First published: Mon Mar 15 2021(Updated: )
A vulnerability has been identified in RUGGEDCOM RM1224 (All versions >= V4.3 and < V6.4), SCALANCE M-800 (All versions >= V4.3 and < V6.4), SCALANCE S615 (All versions >= V4.3 and < V6.4), SCALANCE SC-600 Family (All versions >= V2.0 and < V2.1.3), SCALANCE XB-200 (All versions < V4.1), SCALANCE XC-200 (All versions < V4.1), SCALANCE XF-200BA (All versions < V4.1), SCALANCE XM400 (All versions < V6.2), SCALANCE XP-200 (All versions < V4.1), SCALANCE XR-300WG (All versions < V4.1), SCALANCE XR500 (All versions < V6.2). Affected devices contain a stack-based buffer overflow vulnerability in the handling of STP BPDU frames that could allow a remote attacker to trigger a denial-of-service condition or potentially remote code execution. Successful exploitation requires the passive listening feature of the device to be active.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens RUGGEDCOM RM1224: All versions from v4.3 and prior to v4.6 | ||
Siemens SCALANCE M-800: All versions from v4.3 and prior to v4.6 | ||
Siemens SCALANCE S615: All versions from v4.3 and prior to v4.6 | ||
Siemens SCALANCE X-300WG | <4.1 | 4.1 |
Siemens SCALANCE XB-200 | <4.1 | 4.1 |
Siemens SCALANCE XC-200 | <4.1 | 4.1 |
Siemens SCALANCE XF-200BA | <4.1 | 4.1 |
Siemens SCALANCE XP-200 | <4.1 | 4.1 |
Siemens Ruggedcom RM1224 LTE (4G) NAM | >=4.3<6.4 | |
Siemens Ruggedcom RM1224 LTE(4G) EU | ||
siemens scalance m-800 firmware | >=4.3<6.4 | |
Siemens SCALANCE M-800 | ||
Siemens Scalance S615 EEC Firmware | >=4.3<6.4 | |
Siemens SCALANCE S615 firmware | ||
Siemens Scalance X-300 Firmware | <4.1 | |
Siemens SCALANCE X-300WG Firmware | ||
Siemens SCALANCE XM400 | <6.2 | |
Siemens SCALANCE XM400 firmware | ||
Siemens SCALANCE XR500 | <6.2 | |
Siemens SCALANCE XR500 firmware | ||
Siemens Scalance SC-600 Firmware | <=2.0 | |
Siemens Scalance SC-600 Firmware | >=2.1<2.1.3 | |
siemens scalance sc622-2c | ||
Siemens Scalance SC-600 Firmware | <=2.0 | |
Siemens Scalance SC-600 Firmware | >=2.1<2.1.3 | |
siemens scalance sc632-2c | ||
Siemens Scalance SC-600 Firmware | <=2.0 | |
Siemens Scalance SC-600 Firmware | >=2.1<2.1.3 | |
siemens scalance sc636-2c | ||
Siemens Scalance SC-600 Firmware | <=2.0 | |
Siemens Scalance SC-600 Firmware | >=2.1<2.1.3 | |
siemens scalance sc642-2c | ||
Siemens Scalance SC-600 Firmware | <=2.0 | |
Siemens Scalance SC-600 Firmware | >=2.1<2.1.3 | |
siemens scalance sc646-2c | ||
siemens scalance xb-200 firmware | <4.1 | |
Siemens SCALANCE XB-200 | ||
siemens scalance xc-200 firmware | <4.1 | |
Siemens SCALANCE XC-200 | ||
siemens scalance xf-200ba firmware | <4.1 | |
Siemens SCALANCE XF-200BA | ||
siemens scalance xp-200 firmware | <4.1 | |
Siemens SCALANCE XP-200 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-25667.
The RUGGEDCOM RM1224, SCALANCE M-800, SCALANCE S615, SCALANCE SC-600 Family, SCALANCE XB-200, SCALANCE XC-200, SCALANCE XF-200ba, and SCALANCE XP-200 are affected by this vulnerability.
The severity of CVE-2021-25667 is high, with a CVSS score of 8.8.
The CWE ID for this vulnerability is CWE-119, CWE-121, and CWE-787.
Yes, you can find more information about this vulnerability in the Siemens Product CERT document and the US-CERT advisory.