First published: Tue Mar 08 2022(Updated: )
A vulnerability has been identified in RUGGEDCOM i800 (All versions < V4.3.8), RUGGEDCOM i801 (All versions < V4.3.8), RUGGEDCOM i802 (All versions < V4.3.8), RUGGEDCOM i803 (All versions < V4.3.8), RUGGEDCOM M2100 (All versions < V4.3.8), RUGGEDCOM M2200 (All versions < V4.3.8), RUGGEDCOM M969 (All versions < V4.3.8), RUGGEDCOM RMC30 (All versions < V4.3.8), RUGGEDCOM RMC8388 V4.X (All versions < V4.3.8), RUGGEDCOM RMC8388 V5.X (All versions < V5.7.0), RUGGEDCOM RP110 (All versions < V4.3.8), RUGGEDCOM RS1600 (All versions < V4.3.8), RUGGEDCOM RS1600F (All versions < V4.3.8), RUGGEDCOM RS1600T (All versions < V4.3.8), RUGGEDCOM RS400 (All versions < V4.3.8), RUGGEDCOM RS401 (All versions < V4.3.8), RUGGEDCOM RS416 (All versions < V4.3.8), RUGGEDCOM RS416P (All versions < V4.3.8), RUGGEDCOM RS416Pv2 (All versions < V5.7.0), RUGGEDCOM RS416v2 (All versions < V5.7.0), RUGGEDCOM RS8000 (All versions < V4.3.8), RUGGEDCOM RS8000A (All versions < V4.3.8), RUGGEDCOM RS8000H (All versions < V4.3.8), RUGGEDCOM RS8000T (All versions < V4.3.8), RUGGEDCOM RS900 (All versions < V4.3.8), RUGGEDCOM RS900 (32M) V4.X (All versions < V4.3.8), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.7.0), RUGGEDCOM RS900G (All versions < V4.3.8), RUGGEDCOM RS900G (32M) V4.X (All versions < V4.3.8), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.7.0), RUGGEDCOM RS900GP (All versions < V4.3.8), RUGGEDCOM RS900L (All versions < V4.3.8), RUGGEDCOM RS900M-GETS-C01 (All versions < V4.3.8), RUGGEDCOM RS900M-GETS-XX (All versions < V4.3.8), RUGGEDCOM RS900M-STND-C01 (All versions < V4.3.8), RUGGEDCOM RS900M-STND-XX (All versions < V4.3.8), RUGGEDCOM RS900W (All versions < V4.3.8), RUGGEDCOM RS910 (All versions < V4.3.8), RUGGEDCOM RS910L (All versions < V4.3.8), RUGGEDCOM RS910W (All versions < V4.3.8), RUGGEDCOM RS920L (All versions < V4.3.8), RUGGEDCOM RS920W (All versions < V4.3.8), RUGGEDCOM RS930L (All versions < V4.3.8), RUGGEDCOM RS930W (All versions < V4.3.8), RUGGEDCOM RS940G (All versions < V4.3.8), RUGGEDCOM RS969 (All versions < V4.3.8), RUGGEDCOM RSG2100 (All versions < V4.3.8), RUGGEDCOM RSG2100 (32M) V4.X (All versions < V4.3.8), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.7.0), RUGGEDCOM RSG2100P (All versions < V4.3.8), RUGGEDCOM RSG2200 (All versions < V4.3.8), RUGGEDCOM RSG2288 V4.X (All versions < V4.3.8), RUGGEDCOM RSG2288 V5.X (All versions < V5.7.0), RUGGEDCOM RSG2300 V4.X (All versions < V4.3.8), RUGGEDCOM RSG2300 V5.X (All versions < V5.7.0), RUGGEDCOM RSG2300P V4.X (All versions < V4.3.8), RUGGEDCOM RSG2300P V5.X (All versions < V5.7.0), RUGGEDCOM RSG2488 V4.X (All versions < V4.3.8), RUGGEDCOM RSG2488 V5.X (All versions < V5.7.0), RUGGEDCOM RSG907R (All versions < V5.7.0), RUGGEDCOM RSG908C (All versions < V5.7.0), RUGGEDCOM RSG909R (All versions < V5.7.0), RUGGEDCOM RSG910C (All versions < V5.7.0), RUGGEDCOM RSG920P V4.X (All versions < V4.3.8), RUGGEDCOM RSG920P V5.X (All versions < V5.7.0), RUGGEDCOM RSL910 (All versions < V5.7.0), RUGGEDCOM RST2228 (All versions < V5.7.0), RUGGEDCOM RST2228P (All versions < V5.7.0), RUGGEDCOM RST916C (All versions < V5.7.0), RUGGEDCOM RST916P (All versions < V5.7.0). The SSH server on affected devices is configured to offer weak ciphers by default. This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data passed over the connection between legitimate clients and the affected device.
