CWE
358 295
Advisory Published
Updated

CVE-2021-42017

First published: Tue Mar 08 2022(Updated: )

A vulnerability has been identified in RUGGEDCOM i800 (All versions < V4.3.8), RUGGEDCOM i801 (All versions < V4.3.8), RUGGEDCOM i802 (All versions < V4.3.8), RUGGEDCOM i803 (All versions < V4.3.8), RUGGEDCOM M2100 (All versions < V4.3.8), RUGGEDCOM M2100F (All versions), RUGGEDCOM M2200 (All versions < V4.3.8), RUGGEDCOM M2200F (All versions), RUGGEDCOM M969 (All versions < V4.3.8), RUGGEDCOM M969F (All versions), RUGGEDCOM RMC30 (All versions < V4.3.8), RUGGEDCOM RMC8388 V4.X (All versions < V4.3.8), RUGGEDCOM RMC8388 V5.X (All versions < V5.6.0), RUGGEDCOM RP110 (All versions < V4.3.8), RUGGEDCOM RS1600 (All versions < V4.3.8), RUGGEDCOM RS1600F (All versions < V4.3.8), RUGGEDCOM RS1600T (All versions < V4.3.8), RUGGEDCOM RS400 (All versions < V4.3.8), RUGGEDCOM RS400F (All versions), RUGGEDCOM RS401 (All versions < V4.3.8), RUGGEDCOM RS416 (All versions < V4.3.8), RUGGEDCOM RS416F (All versions), RUGGEDCOM RS416P (All versions < V4.3.8), RUGGEDCOM RS416PF (All versions), RUGGEDCOM RS416Pv2 (All versions < V5.6.0), RUGGEDCOM RS416v2 (All versions < V5.6.0), RUGGEDCOM RS8000 (All versions < V4.3.8), RUGGEDCOM RS8000A (All versions < V4.3.8), RUGGEDCOM RS8000H (All versions < V4.3.8), RUGGEDCOM RS8000T (All versions < V4.3.8), RUGGEDCOM RS900 (All versions < V4.3.8), RUGGEDCOM RS900 (32M) V4.X (All versions < V4.3.8), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.6.0), RUGGEDCOM RS900F (All versions), RUGGEDCOM RS900G (All versions < V4.3.8), RUGGEDCOM RS900G (32M) V4.X (All versions < V4.3.8), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.6.0), RUGGEDCOM RS900GF (All versions), RUGGEDCOM RS900GP (All versions < V4.3.8), RUGGEDCOM RS900GPF (All versions), RUGGEDCOM RS900L (All versions < V4.3.8), RUGGEDCOM RS900M-GETS-C01 (All versions < V4.3.8), RUGGEDCOM RS900M-GETS-XX (All versions < V4.3.8), RUGGEDCOM RS900M-STND-C01 (All versions < V4.3.8), RUGGEDCOM RS900M-STND-XX (All versions < V4.3.8), RUGGEDCOM RS900W (All versions < V4.3.8), RUGGEDCOM RS910 (All versions < V4.3.8), RUGGEDCOM RS910L (All versions < V4.3.8), RUGGEDCOM RS910W (All versions < V4.3.8), RUGGEDCOM RS920L (All versions < V4.3.8), RUGGEDCOM RS920W (All versions < V4.3.8), RUGGEDCOM RS930L (All versions < V4.3.8), RUGGEDCOM RS930W (All versions < V4.3.8), RUGGEDCOM RS940G (All versions < V4.3.8), RUGGEDCOM RS940GF (All versions), RUGGEDCOM RS969 (All versions < V4.3.8), RUGGEDCOM RSG2100 (All versions < V4.3.8), RUGGEDCOM RSG2100 (32M) V4.X (All versions < V4.3.8), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.6.0), RUGGEDCOM RSG2100F (All versions), RUGGEDCOM RSG2100P (All versions < V4.3.8), RUGGEDCOM RSG2100PF (All versions), RUGGEDCOM RSG2200 (All versions < V4.3.8), RUGGEDCOM RSG2200F (All versions), RUGGEDCOM RSG2288 V4.X (All versions < V4.3.8), RUGGEDCOM RSG2288 V5.X (All versions < V5.6.0), RUGGEDCOM RSG2300 V4.X (All versions < V4.3.8), RUGGEDCOM RSG2300 V5.X (All versions < V5.6.0), RUGGEDCOM RSG2300F (All versions), RUGGEDCOM RSG2300P V4.X (All versions < V4.3.8), RUGGEDCOM RSG2300P V5.X (All versions < V5.6.0), RUGGEDCOM RSG2300PF (All versions), RUGGEDCOM RSG2488 V4.X (All versions < V4.3.8), RUGGEDCOM RSG2488 V5.X (All versions < V5.6.0), RUGGEDCOM RSG2488F (All versions), RUGGEDCOM RSG907R (All versions < V5.6.0), RUGGEDCOM RSG908C (All versions < V5.6.0), RUGGEDCOM RSG909R (All versions < V5.6.0), RUGGEDCOM RSG910C (All versions < V5.6.0), RUGGEDCOM RSG920P V4.X (All versions < V4.3.8), RUGGEDCOM RSG920P V5.X (All versions < V5.6.0), RUGGEDCOM RSL910 (All versions < V5.6.0), RUGGEDCOM RST2228 (All versions < V5.6.0), RUGGEDCOM RST2228P (All versions < V5.6.0), RUGGEDCOM RST916C (All versions < V5.6.0), RUGGEDCOM RST916P (All versions < V5.6.0). A new variant of the POODLE attack has left a third-party component vulnerable due to the implementation flaws of the CBC encryption mode in TLS 1.0 to 1.2. If an attacker were to exploit this, they could act as a man-in-the-middle and eavesdrop on encrypted communications.

