9.4
CRITICAL CVSS 4.0
CVE-2023-44373
Ctera Network Storage Bugs Authenticated Remote Command Injection
Description

Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. Follow-up of CVE-2022-36323.

INFO

Published Date :

Nov. 14, 2023, 11:15 a.m.

Last Modified :

April 14, 2026, 9:16 a.m.

Remotely Exploit :

Yes !
Affected Products

The following products are affected by CVE-2023-44373 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Siemens scalance_s615_firmware
2 Siemens scalance_sc632-2c_firmware
3 Siemens scalance_sc636-2c_firmware
4 Siemens scalance_sc642-2c_firmware
5 Siemens scalance_sc646-2c_firmware
6 Siemens scalance_sc622-2c_firmware
7 Siemens scalance_xf204_firmware
8 Siemens scalance_m804pb_firmware
9 Siemens scalance_m874-2_firmware
10 Siemens scalance_m874-3_firmware
11 Siemens scalance_m876-3_firmware
12 Siemens scalance_m876-4_firmware
13 Siemens ruggedcom_rm1224_lte\(4g\)_eu_firmware
14 Siemens ruggedcom_rm1224_lte\(4g\)_nam_firmware
15 Siemens scalance_m812-1_adsl-router_firmware
16 Siemens scalance_m816-1_adsl-router_firmware
17 Siemens scalance_m826-2_shdsl-router_firmware
18 Siemens scalance_s615_eec_firmware
19 Siemens scalance_sc626-2c_firmware
20 Siemens scalance_w721-1_rj45_firmware
21 Siemens scalance_w722-1_rj45_firmware
22 Siemens scalance_w734-1_rj45_firmware
23 Siemens scalance_w738-1_m12_firmware
24 Siemens scalance_w748-1_m12_firmware
25 Siemens scalance_w761-1_rj45_firmware
26 Siemens scalance_w774-1_m12_eec_firmware
27 Siemens scalance_w774-1_rj45_firmware
28 Siemens scalance_w778-1_m12_firmware
29 Siemens scalance_w778-1_m12_eec_firmware
30 Siemens scalance_w786-1_rj45_firmware
31 Siemens scalance_w786-2_rj45_firmware
32 Siemens scalance_w786-2_sfp_firmware
33 Siemens scalance_w786-2ia_rj45_firmware
34 Siemens scalance_w788-1_m12_firmware
35 Siemens scalance_w788-1_rj45_firmware
36 Siemens scalance_w788-2_m12_firmware
37 Siemens scalance_w788-2_m12_eec_firmware
38 Siemens scalance_wam763-1_firmware
39 Siemens scalance_wam766-1_firmware
40 Siemens scalance_wum763-1_firmware
41 Siemens scalance_wum766-1_firmware
42 Siemens scalance_xc206-2g_poe_firmware
43 Siemens scalance_xc206-2sfp_firmware
44 Siemens scalance_xc206-2sfp_eec_firmware
45 Siemens scalance_xc206-2sfp_g_firmware
46 Siemens scalance_xc206-2sfp_g_eec_firmware
47 Siemens scalance_xc208_firmware
48 Siemens scalance_xc216_firmware
49 Siemens scalance_xc216-3g_poe_firmware
50 Siemens scalance_xc216-4c_firmware
51 Siemens scalance_xc216-4c_g_firmware
52 Siemens scalance_xc216-4c_g_eec_firmware
53 Siemens scalance_xc216eec_firmware
54 Siemens scalance_xc224_firmware
55 Siemens scalance_xc224-4c_g_firmware
56 Siemens scalance_xc224-4c_g_eec_firmware
57 Siemens scalance_xf204_dna_firmware
58 Siemens scalance_xf204-2ba_firmware
59 Siemens scalance_xp208_firmware
60 Siemens scalance_xp208eec_firmware
61 Siemens scalance_xp208poe_eec_firmware
62 Siemens scalance_xp216_firmware
63 Siemens scalance_xp216eec_firmware
64 Siemens scalance_xp216poe_eec_firmware
65 Siemens siplus_net_scalance_xc206-2_firmware
66 Siemens siplus_net_scalance_xc206-2sfp_firmware
67 Siemens siplus_net_scalance_xc208_firmware
68 Siemens siplus_net_scalance_xc216-4c_firmware
69 Siemens scalance_xc208eec_firmware
70 Siemens scalance_xc208g_firmware
