First published: Tue Jul 09 2024(Updated: )
A vulnerability has been identified in RUGGEDCOM RMC8388 V5.X (All versions < V5.9.0), RUGGEDCOM RMC8388NC V5.X (All versions < V5.9.0), RUGGEDCOM RS416NCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416PNCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416v2 V5.X (All versions < V5.9.0), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.9.0), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.9.0), RUGGEDCOM RS900GNC(32M) V5.X (All versions < V5.9.0), RUGGEDCOM RS900NC(32M) V5.X (All versions < V5.9.0), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.9.0), RUGGEDCOM RSG2100NC(32M) V5.X (All versions < V5.9.0), RUGGEDCOM RSG2288 V5.X (All versions < V5.9.0), RUGGEDCOM RSG2288NC V5.X (All versions < V5.9.0), RUGGEDCOM RSG2300 V5.X (All versions < V5.9.0), RUGGEDCOM RSG2300NC V5.X (All versions < V5.9.0), RUGGEDCOM RSG2300P V5.X (All versions < V5.9.0), RUGGEDCOM RSG2300PNC V5.X (All versions < V5.9.0), RUGGEDCOM RSG2488 V5.X (All versions < V5.9.0), RUGGEDCOM RSG2488NC V5.X (All versions < V5.9.0), RUGGEDCOM RSG907R (All versions < V5.9.0), RUGGEDCOM RSG908C (All versions < V5.9.0), RUGGEDCOM RSG909R (All versions < V5.9.0), RUGGEDCOM RSG910C (All versions < V5.9.0), RUGGEDCOM RSG920P V5.X (All versions < V5.9.0), RUGGEDCOM RSG920PNC V5.X (All versions < V5.9.0), RUGGEDCOM RSL910 (All versions < V5.9.0), RUGGEDCOM RSL910NC (All versions < V5.9.0), RUGGEDCOM RST2228 (All versions < V5.9.0), RUGGEDCOM RST2228P (All versions < V5.9.0), RUGGEDCOM RST916C (All versions < V5.9.0), RUGGEDCOM RST916P (All versions < V5.9.0). The affected products with IP forwarding enabled wrongly make available certain remote services in non-managed VLANs, even if these services are not intentionally activated. An attacker could leverage this vulnerability to create a remote shell to the affected system.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
RUGGEDCOM RMC8388NC | <5.9.0 | |
RUGGEDCOM RMC8388 | <5.9.0 | |
RUGGEDCOM RS416NC | <5.9.0 | |
siemens RUGGEDCOM RS416PNC v2 | <5.9.0 | |
siemens RUGGEDCOM RS416Pv2 | <5.9.0 | |
Siemens RUGGEDCOM ROS RS416v2 | <5.9.0 | |
Siemens RUGGEDCOM RS900 (32m) | <5.9.0 | |
siemens RUGGEDCOM RS900G (32M) | <5.9.0 | |
Siemens RUGGEDCOM RS900GNC (32m) | <5.9.0 | |
Siemens RUGGEDCOM RS900NC | <5.9.0 | |
Siemens RUGGEDCOM RSG2100NC(32M) | <5.9.0 | |
Siemens RUGGEDCOM RSG2100NC(32M) | <5.9.0 | |
Siemens RUGGEDCOM RSG2288 | <5.9.0 | |
Siemens RUGGEDCOM RSG2288NC | <5.9.0 | |
Siemens RUGGEDCOM RSG2300 | <5.9.0 | |
Siemens RUGGEDCOM RSG2300NC | <5.9.0 | |
Siemens RUGGEDCOM RSG2300P | <5.9.0 | |
Siemens RUGGEDCOM RSG2300PNC | <5.9.0 | |
Siemens RUGGEDCOM RSG2488 | <5.9.0 | |
siemens RUGGEDCOM RSG2488NC | <5.9.0 | |
RUGGEDCOM RSG907R | <5.9.0 | |
RUGGEDCOM RSG908C | <5.9.0 | |
RUGGEDCOM RSG909R | <5.9.0 | |
Siemens RUGGEDCOM RSG910C | <5.9.0 | |
Siemens RUGGEDCOM RSG920P | <5.9.0 | |
Siemens RUGGEDCOM RSG920PNC | <5.9.0 | |
Siemens RUGGEDCOM RSL910 | <5.9.0 | |
Siemens RUGGEDCOM RSL910NC | <5.9.0 | |
Siemens RUGGEDCOM RST2228 | <5.9.0 | |
siemens RUGGEDCOM RST2228P | <5.9.0 | |
RUGGEDCOM RST916C | <5.9.0 | |
Siemens RUGGEDCOM RST916P | <5.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38278 has been assessed as a critical vulnerability affecting multiple RUGGEDCOM devices.
To remediate CVE-2024-38278, upgrade all affected RUGGEDCOM products to version 5.9.0 or later.
CVE-2024-38278 affects RUGGEDCOM RMC8388, RMG8388NC, RS416NCv2, RS416PNCv2, RS416Pv2, and other specified models below version 5.9.0.
CVE-2024-38278 was disclosed in the context of security vulnerabilities reported in early 2024.
As of the latest information, there are no confirmed reports of active exploitation of CVE-2024-38278.