We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-49691



Description

A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.0). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the handling of the DDNS configuration. This could allow malicious local administrators to issue commands on system level after a successful IP address update.

Reserved 2023-11-29 | Published 2023-12-12 | Updated 2024-08-13 | Assigner siemens


HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C

Problem types

CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Default status
unknown

Any version before V8.0
affected

Default status
unknown

Any version before V8.0
affected

Default status
unknown

Any version before V8.0
affected

Default status
unknown

Any version before V8.0
affected

Default status
unknown

Any version before V8.0
affected

Default status
unknown

Any version before V8.0
affected

Default status
unknown

Any version before V8.0
affected

Default status
unknown

Any version before V8.0
affected

Default status
unknown

Any version before V8.0
affected

Default status
unknown

Any version before V8.0
affected

Default status
unknown

Any version before V8.0
affected

Default status
unknown

Any version before V8.0
affected

Default status
unknown

Any version before V8.0
affected

Default status
unknown

Any version before V8.0
affected

Default status
unknown

Any version before V8.0
affected

Default status
unknown

Any version before V8.0
affected

Default status
unknown

Any version before V8.0
affected

Default status
unknown

Any version before V8.0
affected

Default status
unknown

Any version before V8.0
affected

Default status
unknown

Any version before V8.0
affected

References

cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf

cert-portal.siemens.com/productcert/html/ssa-180704.html

cert-portal.siemens.com/productcert/html/ssa-602936.html

cert-portal.siemens.com/productcert/html/ssa-690517.html

cve.org (CVE-2023-49691)

nvd.nist.gov (CVE-2023-49691)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2023-49691

Support options

Helpdesk Chat, Email, Knowledgebase