71 Siemens scalance_xc208g_eec_firmware
72 Siemens scalance_xc208g_poe_firmware
73 Siemens scalance_xf204-2ba_dna_firmware
74 Siemens scalance_xr326-2c_poe_wg_firmware
75 Siemens 6gk5205-3bb00-2ab2_firmware
76 Siemens 6gk5205-3bb00-2tb2_firmware
77 Siemens 6gk5205-3bd00-2tb2_firmware
78 Siemens 6gk5205-3bd00-2ab2_firmware
79 Siemens 6gk5205-3bf00-2tb2_firmware
80 Siemens 6gk5205-3bf00-2ab2_firmware
81 Siemens 6gk5208-0ba00-2tb2_firmware
82 Siemens 6gk5208-0ba00-2ab2_firmware
83 Siemens 6gk5213-3bd00-2tb2_firmware
84 Siemens 6gk5213-3bd00-2ab2_firmware
85 Siemens 6gk5213-3bb00-2tb2_firmware
86 Siemens 6gk5213-3bb00-2ab2_firmware
87 Siemens 6gk5213-3bf00-2tb2_firmware
88 Siemens 6gk5213-3bf00-2ab2_firmware
89 Siemens 6gk5216-0ba00-2tb2_firmware
90 Siemens 6gk5216-0ba00-2ab2_firmware
91 Siemens 6gk5206-2bd00-2ac2_firmware
92 Siemens 6gk5206-2bb00-2ac2_firmware
93 Siemens 6gk5206-2rs00-2ac2_firmware
94 Siemens 6gk5206-2rs00-5ac2_firmware
95 Siemens 6gk5206-2rs00-5fc2_firmware
96 Siemens 6gk5206-2bs00-2ac2_firmware
97 Siemens 6gk5206-2bs00-2fc2_firmware
98 Siemens 6gk5206-2gs00-2ac2_firmware
99 Siemens 6gk5206-2gs00-2tc2_firmware
100 Siemens 6gk5206-2gs00-2fc2_firmware
101 Siemens 6gk5208-0ba00-2ac2_firmware
102 Siemens 6gk5208-0ba00-2fc2_firmware
103 Siemens 6gk5208-0ga00-2ac2_firmware
104 Siemens 6gk5208-0ga00-2tc2_firmware
105 Siemens 6gk5208-0ga00-2fc2_firmware
106 Siemens 6gk5208-0ra00-2ac2_firmware
107 Siemens 6gk5208-0ra00-5ac2_firmware
108 Siemens 6gk5216-0ba00-2ac2_firmware
109 Siemens 6gk5216-3rs00-2ac2_firmware
110 Siemens 6gk5216-3rs00-5ac2_firmware
111 Siemens 6gk5216-4bs00-2ac2_firmware
112 Siemens 6gk5216-4gs00-2ac2_firmware
113 Siemens 6gk5216-4gs00-2tc2_firmware
114 Siemens 6gk5216-4gs00-2fc2_firmware
115 Siemens 6gk5216-0ba00-2fc2_firmware
116 Siemens 6gk5224-0ba00-2ac2_firmware
117 Siemens 6gk5224-4gs00-2ac2_firmware
118 Siemens 6gk5224-4gs00-2tc2_firmware
119 Siemens 6gk5224-4gs00-2fc2_firmware
120 Siemens 6gk5204-0ba00-2gf2_firmware
121 Siemens 6gk5204-0ba00-2yf2_firmware
122 Siemens 6gk5204-2aa00-2gf2_firmware
123 Siemens 6gk5204-2aa00-2yf2_firmware
124 Siemens 6gk5208-0ha00-2as6_firmware
125 Siemens 6gk5208-0ha00-2ts6_firmware
126 Siemens 6gk5208-0ha00-2es6_firmware
127 Siemens 6gk5208-0ua00-5es6_firmware
128 Siemens 6gk5216-0ha00-2as6_firmware
129 Siemens 6gk5216-0ha00-2ts6_firmware
130 Siemens 6gk5216-0ha00-2es6_firmware
131 Siemens 6gk5216-0ua00-5es6_firmware
132 Siemens 6gk5324-0ba00-3ar3_firmware
133 Siemens 6gk5324-0ba00-2ar3_firmware
134 Siemens 6gk5326-2qs00-3ar3_firmware
135 Siemens 6gk5326-2qs00-3rr3_firmware
136 Siemens 6gk5328-4fs00-3ar3_firmware
137 Siemens 6gk5328-4fs00-3rr3_firmware
138 Siemens 6gk5328-4fs00-2ar3_firmware
139 Siemens 6gk5328-4fs00-2rr3_firmware
140 Siemens 6gk5328-4ss00-3ar3_firmware
141 Siemens 6gk5328-4ss00-2ar3_firmware
142 Siemens 6ag1206-2bb00-7ac2_firmware
143 Siemens 6ag1206-2bs00-7ac2_firmware
144 Siemens 6ag1208-0ba00-7ac2_firmware
145 Siemens 6ag1216-4bs00-7ac2_firmware
146 Siemens scalance_xb208_\(e\/ip\)_firmware
147 Siemens scalance_xb208_\(pn\)_firmware
148 Siemens scalance_xb216_\(e\/ip\)_firmware
149 Siemens scalance_xb216_\(pn\)_firmware
150 Siemens scalance_xc206-2_\(sc\)_firmware
151 Siemens scalance_xc206-2_\(st\/bfoc\)_firmware
152 Siemens scalance_xc206-2g_poe_\(54_v_dc\)_firmware
