ID

VAR-202308-0682


CVE

CVE-2023-24845


TITLE

Siemens'  RUGGEDCOM ROS  Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2023-021983

DESCRIPTION

A vulnerability has been identified in RUGGEDCOM i800, RUGGEDCOM i800NC, RUGGEDCOM i801, RUGGEDCOM i801NC, RUGGEDCOM i802, RUGGEDCOM i802NC, RUGGEDCOM i803, RUGGEDCOM i803NC, RUGGEDCOM M2100, RUGGEDCOM M2100F, RUGGEDCOM M2100NC, RUGGEDCOM M2200, RUGGEDCOM M2200F, RUGGEDCOM M2200NC, RUGGEDCOM M969, RUGGEDCOM M969F, RUGGEDCOM M969NC, RUGGEDCOM RMC30, RUGGEDCOM RMC30NC, RUGGEDCOM RMC8388 V4.X, RUGGEDCOM RMC8388 V5.X, RUGGEDCOM RMC8388NC V4.X, RUGGEDCOM RMC8388NC V5.X, RUGGEDCOM RP110, RUGGEDCOM RP110NC, RUGGEDCOM RS1600, RUGGEDCOM RS1600F, RUGGEDCOM RS1600FNC, RUGGEDCOM RS1600NC, RUGGEDCOM RS1600T, RUGGEDCOM RS1600TNC, RUGGEDCOM RS400, RUGGEDCOM RS400F, RUGGEDCOM RS400NC, RUGGEDCOM RS401, RUGGEDCOM RS401NC, RUGGEDCOM RS416, RUGGEDCOM RS416F, RUGGEDCOM RS416NC, RUGGEDCOM RS416NCv2 V4.X, RUGGEDCOM RS416NCv2 V5.X, RUGGEDCOM RS416P, RUGGEDCOM RS416PF, RUGGEDCOM RS416PNC, RUGGEDCOM RS416PNCv2 V4.X, RUGGEDCOM RS416PNCv2 V5.X, RUGGEDCOM RS416Pv2 V4.X, RUGGEDCOM RS416Pv2 V5.X, RUGGEDCOM RS416v2 V4.X, RUGGEDCOM RS416v2 V5.X, RUGGEDCOM RS8000, RUGGEDCOM RS8000A, RUGGEDCOM RS8000ANC, RUGGEDCOM RS8000H, RUGGEDCOM RS8000HNC, RUGGEDCOM RS8000NC, RUGGEDCOM RS8000T, RUGGEDCOM RS8000TNC, RUGGEDCOM RS900, RUGGEDCOM RS900, RUGGEDCOM RS900 (32M) V4.X, RUGGEDCOM RS900 (32M) V5.X, RUGGEDCOM RS900F, RUGGEDCOM RS900G, RUGGEDCOM RS900G (32M) V4.X, RUGGEDCOM RS900G (32M) V5.X, RUGGEDCOM RS900GF, RUGGEDCOM RS900GNC, RUGGEDCOM RS900GNC(32M) V4.X, RUGGEDCOM RS900GNC(32M) V5.X, RUGGEDCOM RS900GP, RUGGEDCOM RS900GPF, RUGGEDCOM RS900GPNC, RUGGEDCOM RS900L, RUGGEDCOM RS900L, RUGGEDCOM RS900LNC, RUGGEDCOM RS900LNC, RUGGEDCOM RS900M-GETS-C01, RUGGEDCOM RS900M-GETS-XX, RUGGEDCOM RS900M-STND-C01, RUGGEDCOM RS900M-STND-XX, RUGGEDCOM RS900MNC-GETS-C01, RUGGEDCOM RS900MNC-GETS-XX, RUGGEDCOM RS900MNC-STND-XX, RUGGEDCOM RS900MNC-STND-XX-C01, RUGGEDCOM RS900NC, RUGGEDCOM RS900NC, RUGGEDCOM RS900NC(32M) V4.X, RUGGEDCOM RS900NC(32M) V5.X, RUGGEDCOM RS900W, RUGGEDCOM RS910, RUGGEDCOM RS910L, RUGGEDCOM RS910LNC, RUGGEDCOM RS910NC, RUGGEDCOM RS910W, RUGGEDCOM RS920L, RUGGEDCOM RS920LNC, RUGGEDCOM RS920W, RUGGEDCOM RS930L, RUGGEDCOM RS930LNC, RUGGEDCOM RS930W, RUGGEDCOM RS940G, RUGGEDCOM RS940GF, RUGGEDCOM RS940GNC, RUGGEDCOM RS969, RUGGEDCOM RS969NC, RUGGEDCOM RSG2100, RUGGEDCOM RSG2100 (32M) V4.X, RUGGEDCOM RSG2100 (32M) V5.X, RUGGEDCOM RSG2100F, RUGGEDCOM RSG2100NC, RUGGEDCOM RSG2100NC(32M) V4.X, RUGGEDCOM RSG2100NC(32M) V5.X, RUGGEDCOM RSG2100P, RUGGEDCOM RSG2100PF, RUGGEDCOM RSG2100PNC, RUGGEDCOM RSG2200, RUGGEDCOM RSG2200F, RUGGEDCOM RSG2200NC, RUGGEDCOM RSG2288 V4.X, RUGGEDCOM RSG2288 V5.X, RUGGEDCOM RSG2288NC V4.X, RUGGEDCOM RSG2288NC V5.X, RUGGEDCOM RSG2300 V4.X, RUGGEDCOM RSG2300 V5.X, RUGGEDCOM RSG2300F, RUGGEDCOM RSG2300NC V4.X, RUGGEDCOM RSG2300NC V5.X, RUGGEDCOM RSG2300P V4.X, RUGGEDCOM RSG2300P V5.X, RUGGEDCOM RSG2300PF, RUGGEDCOM RSG2300PNC V4.X, RUGGEDCOM RSG2300PNC V5.X, RUGGEDCOM RSG2488 V4.X, RUGGEDCOM RSG2488 V5.X, RUGGEDCOM RSG2488F, RUGGEDCOM RSG2488NC V4.X, RUGGEDCOM RSG2488NC V5.X, RUGGEDCOM RSG907R, RUGGEDCOM RSG908C, RUGGEDCOM RSG909R, RUGGEDCOM RSG910C, RUGGEDCOM RSG920P V4.X, RUGGEDCOM RSG920P V5.X, RUGGEDCOM RSG920PNC V4.X, RUGGEDCOM RSG920PNC V5.X, RUGGEDCOM RSL910, RUGGEDCOM RSL910NC, RUGGEDCOM RST2228, RUGGEDCOM RST2228P, RUGGEDCOM RST916C, RUGGEDCOM RST916P. The affected products insufficiently block data from being forwarded over the mirror port into the mirrored network. An attacker could use this behavior to transmit malicious packets to systems in the mirrored network, possibly influencing their configuration and runtime behavior. Siemens' RUGGEDCOM ROS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. RUGGEDCOM's ROS-based devices, typically switches and serial-to-Ethernet devices, are used to connect equipment operating in harsh environments such as power substations and traffic control cabinets

