First published: Mon Mar 15 2021(Updated: )
A vulnerability has been identified in RUGGEDCOM RM1224 (V6.3), SCALANCE M-800 (V6.3), SCALANCE S615 (V6.3), SCALANCE SC-600 (All Versions >= V2.1 and < V2.1.3). Multiple failed SSH authentication attempts could trigger a temporary Denial-of-Service under certain conditions. When triggered, the device will reboot automatically.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Ruggedcom Rm1224 Firmware | =6.3 | |
Siemens RUGGEDCOM RM1224 | ||
Siemens Scalance M-800 Firmware | =6.3 | |
Siemens SCALANCE M-800 | ||
Siemens Scalance S615 Firmware | =6.3 | |
Siemens SCALANCE S615 | ||
Siemens Scalance Sc-600 Firmware | >=2.1<2.1.3 | |
Siemens SCALANCE SC-600 | ||
Siemens RUGGEDCOM RM1224 | =6.3 | |
Siemens SCALANCE M-800 | =6.3 | |
=6.3 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-25676 is a vulnerability identified in RUGGEDCOM RM1224 (V6.3), SCALANCE M-800 (V6.3), SCALANCE S615 (V6.3), SCALANCE SC-600 (All Versions >= V2.1 and < V2.1.3).
The severity of CVE-2021-25676 is high with a severity value of 7.5.
CVE-2021-25676 affects Siemens RUGGEDCOM RM1224 (V6.3) firmware.
CVE-2021-25676 affects Siemens SCALANCE M-800 (V6.3) firmware.
CVE-2021-25676 affects Siemens SCALANCE S615 (V6.3) firmware.