CWE
326 311
Advisory Published
Updated

CVE-2021-37209: Weak Encryption

First published: Tue Mar 08 2022(Updated: )

A vulnerability has been identified in RUGGEDCOM i800 (All versions < V4.3.8), RUGGEDCOM i801 (All versions < V4.3.8), RUGGEDCOM i802 (All versions < V4.3.8), RUGGEDCOM i803 (All versions < V4.3.8), RUGGEDCOM M2100 (All versions < V4.3.8), RUGGEDCOM M2200 (All versions < V4.3.8), RUGGEDCOM M969 (All versions < V4.3.8), RUGGEDCOM RMC30 (All versions < V4.3.8), RUGGEDCOM RMC8388 V4.X (All versions < V4.3.8), RUGGEDCOM RMC8388 V5.X (All versions < V5.7.0), RUGGEDCOM RP110 (All versions < V4.3.8), RUGGEDCOM RS1600 (All versions < V4.3.8), RUGGEDCOM RS1600F (All versions < V4.3.8), RUGGEDCOM RS1600T (All versions < V4.3.8), RUGGEDCOM RS400 (All versions < V4.3.8), RUGGEDCOM RS401 (All versions < V4.3.8), RUGGEDCOM RS416 (All versions < V4.3.8), RUGGEDCOM RS416P (All versions < V4.3.8), RUGGEDCOM RS416Pv2 (All versions < V5.7.0), RUGGEDCOM RS416v2 (All versions < V5.7.0), RUGGEDCOM RS8000 (All versions < V4.3.8), RUGGEDCOM RS8000A (All versions < V4.3.8), RUGGEDCOM RS8000H (All versions < V4.3.8), RUGGEDCOM RS8000T (All versions < V4.3.8), RUGGEDCOM RS900 (All versions < V4.3.8), RUGGEDCOM RS900 (32M) V4.X (All versions < V4.3.8), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.7.0), RUGGEDCOM RS900G (All versions < V4.3.8), RUGGEDCOM RS900G (32M) V4.X (All versions < V4.3.8), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.7.0), RUGGEDCOM RS900GP (All versions < V4.3.8), RUGGEDCOM RS900L (All versions < V4.3.8), RUGGEDCOM RS900M-GETS-C01 (All versions < V4.3.8), RUGGEDCOM RS900M-GETS-XX (All versions < V4.3.8), RUGGEDCOM RS900M-STND-C01 (All versions < V4.3.8), RUGGEDCOM RS900M-STND-XX (All versions < V4.3.8), RUGGEDCOM RS900W (All versions < V4.3.8), RUGGEDCOM RS910 (All versions < V4.3.8), RUGGEDCOM RS910L (All versions < V4.3.8), RUGGEDCOM RS910W (All versions < V4.3.8), RUGGEDCOM RS920L (All versions < V4.3.8), RUGGEDCOM RS920W (All versions < V4.3.8), RUGGEDCOM RS930L (All versions < V4.3.8), RUGGEDCOM RS930W (All versions < V4.3.8), RUGGEDCOM RS940G (All versions < V4.3.8), RUGGEDCOM RS969 (All versions < V4.3.8), RUGGEDCOM RSG2100 (All versions < V4.3.8), RUGGEDCOM RSG2100 (32M) V4.X (All versions < V4.3.8), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.7.0), RUGGEDCOM RSG2100P (All versions < V4.3.8), RUGGEDCOM RSG2200 (All versions < V4.3.8), RUGGEDCOM RSG2288 V4.X (All versions < V4.3.8), RUGGEDCOM RSG2288 V5.X (All versions < V5.7.0), RUGGEDCOM RSG2300 V4.X (All versions < V4.3.8), RUGGEDCOM RSG2300 V5.X (All versions < V5.7.0), RUGGEDCOM RSG2300P V4.X (All versions < V4.3.8), RUGGEDCOM RSG2300P V5.X (All versions < V5.7.0), RUGGEDCOM RSG2488 V4.X (All versions < V4.3.8), RUGGEDCOM RSG2488 V5.X (All versions < V5.7.0), RUGGEDCOM RSG907R (All versions < V5.7.0), RUGGEDCOM RSG908C (All versions < V5.7.0), RUGGEDCOM RSG909R (All versions < V5.7.0), RUGGEDCOM RSG910C (All versions < V5.7.0), RUGGEDCOM RSG920P V4.X (All versions < V4.3.8), RUGGEDCOM RSG920P V5.X (All versions < V5.7.0), RUGGEDCOM RSL910 (All versions < V5.7.0), RUGGEDCOM RST2228 (All versions < V5.7.0), RUGGEDCOM RST2228P (All versions < V5.7.0), RUGGEDCOM RST916C (All versions < V5.7.0), RUGGEDCOM RST916P (All versions < V5.7.0). The SSH server on affected devices is configured to offer weak ciphers by default. This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data passed over the connection between legitimate clients and the affected device.