153 Siemens scalance_xc206-2g_poe_eec_\(54_v_dc\)_firmware
154 Siemens scalance_xc206-2sfp_g_\(eip_def.\)_firmware
155 Siemens scalance_xc208g_\(eip_def.\)_firmware
156 Siemens scalance_xc208g_poe_\(54_v_dc\)_firmware
157 Siemens scalance_xc216-3g_poe_\(54_v_dc\)_firmware
158 Siemens scalance_xc216-4c_g_\(eip_def.\)_firmware
159 Siemens scalance_xc224-4c_g_\(eip_def.\)_firmware
160 Siemens scalance_xp208_\(ethernet\/ip\)_firmware
161 Siemens scalance_xp216_\(ethernet\/ip\)_firmware
162 Siemens scalance_xr326-2c_poe_wg_\(without_ul\)_firmware
163 Siemens 6gk5205-3bb00-2ab2
164 Siemens 6gk5205-3bb00-2tb2
165 Siemens 6gk5205-3bd00-2tb2
166 Siemens 6gk5205-3bd00-2ab2
167 Siemens 6gk5205-3bf00-2tb2
168 Siemens 6gk5205-3bf00-2ab2
169 Siemens 6gk5208-0ba00-2tb2
170 Siemens 6gk5208-0ba00-2ab2
171 Siemens 6gk5213-3bd00-2tb2
172 Siemens 6gk5213-3bd00-2ab2
173 Siemens 6gk5213-3bb00-2tb2
174 Siemens 6gk5213-3bb00-2ab2
175 Siemens 6gk5213-3bf00-2tb2
176 Siemens 6gk5213-3bf00-2ab2
177 Siemens 6gk5216-0ba00-2tb2
178 Siemens 6gk5216-0ba00-2ab2
179 Siemens 6gk5206-2bd00-2ac2
180 Siemens 6gk5206-2bb00-2ac2
181 Siemens 6gk5206-2rs00-2ac2
182 Siemens 6gk5206-2rs00-5ac2
183 Siemens 6gk5206-2rs00-5fc2
184 Siemens 6gk5206-2bs00-2ac2
185 Siemens 6gk5206-2bs00-2fc2
186 Siemens 6gk5206-2gs00-2ac2
187 Siemens 6gk5206-2gs00-2tc2
188 Siemens 6gk5206-2gs00-2fc2
189 Siemens 6gk5208-0ba00-2ac2
190 Siemens 6gk5208-0ba00-2fc2
191 Siemens 6gk5208-0ga00-2ac2
192 Siemens 6gk5208-0ga00-2tc2
193 Siemens 6gk5208-0ga00-2fc2
194 Siemens 6gk5208-0ra00-2ac2
195 Siemens 6gk5208-0ra00-5ac2
196 Siemens 6gk5216-0ba00-2ac2
197 Siemens 6gk5216-3rs00-2ac2
198 Siemens 6gk5216-3rs00-5ac2
199 Siemens 6gk5216-4bs00-2ac2
200 Siemens 6gk5216-4gs00-2ac2
201 Siemens 6gk5216-4gs00-2tc2
202 Siemens 6gk5216-4gs00-2fc2
203 Siemens 6gk5216-0ba00-2fc2
204 Siemens 6gk5224-0ba00-2ac2
205 Siemens 6gk5224-4gs00-2ac2
206 Siemens 6gk5224-4gs00-2tc2
207 Siemens 6gk5224-4gs00-2fc2
208 Siemens 6gk5204-0ba00-2gf2
209 Siemens 6gk5204-0ba00-2yf2
210 Siemens 6gk5204-2aa00-2gf2
211 Siemens 6gk5204-2aa00-2yf2
212 Siemens 6gk5208-0ha00-2as6
213 Siemens 6gk5208-0ha00-2ts6
214 Siemens 6gk5208-0ha00-2es6
215 Siemens 6gk5208-0ua00-5es6
216 Siemens 6gk5216-0ha00-2as6
217 Siemens 6gk5216-0ha00-2ts6
218 Siemens 6gk5216-0ha00-2es6
219 Siemens 6gk5216-0ua00-5es6
220 Siemens 6gk5324-0ba00-3ar3
221 Siemens 6gk5324-0ba00-2ar3
222 Siemens 6gk5326-2qs00-3ar3
223 Siemens 6gk5326-2qs00-3rr3
224 Siemens 6gk5328-4fs00-3ar3
225 Siemens 6gk5328-4fs00-3rr3
226 Siemens 6gk5328-4fs00-2ar3
227 Siemens 6gk5328-4fs00-2rr3
228 Siemens 6gk5328-4ss00-3ar3
229 Siemens 6gk5328-4ss00-2ar3
230 Siemens 6ag1206-2bb00-7ac2
231 Siemens 6ag1206-2bs00-7ac2
232 Siemens 6ag1208-0ba00-7ac2
233 Siemens 6ag1216-4bs00-7ac2
234 Siemens scalance_m876-3_\(rok\)_firmware
235 Siemens scalance_m876-4_\(eu\)_firmware
236 Siemens scalance_m876-4_\(nam\)_firmware
237 Siemens scalance_mum853-1_\(eu\)_firmware
238 Siemens scalance_mum856-1_\(eu\)_firmware
239 Siemens scalance_mum856-1_\(row\)_firmware
240 Siemens scalance_s615_eec_lan-router_firmware
241 Siemens scalance_s615_lan-router_firmware
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 CRITICAL [email protected]
CVSS 4.0 CRITICAL [email protected]
Public PoC/Exploit Available at Github

