First published: Tue Jul 09 2024(Updated: )
A vulnerability has been identified in RUGGEDCOM RMC30 (All versions < V4.3.10), RUGGEDCOM RMC30NC (All versions < V4.3.10), RUGGEDCOM RP110 (All versions < V4.3.10), RUGGEDCOM RP110NC (All versions < V4.3.10), RUGGEDCOM RS400 (All versions < V4.3.10), RUGGEDCOM RS400NC (All versions < V4.3.10), RUGGEDCOM RS401 (All versions < V4.3.10), RUGGEDCOM RS401NC (All versions < V4.3.10), RUGGEDCOM RS416 (All versions < V4.3.10), RUGGEDCOM RS416NC (All versions < V4.3.10), RUGGEDCOM RS416NCv2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416NCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416P (All versions < V4.3.10), RUGGEDCOM RS416PNC (All versions < V4.3.10), RUGGEDCOM RS416PNCv2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416PNCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416Pv2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416v2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416v2 V5.X (All versions < V5.9.0), RUGGEDCOM RS910 (All versions < V4.3.10), RUGGEDCOM RS910L (All versions), RUGGEDCOM RS910LNC (All versions), RUGGEDCOM RS910NC (All versions < V4.3.10), RUGGEDCOM RS910W (All versions < V4.3.10), RUGGEDCOM RS920L (All versions), RUGGEDCOM RS920LNC (All versions), RUGGEDCOM RS920W (All versions). In some configurations the affected products wrongly enable the Modbus service in non-managed VLANS. Only serial devices are affected by this vulnerability.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens RUGGEDCOM RMC30 | <4.3.10 | |
siemens RUGGEDCOM RMC30NC | <4.3.10 | |
Siemens RUGGEDCOM RP110 | <4.3.10 | |
RUGGEDCOM RP110 | <4.3.10 | |
Siemens RUGGEDCOM RS400 | <4.3.10 | |
Siemens RUGGEDCOM RS400NC | <4.3.10 | |
Siemens RUGGEDCOM RS401 | <4.3.10 | |
RUGGEDCOM RS401 | <4.3.10 | |
Siemens RUGGEDCOM RS416 | <4.3.10 | |
Siemens RUGGEDCOM RS416NC | <4.3.10 | |
RUGGEDCOM RS416NC | <4.3.10 | |
RUGGEDCOM RS416NC | <5.9.0 | |
Siemens RUGGEDCOM RS416P | <4.3.10 | |
RUGGEDCOM RS416PNC | <4.3.10 | |
siemens RUGGEDCOM RS416PNC v2 | <4.3.10 | |
siemens RUGGEDCOM RS416PNC v2 | <5.9.0 | |
siemens RUGGEDCOM RS416Pv2 | <4.3.10 | |
siemens RUGGEDCOM RS416Pv2 | <5.9.0 | |
Siemens RUGGEDCOM ROS RS416v2 | <4.3.10 | |
Siemens RUGGEDCOM ROS RS416v2 | <5.9.0 | |
Siemens RUGGEDCOM RS910 | <4.3.10 | |
Siemens RUGGEDCOM RS910L | ||
Siemens RUGGEDCOM RS910LNC | ||
Siemens RUGGEDCOM RS910NC | <4.3.10 | |
Siemens RUGGEDCOM RS910W | <4.3.10 | |
Siemens RUGGEDCOM RS920L | ||
Siemens RUGGEDCOM RS920LNC | ||
Siemens RUGGEDCOM RS920W |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-39675 is currently assessed as high.
To fix CVE-2024-39675, upgrade all affected RUGGEDCOM products to version 4.3.10 or later.
CVE-2024-39675 affects multiple RUGGEDCOM products, including RMC30, RP110, RS400, and others with versions below 4.3.10.
CVE-2024-39675 is identified as a security vulnerability that could potentially allow unauthorized access.
There is currently no evidence that CVE-2024-39675 is being actively exploited in the wild.