Credit: productcert@siemens.com

Affected SoftwareAffected VersionHow to fix
Siemens ROS
RUGGEDCOM i800
RUGGEDCOM RUGGEDCOM i801
Siemens RUGGEDCOM ROS i802
RUGGEDCOM RUGGEDCOM i803NC
RUGGEDCOM RUGGEDCOM M2100
RUGGEDCOM RUGGEDCOM M2200
Siemens RUGGEDCOM ROS M969
Siemens RUGGEDCOM RMC
Siemens RUGGEDCOM ROS RMC20
RUGGEDCOM RMC30NC
Siemens RUGGEDCOM ROS RMC40
Siemens RUGGEDCOM RMC41
Siemens RUGGEDCOM RMC Series
RUGGEDCOM RP110
RUGGEDCOM RUGGEDCOM RS400
RUGGEDCOM RUGGEDCOM RS401
RUGGEDCOM RUGGEDCOM RS416
Siemens RUGGEDCOM ROS RS416v2
RUGGEDCOM RUGGEDCOM RS8000T
Siemens RUGGEDCOM ROS RS8000A
Siemens RUGGEDCOM ROS RS8000H
Siemens RUGGEDCOM ROS RS8000T
RUGGEDCOM RUGGEDCOM RS900
RUGGEDCOM RUGGEDCOM RS900G
Siemens RUGGEDCOM ROS RS900GP
RUGGEDCOM RUGGEDCOM RS900L
RUGGEDCOM RUGGEDCOM RS900W
RUGGEDCOM RUGGEDCOM RS910
RUGGEDCOM RUGGEDCOM RS910L
RUGGEDCOM RUGGEDCOM RS910W
RUGGEDCOM RUGGEDCOM RS920L
RUGGEDCOM RUGGEDCOM RS920W
Siemens RUGGEDCOM ROS RS930L
Siemens RUGGEDCOM ROS RS930W
RUGGEDCOM RUGGEDCOM RS940G
Siemens RUGGEDCOM ROS RS969
RUGGEDCOM RSG2100
Siemens RUGGEDCOM ROS RSG2100P
RUGGEDCOM RSG2200
RUGGEDCOM RSG2288
Siemens RUGGEDCOM ROS RSG2300
RUGGEDCOM RSG2300P
RUGGEDCOM RSG2488
RUGGEDCOM RSG907R
RUGGEDCOM RUGGEDCOM RSG908C
RUGGEDCOM RSG909R
RUGGEDCOM RSG910C
RUGGEDCOM RSG920P
RUGGEDCOM RSL910
RUGGEDCOM RST2228
Siemens RUGGEDCOM RST2228
Siemens RUGGEDCOM ROS RST916C
RUGGEDCOM RST916P

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID?

    The vulnerability ID is CVE-2021-37209.

  • What is the severity of CVE-2021-37209?

    The severity of CVE-2021-37209 is medium.

  • Which software is affected by CVE-2021-37209?

    The RUGGEDCOM i800, RUGGEDCOM i801, RUGGEDCOM i802, RUGGEDCOM i803, RUGGEDCOM M2100, RUGGEDCOM M2200, and RUGGEDCOM M969 are affected by CVE-2021-37209.

  • How do I fix CVE-2021-37209?

    To fix CVE-2021-37209, update your RUGGEDCOM devices to version V4.3.8 or newer.

  • Where can I find more information about CVE-2021-37209?

    You can find more information about CVE-2021-37209 at the following link: [Siemens ProductCERT](https://cert-portal.siemens.com/productcert/pdf/ssa-764417.pdf).

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203