CVE-2023-44373 has a 1 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2023-44373 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2023-44373 weaknesses.

CAPEC-3: Using Leading 'Ghost' Character Sequences to Bypass Input Filters Using Leading 'Ghost' Character Sequences to Bypass Input Filters CAPEC-6: Argument Injection Argument Injection CAPEC-7: Blind SQL Injection Blind SQL Injection CAPEC-8: Buffer Overflow in an API Call Buffer Overflow in an API Call CAPEC-9: Buffer Overflow in Local Command-Line Utilities Buffer Overflow in Local Command-Line Utilities CAPEC-10: Buffer Overflow via Environment Variables Buffer Overflow via Environment Variables CAPEC-13: Subverting Environment Variable Values Subverting Environment Variable Values CAPEC-14: Client-side Injection-induced Buffer Overflow Client-side Injection-induced Buffer Overflow CAPEC-24: Filter Failure through Buffer Overflow Filter Failure through Buffer Overflow CAPEC-28: Fuzzing Fuzzing CAPEC-34: HTTP Response Splitting HTTP Response Splitting CAPEC-42: MIME Conversion MIME Conversion CAPEC-43: Exploiting Multiple Input Interpretation Layers Exploiting Multiple Input Interpretation Layers CAPEC-45: Buffer Overflow via Symbolic Links Buffer Overflow via Symbolic Links CAPEC-46: Overflow Variables and Tags Overflow Variables and Tags CAPEC-47: Buffer Overflow via Parameter Expansion Buffer Overflow via Parameter Expansion CAPEC-51: Poison Web Service Registry Poison Web Service Registry CAPEC-52: Embedding NULL Bytes Embedding NULL Bytes CAPEC-53: Postfix, Null Terminate, and Backslash Postfix, Null Terminate, and Backslash CAPEC-64: Using Slashes and URL Encoding Combined to Bypass Validation Logic Using Slashes and URL Encoding Combined to Bypass Validation Logic CAPEC-67: String Format Overflow in syslog() String Format Overflow in syslog() CAPEC-71: Using Unicode Encoding to Bypass Validation Logic Using Unicode Encoding to Bypass Validation Logic CAPEC-72: URL Encoding URL Encoding CAPEC-76: Manipulating Web Input to File System Calls Manipulating Web Input to File System Calls CAPEC-78: Using Escaped Slashes in Alternate Encoding Using Escaped Slashes in Alternate Encoding CAPEC-79: Using Slashes in Alternate Encoding Using Slashes in Alternate Encoding CAPEC-80: Using UTF-8 Encoding to Bypass Validation Logic Using UTF-8 Encoding to Bypass Validation Logic CAPEC-83: XPath Injection XPath Injection CAPEC-84: XQuery Injection XQuery Injection CAPEC-101: Server Side Include (SSI) Injection Server Side Include (SSI) Injection CAPEC-105: HTTP Request Splitting HTTP Request Splitting CAPEC-108: Command Line Execution through SQL Injection Command Line Execution through SQL Injection CAPEC-120: Double Encoding Double Encoding CAPEC-135: Format String Injection Format String Injection CAPEC-250: XML Injection XML Injection CAPEC-267: Leverage Alternate Encoding Leverage Alternate Encoding CAPEC-273: HTTP Response Smuggling HTTP Response Smuggling

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Perimeter security exploitation framework — 164 modules covering FW, NGFW, UTM, WAF, VPN, NAC, LB, and OT/ICS firewalls (Fortinet, Cisco, Palo Alto, F5, Citrix, Check Point, SonicWall, Ivanti, Siemens, Moxa, +13 vendors). GPU-accelerated, ML-driven, async concurrency, Rich TUI.

exploitation-framework firewall ics-security ngfw ot-security penetration-testing pentest python red-team security-testing vpn-exploit vulnerability-scanner waf-bypass

Shell Makefile Python

Updated: 1 week, 6 days ago
0 stars 0 fork 0 watcher
Born at : April 5, 2026, 5:09 a.m. This repo has been linked 48 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2023-44373 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2023-44373 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    Apr. 14, 2026

    Action Type Old Value New Value
    Changed Description A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.0), SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) (All versions < V2.4.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions < V2.4.0), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions < V2.4.0), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions < V2.4.0), SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0) (All versions < V2.4.0), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions < V2.4.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions < V2.4.0), SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0) (All versions < V2.4.0), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions < V2.4.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions < V2.4.0), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) (All versions < V2.4.0), SCALANCE WUB762-1 (6GK5762-1AJ00-2AA0) (All versions < V2.4.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions < V2.4.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions < V2.4.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions < V2.4.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions < V2.4.0), SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0) (All versions < V2.4.0), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions < V2.4.0), SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0) (All versions < V2.4.0). Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. Follow-up of CVE-2022-36323. Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. Follow-up of CVE-2022-36323.
    Added Reference https://cert-portal.siemens.com/productcert/html/ssa-019200.html
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://cert-portal.siemens.com/productcert/html/ssa-180704.html
    Added Reference https://cert-portal.siemens.com/productcert/html/ssa-602936.html
    Added Reference https://cert-portal.siemens.com/productcert/html/ssa-690517.html
    Added Reference https://cert-portal.siemens.com/productcert/html/ssa-699386.html
    Added Reference https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf
    Added Reference https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf
  • CVE Modified by [email protected]

    Sep. 10, 2024

    Action Type Old Value New Value
    Changed Description A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.0). Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. Follow-up of CVE-2022-36323. A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.0), SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) (All versions < V2.4.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions < V2.4.0), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions < V2.4.0), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions < V2.4.0), SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0) (All versions < V2.4.0), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions < V2.4.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions < V2.4.0), SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0) (All versions < V2.4.0), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions < V2.4.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions < V2.4.0), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) (All versions < V2.4.0), SCALANCE WUB762-1 (6GK5762-1AJ00-2AA0) (All versions < V2.4.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions < V2.4.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions < V2.4.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions < V2.4.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions < V2.4.0), SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0) (All versions < V2.4.0), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions < V2.4.0), SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0) (All versions < V2.4.0). Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. Follow-up of CVE-2022-36323.
    Added Reference Siemens AG https://cert-portal.siemens.com/productcert/html/ssa-721642.html [No types assigned]
  • CVE Modified by [email protected]

