CWE
358 295
Advisory Published
Updated

CVE-2021-42017

First published: Tue Mar 08 2022(Updated: )

A vulnerability has been identified in RUGGEDCOM i800 (All versions < V4.3.8), RUGGEDCOM i801 (All versions < V4.3.8), RUGGEDCOM i802 (All versions < V4.3.8), RUGGEDCOM i803 (All versions < V4.3.8), RUGGEDCOM M2100 (All versions < V4.3.8), RUGGEDCOM M2100F (All versions), RUGGEDCOM M2200 (All versions < V4.3.8), RUGGEDCOM M2200F (All versions), RUGGEDCOM M969 (All versions < V4.3.8), RUGGEDCOM M969F (All versions), RUGGEDCOM RMC30 (All versions < V4.3.8), RUGGEDCOM RMC8388 V4.X (All versions < V4.3.8), RUGGEDCOM RMC8388 V5.X (All versions < V5.6.0), RUGGEDCOM RP110 (All versions < V4.3.8), RUGGEDCOM RS1600 (All versions < V4.3.8), RUGGEDCOM RS1600F (All versions < V4.3.8), RUGGEDCOM RS1600T (All versions < V4.3.8), RUGGEDCOM RS400 (All versions < V4.3.8), RUGGEDCOM RS400F (All versions), RUGGEDCOM RS401 (All versions < V4.3.8), RUGGEDCOM RS416 (All versions < V4.3.8), RUGGEDCOM RS416F (All versions), RUGGEDCOM RS416P (All versions < V4.3.8), RUGGEDCOM RS416PF (All versions), RUGGEDCOM RS416Pv2 (All versions < V5.6.0), RUGGEDCOM RS416v2 (All versions < V5.6.0), RUGGEDCOM RS8000 (All versions < V4.3.8), RUGGEDCOM RS8000A (All versions < V4.3.8), RUGGEDCOM RS8000H (All versions < V4.3.8), RUGGEDCOM RS8000T (All versions < V4.3.8), RUGGEDCOM RS900 (All versions < V4.3.8), RUGGEDCOM RS900 (32M) V4.X (All versions < V4.3.8), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.6.0), RUGGEDCOM RS900F (All versions), RUGGEDCOM RS900G (All versions < V4.3.8), RUGGEDCOM RS900G (32M) V4.X (All versions < V4.3.8), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.6.0), RUGGEDCOM RS900GF (All versions), RUGGEDCOM RS900GP (All versions < V4.3.8), RUGGEDCOM RS900GPF (All versions), RUGGEDCOM RS900L (All versions < V4.3.8), RUGGEDCOM RS900M-GETS-C01 (All versions < V4.3.8), RUGGEDCOM RS900M-GETS-XX (All versions < V4.3.8), RUGGEDCOM RS900M-STND-C01 (All versions < V4.3.8), RUGGEDCOM RS900M-STND-XX (All versions < V4.3.8), RUGGEDCOM RS900W (All versions < V4.3.8), RUGGEDCOM RS910 (All versions < V4.3.8), RUGGEDCOM RS910L (All versions < V4.3.8), RUGGEDCOM RS910W (All versions < V4.3.8), RUGGEDCOM RS920L (All versions < V4.3.8), RUGGEDCOM RS920W (All versions < V4.3.8), RUGGEDCOM RS930L (All versions < V4.3.8), RUGGEDCOM RS930W (All versions < V4.3.8), RUGGEDCOM RS940G (All versions < V4.3.8), RUGGEDCOM RS940GF (All versions), RUGGEDCOM RS969 (All versions < V4.3.8), RUGGEDCOM RSG2100 (All versions < V4.3.8), RUGGEDCOM RSG2100 (32M) V4.X (All versions < V4.3.8), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.6.0), RUGGEDCOM RSG2100F (All versions), RUGGEDCOM RSG2100P (All versions < V4.3.8), RUGGEDCOM RSG2100PF (All versions), RUGGEDCOM RSG2200 (All versions < V4.3.8), RUGGEDCOM RSG2200F (All versions), RUGGEDCOM RSG2288 V4.X (All versions < V4.3.8), RUGGEDCOM RSG2288 V5.X (All versions < V5.6.0), RUGGEDCOM RSG2300 V4.X (All versions < V4.3.8), RUGGEDCOM RSG2300 V5.X (All versions < V5.6.0), RUGGEDCOM RSG2300F (All versions), RUGGEDCOM RSG2300P V4.X (All versions < V4.3.8), RUGGEDCOM RSG2300P V5.X (All versions < V5.6.0), RUGGEDCOM RSG2300PF (All versions), RUGGEDCOM RSG2488 V4.X (All versions < V4.3.8), RUGGEDCOM RSG2488 V5.X (All versions < V5.6.0), RUGGEDCOM RSG2488F (All versions), RUGGEDCOM RSG907R (All versions < V5.6.0), RUGGEDCOM RSG908C (All versions < V5.6.0), RUGGEDCOM RSG909R (All versions < V5.6.0), RUGGEDCOM RSG910C (All versions < V5.6.0), RUGGEDCOM RSG920P V4.X (All versions < V4.3.8), RUGGEDCOM RSG920P V5.X (All versions < V5.6.0), RUGGEDCOM RSL910 (All versions < V5.6.0), RUGGEDCOM RST2228 (All versions < V5.6.0), RUGGEDCOM RST2228P (All versions < V5.6.0), RUGGEDCOM RST916C (All versions < V5.6.0), RUGGEDCOM RST916P (All versions < V5.6.0). A new variant of the POODLE attack has left a third-party component vulnerable due to the implementation flaws of the CBC encryption mode in TLS 1.0 to 1.2. If an attacker were to exploit this, they could act as a man-in-the-middle and eavesdrop on encrypted communications.

