First published: Tue Nov 14 2023(Updated: )
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.0). Affected devices can be configured to send emails when certain events occur on the device. When presented with an invalid response from the SMTP server, the device triggers an error that disrupts email sending. An attacker with access to the network can use this to do disable notification of users when certain events occur.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<=4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
All of | ||
<4.5 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.