    Aug. 13, 2024

    Action Type Old Value New Value
    Changed Description Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. Follow-up of CVE-2022-36323. A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.0). Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. Follow-up of CVE-2022-36323.
    Added CVSS V4.0 Siemens AG CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • CVE Modified by [email protected]

    Jun. 11, 2024

    Action Type Old Value New Value
    Added Reference Siemens AG https://cert-portal.siemens.com/productcert/html/ssa-690517.html [No types assigned]
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Feb. 13, 2024

    Action Type Old Value New Value
    Changed Description A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU, RUGGEDCOM RM1224 LTE(4G) NAM, SCALANCE M804PB, SCALANCE M812-1 ADSL-Router (Annex A), SCALANCE M812-1 ADSL-Router (Annex B), SCALANCE M816-1 ADSL-Router (Annex A), SCALANCE M816-1 ADSL-Router (Annex B), SCALANCE M826-2 SHDSL-Router, SCALANCE M874-2, SCALANCE M874-3, SCALANCE M876-3 (EVDO), SCALANCE M876-3 (ROK), SCALANCE M876-4, SCALANCE M876-4 (EU), SCALANCE M876-4 (NAM), SCALANCE MUM853-1 (EU), SCALANCE MUM856-1 (EU), SCALANCE MUM856-1 (RoW), SCALANCE S615, SCALANCE S615 EEC, SCALANCE XB205-3 (SC, PN), SCALANCE XB205-3 (ST, E/IP), SCALANCE XB205-3 (ST, E/IP), SCALANCE XB205-3 (ST, PN), SCALANCE XB205-3LD (SC, E/IP), SCALANCE XB205-3LD (SC, PN), SCALANCE XB208 (E/IP), SCALANCE XB208 (PN), SCALANCE XB213-3 (SC, E/IP), SCALANCE XB213-3 (SC, PN), SCALANCE XB213-3 (ST, E/IP), SCALANCE XB213-3 (ST, PN), SCALANCE XB213-3LD (SC, E/IP), SCALANCE XB213-3LD (SC, PN), SCALANCE XB216 (E/IP), SCALANCE XB216 (PN), SCALANCE XC206-2 (SC), SCALANCE XC206-2 (ST/BFOC), SCALANCE XC206-2G PoE, SCALANCE XC206-2G PoE (54 V DC), SCALANCE XC206-2G PoE EEC (54 V DC), SCALANCE XC206-2SFP, SCALANCE XC206-2SFP EEC, SCALANCE XC206-2SFP G, SCALANCE XC206-2SFP G (EIP DEF.), SCALANCE XC206-2SFP G EEC, SCALANCE XC208, SCALANCE XC208EEC, SCALANCE XC208G, SCALANCE XC208G (EIP def.), SCALANCE XC208G EEC, SCALANCE XC208G PoE, SCALANCE XC208G PoE (54 V DC), SCALANCE XC216, SCALANCE XC216-3G PoE, SCALANCE XC216-3G PoE (54 V DC), SCALANCE XC216-4C, SCALANCE XC216-4C G, SCALANCE XC216-4C G (EIP Def.), SCALANCE XC216-4C G EEC, SCALANCE XC216EEC, SCALANCE XC224, SCALANCE XC224-4C G, SCALANCE XC224-4C G (EIP Def.), SCALANCE XC224-4C G EEC, SCALANCE XF204, SCALANCE XF204 DNA, SCALANCE XF204-2BA, SCALANCE XF204-2BA DNA, SCALANCE XP208, SCALANCE XP208 (Ethernet/IP), SCALANCE XP208EEC, SCALANCE XP208PoE EEC, SCALANCE XP216, SCALANCE XP216 (Ethernet/IP), SCALANCE XP216EEC, SCALANCE XP216POE EEC, SCALANCE XR324WG (24 x FE, AC 230V), SCALANCE XR324WG (24 X FE, DC 24V), SCALANCE XR326-2C PoE WG, SCALANCE XR326-2C PoE WG (without UL), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V), SCALANCE XR328-4C WG (28xGE, AC 230V), SCALANCE XR328-4C WG (28xGE, DC 24V), SIPLUS NET SCALANCE XC206-2, SIPLUS NET SCALANCE XC206-2SFP, SIPLUS NET SCALANCE XC208, SIPLUS NET SCALANCE XC216-4C. Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. Follow-up of CVE-2022-36323. Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. Follow-up of CVE-2022-36323.
    Added Reference Siemens AG https://cert-portal.siemens.com/productcert/html/ssa-699386.html [No types assigned]
    Added Reference Siemens AG https://cert-portal.siemens.com/productcert/html/ssa-180704.html [No types assigned]
    Added Reference Siemens AG https://cert-portal.siemens.com/productcert/html/ssa-602936.html [No types assigned]
  • CVE Modified by [email protected]