Trust: 2.25

sources: NVD: CVE-2023-24845 // JVNDB: JVNDB-2023-021983 // CNVD: CNVD-2023-62028 // VULMON: CVE-2023-24845

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2023-62028

AFFECTED PRODUCTS

vendor:siemensmodel:ruggedcom rs900scope:ltversion:4.3.8

Trust: 1.2

vendor:siemensmodel:ruggedcom rs900gscope:ltversion:4.3.8

Trust: 1.2

vendor:siemensmodel:ruggedcom rs900gncscope:ltversion:4.3.8

Trust: 1.2

vendor:siemensmodel:ruggedcom rs900ncscope:ltversion:4.3.8

Trust: 1.2

vendor:siemensmodel:ruggedcom rsg2100scope:ltversion:4.3.8

Trust: 1.2

vendor:siemensmodel:ruggedcom rsg2100ncscope:ltversion:4.3.8

Trust: 1.2

vendor:siemensmodel:ruggedcom rosscope:eqversion:*

Trust: 1.0

vendor:siemensmodel:ruggedcom rosscope:ltversion:4.3.8

Trust: 1.0

vendor:siemensmodel:ruggedcom rosscope:gteversion:5.0.0

Trust: 1.0

vendor:siemensmodel:ruggedcom rosscope:gteversion:4.0.0

Trust: 1.0

vendor:シーメンスmodel:ruggedcom rosscope:eqversion: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rosscope:eqversion:4.0.0 that's all 4.3.8

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rosscope:eqversion:4.3.8

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rosscope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rosscope:eqversion:5.0.0 that's all