Credit: productcert@siemens.com

Affected SoftwareAffected VersionHow to fix
Siemens ROS
RUGGEDCOM i800
RUGGEDCOM RUGGEDCOM i801
Siemens RUGGEDCOM ROS i802
RUGGEDCOM RUGGEDCOM i803NC
RUGGEDCOM RUGGEDCOM M2100
RUGGEDCOM RUGGEDCOM M2200
Siemens RUGGEDCOM ROS M969
Siemens RUGGEDCOM RMC
Siemens RUGGEDCOM ROS RMC20
RUGGEDCOM RMC30NC
Siemens RUGGEDCOM ROS RMC40
Siemens RUGGEDCOM RMC41
RUGGEDCOM RP110
RUGGEDCOM RUGGEDCOM RS400
RUGGEDCOM RUGGEDCOM RS401
RUGGEDCOM RUGGEDCOM RS416
RUGGEDCOM RUGGEDCOM RS8000T
Siemens RUGGEDCOM ROS RS8000A
Siemens RUGGEDCOM ROS RS8000H
Siemens RUGGEDCOM ROS RS8000T
Siemens RUGGEDCOM ROS RS900GP
RUGGEDCOM RUGGEDCOM RS900L
RUGGEDCOM RUGGEDCOM RS900W
RUGGEDCOM RUGGEDCOM RS910
RUGGEDCOM RUGGEDCOM RS910L
RUGGEDCOM RUGGEDCOM RS910W
RUGGEDCOM RUGGEDCOM RS920L
RUGGEDCOM RUGGEDCOM RS920W
Siemens RUGGEDCOM ROS RS930L
Siemens RUGGEDCOM ROS RS930W
RUGGEDCOM RUGGEDCOM RS940G
Siemens RUGGEDCOM ROS RS969
Siemens RUGGEDCOM ROS RSG2100P
RUGGEDCOM RSG2200
Siemens ROS<5.6.0
Siemens RUGGEDCOM RMC Series
Siemens RUGGEDCOM ROS RS416v2
RUGGEDCOM RUGGEDCOM RS900
RUGGEDCOM RUGGEDCOM RS900G
RUGGEDCOM RSG2100
RUGGEDCOM RSG2288
Siemens RUGGEDCOM ROS RSG2300
RUGGEDCOM RSG2300P
RUGGEDCOM RSG2488
RUGGEDCOM RSG907R
RUGGEDCOM RUGGEDCOM RSG908C
RUGGEDCOM RSG909R
RUGGEDCOM RSG910C
RUGGEDCOM RSG920P
RUGGEDCOM RSL910
RUGGEDCOM RST2228
Siemens RUGGEDCOM RST2228
Siemens RUGGEDCOM ROS RST916C
RUGGEDCOM RST916P
All of
Siemens ROS
Any of
RUGGEDCOM i800
RUGGEDCOM RUGGEDCOM i801
Siemens RUGGEDCOM ROS i802
RUGGEDCOM RUGGEDCOM i803NC
RUGGEDCOM RUGGEDCOM M2100
RUGGEDCOM RUGGEDCOM M2200
Siemens RUGGEDCOM ROS M969
Siemens RUGGEDCOM RMC
Siemens RUGGEDCOM ROS RMC20
RUGGEDCOM RMC30NC
Siemens RUGGEDCOM ROS RMC40
Siemens RUGGEDCOM RMC41
RUGGEDCOM RP110
RUGGEDCOM RUGGEDCOM RS400
RUGGEDCOM RUGGEDCOM RS401
RUGGEDCOM RUGGEDCOM RS416
RUGGEDCOM RUGGEDCOM RS8000T
Siemens RUGGEDCOM ROS RS8000A
Siemens RUGGEDCOM ROS RS8000H
Siemens RUGGEDCOM ROS RS8000T
