Show plain JSON{"id": "CVE-2024-39675", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "productcert@siemens.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "ADJACENT_NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}], "cvssMetricV40": [{"type": "Secondary", "source": "productcert@siemens.com", "cvssData": {"safety": "NOT_DEFINED", "version": "4.0", "recovery": "NOT_DEFINED", "baseScore": 8.7, "automatable": "NOT_DEFINED", "attackVector": "ADJACENT", "baseSeverity": "HIGH", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "exploitMaturity": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "userInteraction": "NONE", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "NONE", "modifiedAttackVector": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "subsequentSystemIntegrity": "NONE", "vulnerableSystemIntegrity": "HIGH", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "subsequentSystemAvailability": "NONE", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "vulnerableSystemConfidentiality": "HIGH", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED"}}]}, "published": "2024-07-09T12:15:17.180", "references": [{"url": "https://cert-portal.siemens.com/productcert/html/ssa-170375.html", "source": "productcert@siemens.com"}], "vulnStatus": "Awaiting Analysis", "weaknesses": [{"type": "Primary", "source": "productcert@siemens.com", "description": [{"lang": "en", "value": "CWE-497"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability has been identified in RUGGEDCOM RMC30 (All versions < V4.3.10), RUGGEDCOM RMC30NC (All versions < V4.3.10), RUGGEDCOM RP110 (All versions < V4.3.10), RUGGEDCOM RP110NC (All versions < V4.3.10), RUGGEDCOM RS400 (All versions < V4.3.10), RUGGEDCOM RS400NC (All versions < V4.3.10), RUGGEDCOM RS401 (All versions < V4.3.10), RUGGEDCOM RS401NC (All versions < V4.3.10), RUGGEDCOM RS416 (All versions < V4.3.10), RUGGEDCOM RS416NC (All versions < V4.3.10), RUGGEDCOM RS416NCv2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416NCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416P (All versions < V4.3.10), RUGGEDCOM RS416PNC (All versions < V4.3.10), RUGGEDCOM RS416PNCv2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416PNCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416Pv2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416v2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416v2 V5.X (All versions < V5.9.0), RUGGEDCOM RS910 (All versions < V4.3.10), RUGGEDCOM RS910L (All versions), RUGGEDCOM RS910LNC (All versions), RUGGEDCOM RS910NC (All versions < V4.3.10), RUGGEDCOM RS910W (All versions < V4.3.10), RUGGEDCOM RS920L (All versions), RUGGEDCOM RS920LNC (All versions), RUGGEDCOM RS920W (All versions). In some configurations the affected products wrongly enable the Modbus service in non-managed VLANS. Only serial devices are affected by this vulnerability."}, {"lang": "es", "value": "Se ha identificado una vulnerabilidad en RUGGEDCOM RMC30 (Todas las versiones < V4.3.10), RUGGEDCOM RMC30NC (Todas las versiones < V4.3.10), RUGGEDCOM RP110 (Todas las versiones < V4.3.10), RUGGEDCOM RP110NC (Todas las versiones < V4.3.10), RUGGEDCOM RS400 (todas las versiones < V4.3.10), RUGGEDCOM RS400NC (todas las versiones < V4.3.10), RUGGEDCOM RS401 (todas las versiones < V4.3.10), RUGGEDCOM RS401NC (todas las versiones < V4.3.10), RUGGEDCOM RS416 (todas las versiones < V4.3.10), RUGGEDCOM RS416NC (todas las versiones < V4.3.10), RUGGEDCOM RS416NCv2 V4.X (todas las versiones < V4.3.10), RUGGEDCOM RS416NCv2 V5.X (todas las versiones < V5.9.0), RUGGEDCOM RS416P (todas las versiones < V4.3.10), RUGGEDCOM RS416PNC (todas las versiones < V4.3.10), RUGGEDCOM RS416PNCv2 V4.X (todas las versiones < V4.3.10), RUGGEDCOM RS416PNCv2 V5.X (todas las versiones < V5.9.0), RUGGEDCOM RS416Pv2 V4.X ( Todas las versiones < V4.3.10), RUGGEDCOM RS416Pv2 V5.X (Todas las versiones < V5.9.0), RUGGEDCOM RS416v2 V4.X (Todas las versiones < V4.3.10), RUGGEDCOM RS416v2 V5.X (Todas las versiones < V5.9.0), RUGGEDCOM RS910 (todas las versiones < V4.3.10), RUGGEDCOM RS910L (todas las versiones), RUGGEDCOM RS910LNC (todas las versiones), RUGGEDCOM RS910NC (todas las versiones < V4.3.10), RUGGEDCOM RS910W (todas las versiones < V4.3.10), RUGGEDCOM RS920L ( Todas las versiones), RUGGEDCOM RS920LNC (Todas las versiones), RUGGEDCOM RS920W (Todas las versiones). En algunas configuraciones los productos afectados habilitan err\u00f3neamente el servicio Modbus en VLAN no gestionadas. S\u00f3lo los dispositivos serie se ven afectados por esta vulnerabilidad."}], "lastModified": "2024-07-09T18:19:14.047", "sourceIdentifier": "productcert@siemens.com"}