Credit: productcert@siemens.com productcert@siemens.com

Affected SoftwareAffected VersionHow to fix
Siemens Ruggedcom Ros
Siemens Ruggedcom I800
Siemens Ruggedcom I801
Siemens Ruggedcom I802
Siemens Ruggedcom I803
Siemens Ruggedcom M2100
Siemens Ruggedcom M2200
Siemens Ruggedcom M969
Siemens Ruggedcom Rmc
Siemens Ruggedcom Rmc20
Siemens Ruggedcom Rmc30
Siemens Ruggedcom Rmc40
Siemens Ruggedcom Rmc41
Siemens Ruggedcom Rp110
Siemens Ruggedcom Rs400
Siemens Ruggedcom Rs401
Siemens Ruggedcom Rs416
Siemens Ruggedcom Rs8000
Siemens Ruggedcom Rs8000a
Siemens Ruggedcom Rs8000h
Siemens Ruggedcom Rs8000t
Siemens Ruggedcom Rs900gp
Siemens Ruggedcom Rs900l
Siemens Ruggedcom Rs900w
Siemens Ruggedcom Rs910
Siemens Ruggedcom Rs910l
Siemens Ruggedcom Rs910w
Siemens Ruggedcom Rs920l
Siemens Ruggedcom Rs920w
Siemens Ruggedcom Rs930l
Siemens Ruggedcom Rs930w
Siemens Ruggedcom Rs940g
Siemens Ruggedcom Rs969
Siemens Ruggedcom Rsg2100p
Siemens Ruggedcom Rsg2200
Siemens Ruggedcom Ros<5.6.0
Siemens Ruggedcom Rmc8388
Siemens Ruggedcom Rs416v2
Siemens Ruggedcom Rs900
Siemens Ruggedcom Rs900g
Siemens Ruggedcom Rsg2100
Siemens Ruggedcom Rsg2288
Siemens Ruggedcom Rsg2300
Siemens Ruggedcom Rsg2300p
Siemens Ruggedcom Rsg2488
Siemens Ruggedcom Rsg907r
Siemens Ruggedcom Rsg908c
Siemens Ruggedcom Rsg909r
Siemens Ruggedcom Rsg910c
Siemens Ruggedcom Rsg920p
Siemens Ruggedcom Rsl910
Siemens Ruggedcom Rst2228
Siemens Ruggedcom Rst2228p
Siemens Ruggedcom Rst916c
Siemens Ruggedcom Rst916p
All of
Siemens Ruggedcom Ros
Any of
Siemens Ruggedcom I800
Siemens Ruggedcom I801
Siemens Ruggedcom I802
Siemens Ruggedcom I803
Siemens Ruggedcom M2100
Siemens Ruggedcom M2200
Siemens Ruggedcom M969
Siemens Ruggedcom Rmc
Siemens Ruggedcom Rmc20
Siemens Ruggedcom Rmc30
Siemens Ruggedcom Rmc40
Siemens Ruggedcom Rmc41
Siemens Ruggedcom Rp110
Siemens Ruggedcom Rs400
Siemens Ruggedcom Rs401
Siemens Ruggedcom Rs416
Siemens Ruggedcom Rs8000
Siemens Ruggedcom Rs8000a
Siemens Ruggedcom Rs8000h
Siemens Ruggedcom Rs8000t