Siemens RUGGEDCOM ROS RS900GP
RUGGEDCOM RUGGEDCOM RS900L
RUGGEDCOM RUGGEDCOM RS900W
RUGGEDCOM RUGGEDCOM RS910
RUGGEDCOM RUGGEDCOM RS910L
RUGGEDCOM RUGGEDCOM RS910W
RUGGEDCOM RUGGEDCOM RS920L
RUGGEDCOM RUGGEDCOM RS920W
Siemens RUGGEDCOM ROS RS930L
Siemens RUGGEDCOM ROS RS930W
RUGGEDCOM RUGGEDCOM RS940G
Siemens RUGGEDCOM ROS RS969
Siemens RUGGEDCOM ROS RSG2100P
RUGGEDCOM RSG2200
All of
Siemens ROS<5.6.0
Any of
Siemens RUGGEDCOM RMC Series
Siemens RUGGEDCOM ROS RS416v2
RUGGEDCOM RUGGEDCOM RS900
RUGGEDCOM RUGGEDCOM RS900G
RUGGEDCOM RSG2100
RUGGEDCOM RSG2288
Siemens RUGGEDCOM ROS RSG2300
RUGGEDCOM RSG2300P
RUGGEDCOM RSG2488
RUGGEDCOM RSG907R
RUGGEDCOM RUGGEDCOM RSG908C
RUGGEDCOM RSG909R
RUGGEDCOM RSG910C
RUGGEDCOM RSG920P
RUGGEDCOM RSL910
RUGGEDCOM RST2228
Siemens RUGGEDCOM RST2228
Siemens RUGGEDCOM ROS RST916C
RUGGEDCOM RST916P

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID for this RUGGEDCOM i800 vulnerability?

    The vulnerability ID for this RUGGEDCOM i800 vulnerability is CVE-2021-42017.

  • What is the severity of CVE-2021-42017?

    The severity of CVE-2021-42017 is medium with a severity value of 5.9.

  • Which products are affected by CVE-2021-42017?

    The affected products include RUGGEDCOM i800 (All versions < V4.3.8), RUGGEDCOM i801 (All versions < V4.3.8), RUGGEDCOM i802 (All versions < V4.3.8), RUGGEDCOM i803 (All versions < V4.3.8), RUGGEDCOM M2100 (All versions < V4.3.8), RUGGEDCOM M2100F (All versions), RUGGEDCOM M2200 (All versions).

  • What is the Common Vulnerabilities and Exposures (CVE) ID for this vulnerability?

    The Common Vulnerabilities and Exposures (CVE) ID for this vulnerability is CVE-2021-42017.

  • Where can I find more information about CVE-2021-42017?

    You can find more information about CVE-2021-42017 in the following reference: [link](https://cert-portal.siemens.com/productcert/pdf/ssa-256353.pdf).

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203