First published: Tue May 14 2024(Updated: )
A vulnerability has been identified in RUGGEDCOM CROSSBOW (All versions < V5.5). The affected systems allow a privileged user to upload firmware files to the root installation directory of the system. By replacing specific files, an attacker could tamper specific files or even achieve remote code execution.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens RUGGEDCOM CROSSBOW | <5.5 | |
Siemens RUGGEDCOM CROSSBOW | <5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-27944 is classified as a high severity vulnerability due to its potential for remote code execution.
To address CVE-2024-27944, upgrade RUGGEDCOM CROSSBOW to version 5.5 or later.
CVE-2024-27944 affects all versions of RUGGEDCOM CROSSBOW prior to version 5.5.
CVE-2024-27944 can be exploited to tamper with files or achieve remote code execution by uploading malicious firmware.
The vendor of the affected software is Siemens, specifically the RUGGEDCOM division.