First published: Tue Jul 09 2024(Updated: )
A vulnerability has been identified in RUGGEDCOM RST2228 (All versions < V5.9.0), RUGGEDCOM RST2228P (All versions < V5.9.0). The web server of the affected systems leaks the MACSEC key in clear text to a logged in user. An attacker with the credentials of a low privileged user could retrieve the MACSEC key and access (decrypt) the ethernet frames sent by authorized recipients.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens RUGGEDCOM ROS RST2228 | <5.9.0 | |
siemens RUGGEDCOM RST2228P | <5.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52238 is considered a high-severity vulnerability due to the potential for sensitive information leakage.
To mitigate CVE-2023-52238, users should upgrade their RUGGEDCOM RST2228 or RST2228P devices to version 5.9.0 or later.
CVE-2023-52238 affects RUGGEDCOM RST2228 and RUGGEDCOM RST2228P models running versions prior to 5.9.0.
CVE-2023-52238 exploits a vulnerability in the web server that allows an attacker to retrieve the MACSEC key in clear text.
Yes, an attacker with low privileged user credentials can exploit CVE-2023-52238 to access sensitive information.