Siemens Ruggedcom Rs900gp
Siemens Ruggedcom Rs900l
Siemens Ruggedcom Rs900w
Siemens Ruggedcom Rs910
Siemens Ruggedcom Rs910l
Siemens Ruggedcom Rs910w
Siemens Ruggedcom Rs920l
Siemens Ruggedcom Rs920w
Siemens Ruggedcom Rs930l
Siemens Ruggedcom Rs930w
Siemens Ruggedcom Rs940g
Siemens Ruggedcom Rs969
Siemens Ruggedcom Rsg2100p
Siemens Ruggedcom Rsg2200
All of
Siemens Ruggedcom Ros<5.6.0
Any of
Siemens Ruggedcom Rmc8388
Siemens Ruggedcom Rs416v2
Siemens Ruggedcom Rs900
Siemens Ruggedcom Rs900g
Siemens Ruggedcom Rsg2100
Siemens Ruggedcom Rsg2288
Siemens Ruggedcom Rsg2300
Siemens Ruggedcom Rsg2300p
Siemens Ruggedcom Rsg2488
Siemens Ruggedcom Rsg907r
Siemens Ruggedcom Rsg908c
Siemens Ruggedcom Rsg909r
Siemens Ruggedcom Rsg910c
Siemens Ruggedcom Rsg920p
Siemens Ruggedcom Rsl910
Siemens Ruggedcom Rst2228
Siemens Ruggedcom Rst2228p
Siemens Ruggedcom Rst916c
Siemens Ruggedcom Rst916p

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID for this RUGGEDCOM i800 vulnerability?

    The vulnerability ID for this RUGGEDCOM i800 vulnerability is CVE-2021-42017.

  • What is the severity of CVE-2021-42017?

    The severity of CVE-2021-42017 is medium with a severity value of 5.9.

  • Which products are affected by CVE-2021-42017?

    The affected products include RUGGEDCOM i800 (All versions < V4.3.8), RUGGEDCOM i801 (All versions < V4.3.8), RUGGEDCOM i802 (All versions < V4.3.8), RUGGEDCOM i803 (All versions < V4.3.8), RUGGEDCOM M2100 (All versions < V4.3.8), RUGGEDCOM M2100F (All versions), RUGGEDCOM M2200 (All versions).

  • What is the Common Vulnerabilities and Exposures (CVE) ID for this vulnerability?

    The Common Vulnerabilities and Exposures (CVE) ID for this vulnerability is CVE-2021-42017.

  • Where can I find more information about CVE-2021-42017?

    You can find more information about CVE-2021-42017 in the following reference: [link](https://cert-portal.siemens.com/productcert/pdf/ssa-256353.pdf).

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203