

Trust: 1.0

productcert@siemens.com: CVE-2023-39269
value: HIGH

Trust: 1.0

NVD: CVE-2023-39269
value: HIGH

Trust: 0.8

CNVD: CNVD-2023-62040
value: HIGH

Trust: 0.6

CNVD: CNVD-2023-62040
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2023-39269
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 2.0

NVD: CVE-2023-39269
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2023-62040 // JVNDB: JVNDB-2023-021984 // NVD: CVE-2023-39269 // NVD: CVE-2023-39269

PROBLEMTYPE DATA

problemtype:CWE-770

Trust: 1.0

problemtype:Allocation of resources without limits or throttling (CWE-770) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-021984 // NVD: CVE-2023-39269

PATCH

title:Patch for Siemens RUGGEDCOM ROS Device Web Server Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/449716

Trust: 0.6

sources: CNVD: CNVD-2023-62040

EXTERNAL IDS

db:NVDid:CVE-2023-39269

Trust: 3.3

db:SIEMENSid:SSA-770902

Trust: 2.5

db:JVNid:JVNVU90056839

Trust: 0.8

db:ICS CERTid:ICSA-23-222-08

Trust: 0.8

db:JVNDBid:JVNDB-2023-021984

Trust: 0.8

db:CNVDid:CNVD-2023-62040

Trust: 0.6

db:VULMONid:CVE-2023-39269

Trust: 0.1

sources: CNVD: CNVD-2023-62040 // VULMON: CVE-2023-39269 // JVNDB: JVNDB-2023-021984 // NVD: CVE-2023-39269

REFERENCES

url:https://cert-portal.siemens.com/productcert/pdf/ssa-770902.pdf

Trust: 1.9

url:https://jvn.jp/vu/jvnvu90056839/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-39269

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-222-08

Trust: 0.8

url:https://cert-portal.siemens.com/productcert/html/ssa-770902.html

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2023-62040 // VULMON: CVE-2023-39269 // JVNDB: JVNDB-2023-021984 // NVD: CVE-2023-39269

SOURCES

db:CNVDid:CNVD-2023-62040
db:VULMONid:CVE-2023-39269
db:JVNDBid:JVNDB-2023-021984
db:NVDid:CVE-2023-39269

LAST UPDATE DATE

2024-08-14T12:41:37.550000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2023-62040date:2023-08-09T00:00:00
db:VULMONid:CVE-2023-39269date:2023-08-08T00:00:00
db:JVNDBid:JVNDB-2023-021984date:2024-01-22T02:02:00
db:NVDid:CVE-2023-39269date:2023-11-14T11:15:10.950

SOURCES RELEASE DATE

db:CNVDid:CNVD-2023-62040date:2023-08-09T00:00:00
db:VULMONid:CVE-2023-39269date:2023-08-08T00:00:00
db:JVNDBid:JVNDB-2023-021984date:2024-01-22T00:00:00
db:NVDid:CVE-2023-39269date:2023-08-08T10:15:21.967