    Dec. 12, 2023

    Action Type Old Value New Value
    Changed Description A vulnerability has been identified in SCALANCE XB205-3 (SC, PN) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, PN) (All versions < V4.5), SCALANCE XB205-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB205-3LD (SC, PN) (All versions < V4.5), SCALANCE XB208 (E/IP) (All versions < V4.5), SCALANCE XB208 (PN) (All versions < V4.5), SCALANCE XB213-3 (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3 (SC, PN) (All versions < V4.5), SCALANCE XB213-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB213-3 (ST, PN) (All versions < V4.5), SCALANCE XB213-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3LD (SC, PN) (All versions < V4.5), SCALANCE XB216 (E/IP) (All versions < V4.5), SCALANCE XB216 (PN) (All versions < V4.5), SCALANCE XC206-2 (SC) (All versions < V4.5), SCALANCE XC206-2 (ST/BFOC) (All versions < V4.5), SCALANCE XC206-2G PoE (All versions < V4.5), SCALANCE XC206-2G PoE (54 V DC) (All versions < V4.5), SCALANCE XC206-2G PoE EEC (54 V DC) (All versions < V4.5), SCALANCE XC206-2SFP (All versions < V4.5), SCALANCE XC206-2SFP EEC (All versions < V4.5), SCALANCE XC206-2SFP G (All versions < V4.5), SCALANCE XC206-2SFP G (EIP DEF.) (All versions < V4.5), SCALANCE XC206-2SFP G EEC (All versions < V4.5), SCALANCE XC208 (All versions < V4.5), SCALANCE XC208EEC (All versions < V4.5), SCALANCE XC208G (All versions < V4.5), SCALANCE XC208G (EIP def.) (All versions < V4.5), SCALANCE XC208G EEC (All versions < V4.5), SCALANCE XC208G PoE (All versions < V4.5), SCALANCE XC208G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216 (All versions < V4.5), SCALANCE XC216-3G PoE (All versions < V4.5), SCALANCE XC216-3G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216-4C (All versions < V4.5), SCALANCE XC216-4C G (All versions < V4.5), SCALANCE XC216-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC216-4C G EEC (All versions < V4.5), SCALANCE XC216EEC (All versions < V4.5), SCALANCE XC224 (All versions < V4.5), SCALANCE XC224-4C G (All versions < V4.5), SCALANCE XC224-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC224-4C G EEC (All versions < V4.5), SCALANCE XF204 (All versions < V4.5), SCALANCE XF204 DNA (All versions < V4.5), SCALANCE XF204-2BA (All versions < V4.5), SCALANCE XF204-2BA DNA (All versions < V4.5), SCALANCE XP208 (All versions < V4.5), SCALANCE XP208 (Ethernet/IP) (All versions < V4.5), SCALANCE XP208EEC (All versions < V4.5), SCALANCE XP208PoE EEC (All versions < V4.5), SCALANCE XP216 (All versions < V4.5), SCALANCE XP216 (Ethernet/IP) (All versions < V4.5), SCALANCE XP216EEC (All versions < V4.5), SCALANCE XP216POE EEC (All versions < V4.5), SCALANCE XR324WG (24 x FE, AC 230V) (All versions < V4.5), SCALANCE XR324WG (24 X FE, DC 24V) (All versions < V4.5), SCALANCE XR326-2C PoE WG (All versions < V4.5), SCALANCE XR326-2C PoE WG (without UL) (All versions < V4.5), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, AC 230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, DC 24V) (All versions < V4.5), SIPLUS NET SCALANCE XC206-2 (All versions < V4.5), SIPLUS NET SCALANCE XC206-2SFP (All versions < V4.5), SIPLUS NET SCALANCE XC208 (All versions < V4.5), SIPLUS NET SCALANCE XC216-4C (All versions < V4.5). Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. Follow-up of CVE-2022-36323. A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU, RUGGEDCOM RM1224 LTE(4G) NAM, SCALANCE M804PB, SCALANCE M812-1 ADSL-Router (Annex A), SCALANCE M812-1 ADSL-Router (Annex B), SCALANCE M816-1 ADSL-Router (Annex A), SCALANCE M816-1 ADSL-Router (Annex B), SCALANCE M826-2 SHDSL-Router, SCALANCE M874-2, SCALANCE M874-3, SCALANCE M876-3 (EVDO), SCALANCE M876-3 (ROK), SCALANCE M876-4, SCALANCE M876-4 (EU), SCALANCE M876-4 (NAM), SCALANCE MUM853-1 (EU), SCALANCE MUM856-1 (EU), SCALANCE MUM856-1 (RoW), SCALANCE S615, SCALANCE S615 EEC, SCALANCE XB205-3 (SC, PN), SCALANCE XB205-3 (ST, E/IP), SCALANCE XB205-3 (ST, E/IP), SCALANCE XB205-3 (ST, PN), SCALANCE XB205-3LD (SC, E/IP), SCALANCE XB205-3LD (SC, PN), SCALANCE XB208 (E/IP), SCALANCE XB208 (PN), SCALANCE XB213-3 (SC, E/IP), SCALANCE XB213-3 (SC, PN), SCALANCE XB213-3 (ST, E/IP), SCALANCE XB213-3 (ST, PN), SCALANCE XB213-3LD (SC, E/IP), SCALANCE XB213-3LD (SC, PN), SCALANCE XB216 (E/IP), SCALANCE XB216 (PN), SCALANCE XC206-2 (SC), SCALANCE XC206-2 (ST/BFOC), SCALANCE XC206-2G PoE, SCALANCE XC206-2G PoE (54 V DC), SCALANCE XC206-2G PoE EEC (54 V DC), SCALANCE XC206-2SFP, SCALANCE XC206-2SFP EEC, SCALANCE XC206-2SFP G, SCALANCE XC206-2SFP G (EIP DEF.), SCALANCE XC206-2SFP G EEC, SCALANCE XC208, SCALANCE XC208EEC, SCALANCE XC208G, SCALANCE XC208G (EIP def.), SCALANCE XC208G EEC, SCALANCE XC208G PoE, SCALANCE XC208G PoE (54 V DC), SCALANCE XC216, SCALANCE XC216-3G PoE, SCALANCE XC216-3G PoE (54 V DC), SCALANCE XC216-4C, SCALANCE XC216-4C G, SCALANCE XC216-4C G (EIP Def.), SCALANCE XC216-4C G EEC, SCALANCE XC216EEC, SCALANCE XC224, SCALANCE XC224-4C G, SCALANCE XC224-4C G (EIP Def.), SCALANCE XC224-4C G EEC, SCALANCE XF204, SCALANCE XF204 DNA, SCALANCE XF204-2BA, SCALANCE XF204-2BA DNA, SCALANCE XP208, SCALANCE XP208 (Ethernet/IP), SCALANCE XP208EEC, SCALANCE XP208PoE EEC, SCALANCE XP216, SCALANCE XP216 (Ethernet/IP), SCALANCE XP216EEC, SCALANCE XP216POE EEC, SCALANCE XR324WG (24 x FE, AC 230V), SCALANCE XR324WG (24 X FE, DC 24V), SCALANCE XR326-2C PoE WG, SCALANCE XR326-2C PoE WG (without UL), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V), SCALANCE XR328-4C WG (28xGE, AC 230V), SCALANCE XR328-4C WG (28xGE, DC 24V), SIPLUS NET SCALANCE XC206-2, SIPLUS NET SCALANCE XC206-2SFP, SIPLUS NET SCALANCE XC208, SIPLUS NET SCALANCE XC216-4C. Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. Follow-up of CVE-2022-36323.
    Added Reference Siemens AG https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf [No types assigned]
  • Initial Analysis by [email protected]