Trust: 0.8

vendor:siemensmodel:ruggedcom i800scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom i800ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom i801scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom i801ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom i802scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom i802ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom i803scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom i803ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom m969scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom m969fscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom m969ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom m2100scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom m2100fscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom m2100ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom m2200scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom m2200fscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom m2200ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rmc30scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rmc30ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rmc8388scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rmc8388scope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rmc8388ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rmc8388ncscope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rp110scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rp110ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs400fscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs416scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs416fscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs416ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs416ncscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs416pscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs416pfscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs416pncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs416pncscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs416pv2scope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs416v2scope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900scope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900fscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900gscope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900gfscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900gncscope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900gpscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900gpfscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900gpncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900lscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900lncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900m-gets-c01scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900m-gets-xxscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900m-stnd-c01scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900m-stnd-xxscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900mnc-gets-c01scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900mnc-gets-xxscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900mnc-stnd-xxscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900mnc-stnd-xx-c01scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900ncscope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900wscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs910scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs910lscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs910lncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs910ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs910wscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs920lscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs920lncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs920wscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs930lscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs930lncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs930wscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs940gscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs940gfscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs940gncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs969scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rs969ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg907rscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg908cscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg909rscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg910cscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg920pscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg920pscope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg920pncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg920pncscope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2100scope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2100fscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2100ncscope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2100pscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2100pfscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2100pncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2200scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2200fscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2200ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2288scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2288scope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2288ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2288ncscope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2300scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2300scope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2300fscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2300ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2300ncscope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2300pscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2300pscope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2300pfscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2300pncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2300pncscope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2488scope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2488scope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2488fscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2488ncscope:ltversion:4.3.8

Trust: 0.6

vendor:siemensmodel:ruggedcom rsg2488ncscope:eqversion:5.*

Trust: 0.6

vendor:siemensmodel:ruggedcom rsl910scope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rsl910ncscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rst916cscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rst916pscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rst2228scope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rst2228pscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs400scope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs400ncscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs401scope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs401ncscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900scope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900lscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900lncscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs900ncscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs1600scope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs1600fscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs1600fncscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs1600ncscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs1600tscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs1600tncscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs8000scope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs8000ascope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs8000ancscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs8000hscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs8000hncscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs8000ncscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs8000tscope: - version: -

Trust: 0.6

vendor:siemensmodel:ruggedcom rs8000tncscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2023-62028 // JVNDB: JVNDB-2023-021983 // NVD: CVE-2023-24845

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-24845
value: CRITICAL

Trust: 1.0

productcert@siemens.com: CVE-2023-24845
value: CRITICAL

Trust: 1.0

NVD: CVE-2023-24845
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2023-62028
value: HIGH

Trust: 0.6

CNVD: CNVD-2023-62028
severity: HIGH
baseScore: 9.4
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2023-24845
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

productcert@siemens.com: CVE-2023-24845
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.2
version: 3.1

Trust: 1.0

NVD: CVE-2023-24845
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2023-62028 // JVNDB: JVNDB-2023-021983 // NVD: CVE-2023-24845 // NVD: CVE-2023-24845

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-684

Trust: 1.0

problemtype:others (CWE-Other) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-021983 // NVD: CVE-2023-24845

PATCH

title:Patch for Siemens RUGGEDCOM ROS Device Mirror Port Isolation Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/449791

Trust: 0.6

sources: CNVD: CNVD-2023-62028

EXTERNAL IDS

db:NVDid:CVE-2023-24845

Trust: 3.3

db:SIEMENSid:SSA-908185

Trust: 2.5

db:ICS CERTid:ICSA-23-222-12

Trust: 0.8

db:JVNid:JVNVU90056839

Trust: 0.8

db:JVNDBid:JVNDB-2023-021983

Trust: 0.8

db:CNVDid:CNVD-2023-62028

Trust: 0.6

db:VULMONid:CVE-2023-24845

Trust: 0.1

sources: CNVD: CNVD-2023-62028 // VULMON: CVE-2023-24845 // JVNDB: JVNDB-2023-021983 // NVD: CVE-2023-24845

REFERENCES

url:https://cert-portal.siemens.com/productcert/pdf/ssa-908185.pdf

Trust: 1.9

url:https://jvn.jp/vu/jvnvu90056839/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-24845

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-222-12

Trust: 0.8

url:https://cert-portal.siemens.com/productcert/html/ssa-908185.html

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2023-62028 // VULMON: CVE-2023-24845 // JVNDB: JVNDB-2023-021983 // NVD: CVE-2023-24845

SOURCES

db:CNVDid:CNVD-2023-62028
db:VULMONid:CVE-2023-24845
db:JVNDBid:JVNDB-2023-021983
db:NVDid:CVE-2023-24845

LAST UPDATE DATE

2024-08-14T12:59:50.390000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2023-62028date:2023-08-09T00:00:00
db:VULMONid:CVE-2023-24845date:2023-08-08T00:00:00
db:JVNDBid:JVNDB-2023-021983date:2024-01-22T02:02:00
db:NVDid:CVE-2023-24845date:2023-11-14T11:15:09.080

SOURCES RELEASE DATE

db:CNVDid:CNVD-2023-62028date:2023-08-09T00:00:00
db:VULMONid:CVE-2023-24845date:2023-08-08T00:00:00
db:JVNDBid:JVNDB-2023-021983date:2024-01-22T00:00:00
db:NVDid:CVE-2023-24845date:2023-08-08T10:15:13.963