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens ROS | ||
Siemens RUGGEDCOM i800 | ||
Siemens RUGGEDCOM i801 | ||
Siemens RUGGEDCOM ROS i802 | ||
Siemens RUGGEDCOM i803NC | ||
siemens RUGGEDCOM M2100F | ||
Siemens RUGGEDCOM M2200 | ||
Siemens RUGGEDCOM ROS M969 | ||
Siemens RUGGEDCOM RMC | ||
Siemens RUGGEDCOM ROS RMC20 | ||
Siemens RUGGEDCOM ROS RMC30 | ||
Siemens RUGGEDCOM RMC40 | ||
Siemens RUGGEDCOM RMC41 | ||
Siemens RUGGEDCOM ROS RMC8388 | ||
Siemens RUGGEDCOM RP110 | ||
Siemens RUGGEDCOM RS400NC | ||
Siemens RUGGEDCOM ROS RS401 | ||
Siemens RUGGEDCOM ROS RS416 | ||
Siemens RUGGEDCOM ROS RS416v2 | ||
Siemens RUGGEDCOM RS8000 | ||
Siemens RUGGEDCOM ROS RS8000A | ||
Siemens RUGGEDCOM ROS RS8000H | ||
Siemens RUGGEDCOM ROS RS8000T | ||
Siemens RUGGEDCOM ROS RS900 | ||
Siemens RUGGEDCOM RS900G (32M) | ||
Siemens RUGGEDCOM ROS RS900GP | ||
Siemens RUGGEDCOM RS900 | ||
Siemens RUGGEDCOM ROS RS900W | ||
Siemens RUGGEDCOM RS910 | ||
Siemens RUGGEDCOM ROS RS910L | ||
Siemens RUGGEDCOM ROS RS910W | ||
Siemens RUGGEDCOM ROS RS920L | ||
Siemens RUGGEDCOM ROS RS920W | ||
Siemens RUGGEDCOM ROS RS930L | ||
Siemens RUGGEDCOM ROS RS930W | ||
Siemens RUGGEDCOM ROS RS940G | ||
Siemens RUGGEDCOM ROS RS969 | ||
Siemens RUGGEDCOM ROS RSG2100 | ||
Siemens RUGGEDCOM ROS RSG2100P | ||
Siemens RUGGEDCOM ROS RSG2200 | ||
Siemens RUGGEDCOM RSG2288 | ||
siemens RUGGEDCOM ROS RSG2300 | ||
Siemens RUGGEDCOM ROS RSG2300P | ||
Siemens RUGGEDCOM ROS RSG2488 | ||
Siemens RUGGEDCOM RSG907R | ||
siemens RUGGEDCOM RSG908C | ||
Siemens RUGGEDCOM RSG909R | ||
Siemens RUGGEDCOM RSG910C | ||
Siemens RUGGEDCOM ROS RSG920P | ||
Siemens RUGGEDCOM RSL910 | ||
Siemens RUGGEDCOM ROS RST2228 | ||
siemens RUGGEDCOM RST2228P | ||
Siemens RUGGEDCOM ROS RST916C | ||
Siemens RUGGEDCOM ROS RST916P |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-37209.
The severity of CVE-2021-37209 is medium.
The RUGGEDCOM i800, RUGGEDCOM i801, RUGGEDCOM i802, RUGGEDCOM i803, RUGGEDCOM M2100, RUGGEDCOM M2200, and RUGGEDCOM M969 are affected by CVE-2021-37209.
To fix CVE-2021-37209, update your RUGGEDCOM devices to version V4.3.8 or newer.
You can find more information about CVE-2021-37209 at the following link: [Siemens ProductCERT](https://cert-portal.siemens.com/productcert/pdf/ssa-764417.pdf).