    Nov. 28, 2023

    Action Type Old Value New Value
    Changed Reference Type https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf No Types Assigned https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf Vendor Advisory
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5205-3bb00-2ab2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5205-3bb00-2ab2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5205-3bb00-2tb2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5205-3bb00-2tb2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5205-3bd00-2tb2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5205-3bd00-2tb2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5205-3bd00-2ab2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5205-3bd00-2ab2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5205-3bf00-2tb2_firmware:*:*:*:*:*:*:*:* versions up to (including) 4.5 OR cpe:2.3:h:siemens:6gk5205-3bf00-2tb2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5205-3bf00-2ab2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5205-3bf00-2ab2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5208-0ba00-2tb2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5208-0ba00-2tb2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5208-0ba00-2ab2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5208-0ba00-2ab2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5213-3bd00-2tb2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5213-3bd00-2tb2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5213-3bd00-2ab2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5213-3bd00-2ab2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5213-3bb00-2tb2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5213-3bb00-2tb2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5213-3bb00-2ab2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5213-3bb00-2ab2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5213-3bf00-2tb2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5213-3bf00-2tb2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5213-3bf00-2ab2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5213-3bf00-2ab2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5216-0ba00-2tb2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5216-0ba00-2tb2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5216-0ba00-2ab2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5216-0ba00-2ab2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5206-2bd00-2ac2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5206-2bd00-2ac2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5206-2bb00-2ac2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5206-2bb00-2ac2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5206-2rs00-2ac2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5206-2rs00-2ac2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5206-2rs00-5ac2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5206-2rs00-5ac2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5206-2rs00-5fc2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5206-2rs00-5fc2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5206-2bs00-2ac2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5206-2bs00-2ac2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5206-2bs00-2fc2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5206-2bs00-2fc2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5206-2gs00-2ac2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5206-2gs00-2ac2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5206-2gs00-2tc2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5206-2gs00-2tc2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5206-2gs00-2fc2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5206-2gs00-2fc2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5208-0ba00-2ac2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5208-0ba00-2ac2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5208-0ba00-2fc2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5208-0ba00-2fc2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5208-0ga00-2ac2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5208-0ga00-2ac2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5208-0ga00-2tc2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5208-0ga00-2tc2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5208-0ga00-2fc2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5208-0ga00-2fc2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5208-0ra00-2ac2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5208-0ra00-2ac2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5208-0ra00-5ac2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5208-0ra00-5ac2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5216-0ba00-2ac2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5216-0ba00-2ac2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5216-3rs00-2ac2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5216-3rs00-2ac2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5216-3rs00-5ac2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5216-3rs00-5ac2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5216-4bs00-2ac2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5216-4bs00-2ac2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5216-4gs00-2ac2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5216-4gs00-2ac2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5216-4gs00-2tc2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5216-4gs00-2tc2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5216-4gs00-2fc2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5216-4gs00-2fc2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5216-0ba00-2fc2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5216-0ba00-2fc2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5224-0ba00-2ac2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5224-0ba00-2ac2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5224-4gs00-2ac2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5224-4gs00-2ac2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5224-4gs00-2tc2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5224-4gs00-2tc2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5224-4gs00-2fc2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5224-4gs00-2fc2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5204-0ba00-2gf2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5204-0ba00-2gf2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5204-0ba00-2yf2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5204-0ba00-2yf2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5204-2aa00-2gf2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5204-2aa00-2gf2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5204-2aa00-2yf2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5204-2aa00-2yf2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5208-0ha00-2as6_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5208-0ha00-2as6:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5208-0ha00-2ts6_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5208-0ha00-2ts6:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5208-0ha00-2es6_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5208-0ha00-2es6:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5208-0ua00-5es6_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5208-0ua00-5es6:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5216-0ha00-2as6_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5216-0ha00-2as6:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5216-0ha00-2ts6_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5216-0ha00-2ts6:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5216-0ha00-2es6_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5216-0ha00-2es6:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5216-0ua00-5es6_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5216-0ua00-5es6:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5324-0ba00-3ar3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5324-0ba00-3ar3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5324-0ba00-2ar3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5324-0ba00-2ar3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5326-2qs00-3ar3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5326-2qs00-3ar3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5326-2qs00-3rr3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5326-2qs00-3rr3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5328-4fs00-3ar3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5328-4fs00-3ar3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5328-4fs00-3rr3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5328-4fs00-3rr3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5328-4fs00-2ar3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5328-4fs00-2ar3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5328-4fs00-2rr3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5328-4fs00-2rr3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5328-4ss00-3ar3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5328-4ss00-3ar3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6gk5328-4ss00-2ar3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6gk5328-4ss00-2ar3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6ag1206-2bb00-7ac2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6ag1206-2bb00-7ac2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6ag1206-2bs00-7ac2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6ag1206-2bs00-7ac2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6ag1208-0ba00-7ac2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6ag1208-0ba00-7ac2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:6ag1216-4bs00-7ac2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.5 OR cpe:2.3:h:siemens:6ag1216-4bs00-7ac2:-:*:*:*:*:*:*:*
  • CVE Received by [email protected]

