Home

Description

A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2), SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) (All versions < V3.0.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions < V3.0.0), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions < V3.0.0), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (All versions < V3.0.0), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions < V3.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions < V3.0.0), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) (All versions < V3.0.0), SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions < V3.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (All versions < V3.0.0), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions < V3.0.0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) (All versions < V3.0.0). Affected devices truncates usernames longer than 15 characters when accessed via SSH or Telnet. This could allow an attacker to compromise system integrity.

PUBLISHED Reserved 2024-10-24 | Published 2024-11-12 | Updated 2025-02-11 | Assigner siemens




LOW: 3.1CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
LOW: 2.3CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-20: Improper Input Validation

Product status

Default status
unknown

Any version before V8.2
affected

Default status
unknown

Any version before V8.2
affected

Default status
unknown

Any version before V8.2
affected

Default status
unknown

Any version before V8.2
affected

Default status
unknown

Any version before V8.2
affected

Default status
unknown

Any version before V8.2
affected

Default status
unknown

Any version before V8.2
affected

Default status
unknown

Any version before V8.2
affected

Default status
unknown

Any version before V8.2
affected

Default status
unknown

Any version before V8.2
affected

Default status
unknown

Any version before V8.2
affected

Default status
unknown

Any version before V8.2
affected

Default status
unknown

Any version before V8.2
affected

Default status
unknown

Any version before V8.2
affected

Default status
unknown

Any version before V8.2
affected

Default status
unknown

Any version before V8.2
affected

Default status
unknown

Any version before V8.2
affected

Default status
unknown

Any version before V8.2
affected

Default status
unknown

Any version before V8.2
affected

Default status
unknown

Any version before V8.2
affected

Default status
unknown

Any version before V8.2
affected

Default status
unknown

Any version before V8.2
affected

Default status
unknown

Any version before V8.2
affected

Default status
unknown

Any version before V8.2
affected

Default status
unknown

Any version before V8.2
affected

Default status
unknown

Any version before V8.2
affected

Default status
unknown

Any version before V3.0.0
affected

Default status
unknown

Any version before V3.0.0
affected

Default status
unknown

Any version before V3.0.0
affected

Default status
unknown

Any version before V3.0.0
affected

Default status
unknown

Any version before V3.0.0
affected

Default status
unknown

Any version before V3.0.0
affected

Default status
unknown

Any version before V3.0.0
affected

Default status
unknown

Any version before V3.0.0
affected

Default status
unknown

Any version before V3.0.0
affected

Default status
unknown

Any version before V3.0.0
affected

Default status
unknown

Any version before V3.0.0
affected

Default status
unknown

Any version before V3.0.0
affected

Default status
unknown

Any version before V3.0.0
affected

Default status
unknown

Any version before V3.0.0
affected

Default status
unknown

Any version before V3.0.0
affected

Default status
unknown

Any version before V3.0.0
affected

Default status
unknown

Any version before V3.0.0
affected

Default status
unknown

Any version before V3.0.0
affected

Default status
unknown

Any version before V3.0.0
affected

References

cert-portal.siemens.com/productcert/html/ssa-354112.html

cert-portal.siemens.com/productcert/html/ssa-769027.html

cve.org (CVE-2024-50560)

nvd.nist.gov (CVE-2024-50560)