7.5
CWE
266
Advisory Published
Updated

CVE-2024-38278

First published: Tue Jul 09 2024(Updated: )

A vulnerability has been identified in RUGGEDCOM RMC8388 V5.X (All versions < V5.9.0), RUGGEDCOM RMC8388NC V5.X (All versions < V5.9.0), RUGGEDCOM RS416NCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416PNCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416v2 V5.X (All versions < V5.9.0), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.9.0), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.9.0), RUGGEDCOM RS900GNC(32M) V5.X (All versions < V5.9.0), RUGGEDCOM RS900NC(32M) V5.X (All versions < V5.9.0), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.9.0), RUGGEDCOM RSG2100NC(32M) V5.X (All versions < V5.9.0), RUGGEDCOM RSG2288 V5.X (All versions < V5.9.0), RUGGEDCOM RSG2288NC V5.X (All versions < V5.9.0), RUGGEDCOM RSG2300 V5.X (All versions < V5.9.0), RUGGEDCOM RSG2300NC V5.X (All versions < V5.9.0), RUGGEDCOM RSG2300P V5.X (All versions < V5.9.0), RUGGEDCOM RSG2300PNC V5.X (All versions < V5.9.0), RUGGEDCOM RSG2488 V5.X (All versions < V5.9.0), RUGGEDCOM RSG2488NC V5.X (All versions < V5.9.0), RUGGEDCOM RSG907R (All versions < V5.9.0), RUGGEDCOM RSG908C (All versions < V5.9.0), RUGGEDCOM RSG909R (All versions < V5.9.0), RUGGEDCOM RSG910C (All versions < V5.9.0), RUGGEDCOM RSG920P V5.X (All versions < V5.9.0), RUGGEDCOM RSG920PNC V5.X (All versions < V5.9.0), RUGGEDCOM RSL910 (All versions < V5.9.0), RUGGEDCOM RSL910NC (All versions < V5.9.0), RUGGEDCOM RST2228 (All versions < V5.9.0), RUGGEDCOM RST2228P (All versions < V5.9.0), RUGGEDCOM RST916C (All versions < V5.9.0), RUGGEDCOM RST916P (All versions < V5.9.0). The affected products with IP forwarding enabled wrongly make available certain remote services in non-managed VLANs, even if these services are not intentionally activated. An attacker could leverage this vulnerability to create a remote shell to the affected system.

Credit: productcert@siemens.com

Affected SoftwareAffected VersionHow to fix
RUGGEDCOM RMC8388NC<5.9.0
RUGGEDCOM RMC8388<5.9.0
RUGGEDCOM RS416NC<5.9.0
siemens RUGGEDCOM RS416PNC v2<5.9.0
siemens RUGGEDCOM RS416Pv2<5.9.0
Siemens RUGGEDCOM ROS RS416v2<5.9.0
Siemens RUGGEDCOM RS900 (32m)<5.9.0
siemens RUGGEDCOM RS900G (32M)<5.9.0
Siemens RUGGEDCOM RS900GNC (32m)<5.9.0
Siemens RUGGEDCOM RS900NC<5.9.0
Siemens RUGGEDCOM RSG2100NC(32M)<5.9.0
Siemens RUGGEDCOM RSG2100NC(32M)<5.9.0
Siemens RUGGEDCOM RSG2288<5.9.0
Siemens RUGGEDCOM RSG2288NC<5.9.0
Siemens RUGGEDCOM RSG2300<5.9.0
Siemens RUGGEDCOM RSG2300NC<5.9.0
Siemens RUGGEDCOM RSG2300P<5.9.0
Siemens RUGGEDCOM RSG2300PNC<5.9.0
Siemens RUGGEDCOM RSG2488<5.9.0
siemens RUGGEDCOM RSG2488NC<5.9.0
RUGGEDCOM RSG907R<5.9.0
RUGGEDCOM RSG908C<5.9.0
RUGGEDCOM RSG909R<5.9.0
Siemens RUGGEDCOM RSG910C<5.9.0
Siemens RUGGEDCOM RSG920P<5.9.0
Siemens RUGGEDCOM RSG920PNC<5.9.0
Siemens RUGGEDCOM RSL910<5.9.0
Siemens RUGGEDCOM RSL910NC<5.9.0
Siemens RUGGEDCOM RST2228<5.9.0
siemens RUGGEDCOM RST2228P<5.9.0
RUGGEDCOM RST916C<5.9.0
Siemens RUGGEDCOM RST916P<5.9.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203