    Nov. 14, 2023

    Action Type Old Value New Value
    Added Description A vulnerability has been identified in SCALANCE XB205-3 (SC, PN) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, PN) (All versions < V4.5), SCALANCE XB205-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB205-3LD (SC, PN) (All versions < V4.5), SCALANCE XB208 (E/IP) (All versions < V4.5), SCALANCE XB208 (PN) (All versions < V4.5), SCALANCE XB213-3 (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3 (SC, PN) (All versions < V4.5), SCALANCE XB213-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB213-3 (ST, PN) (All versions < V4.5), SCALANCE XB213-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3LD (SC, PN) (All versions < V4.5), SCALANCE XB216 (E/IP) (All versions < V4.5), SCALANCE XB216 (PN) (All versions < V4.5), SCALANCE XC206-2 (SC) (All versions < V4.5), SCALANCE XC206-2 (ST/BFOC) (All versions < V4.5), SCALANCE XC206-2G PoE (All versions < V4.5), SCALANCE XC206-2G PoE (54 V DC) (All versions < V4.5), SCALANCE XC206-2G PoE EEC (54 V DC) (All versions < V4.5), SCALANCE XC206-2SFP (All versions < V4.5), SCALANCE XC206-2SFP EEC (All versions < V4.5), SCALANCE XC206-2SFP G (All versions < V4.5), SCALANCE XC206-2SFP G (EIP DEF.) (All versions < V4.5), SCALANCE XC206-2SFP G EEC (All versions < V4.5), SCALANCE XC208 (All versions < V4.5), SCALANCE XC208EEC (All versions < V4.5), SCALANCE XC208G (All versions < V4.5), SCALANCE XC208G (EIP def.) (All versions < V4.5), SCALANCE XC208G EEC (All versions < V4.5), SCALANCE XC208G PoE (All versions < V4.5), SCALANCE XC208G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216 (All versions < V4.5), SCALANCE XC216-3G PoE (All versions < V4.5), SCALANCE XC216-3G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216-4C (All versions < V4.5), SCALANCE XC216-4C G (All versions < V4.5), SCALANCE XC216-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC216-4C G EEC (All versions < V4.5), SCALANCE XC216EEC (All versions < V4.5), SCALANCE XC224 (All versions < V4.5), SCALANCE XC224-4C G (All versions < V4.5), SCALANCE XC224-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC224-4C G EEC (All versions < V4.5), SCALANCE XF204 (All versions < V4.5), SCALANCE XF204 DNA (All versions < V4.5), SCALANCE XF204-2BA (All versions < V4.5), SCALANCE XF204-2BA DNA (All versions < V4.5), SCALANCE XP208 (All versions < V4.5), SCALANCE XP208 (Ethernet/IP) (All versions < V4.5), SCALANCE XP208EEC (All versions < V4.5), SCALANCE XP208PoE EEC (All versions < V4.5), SCALANCE XP216 (All versions < V4.5), SCALANCE XP216 (Ethernet/IP) (All versions < V4.5), SCALANCE XP216EEC (All versions < V4.5), SCALANCE XP216POE EEC (All versions < V4.5), SCALANCE XR324WG (24 x FE, AC 230V) (All versions < V4.5), SCALANCE XR324WG (24 X FE, DC 24V) (All versions < V4.5), SCALANCE XR326-2C PoE WG (All versions < V4.5), SCALANCE XR326-2C PoE WG (without UL) (All versions < V4.5), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, AC 230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, DC 24V) (All versions < V4.5), SIPLUS NET SCALANCE XC206-2 (All versions < V4.5), SIPLUS NET SCALANCE XC206-2SFP (All versions < V4.5), SIPLUS NET SCALANCE XC208 (All versions < V4.5), SIPLUS NET SCALANCE XC216-4C (All versions < V4.5). Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. Follow-up of CVE-2022-36323.
    Added Reference Siemens AG https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf [No types assigned]
    Added CWE Siemens AG CWE-74
    Added CVSS V3.1 Siemens AG AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.