First published: Tue Nov 12 2024(Updated: )
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2). Affected devices improperly manage access control for read-only users. This could allow an attacker to cause a temporary denial of service condition.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Siemens Ruggedcom RM1224 LTE(4G) EU Firmware | <8.2 | |
Siemens Ruggedcom RM1224 LTE(4G) EU | ||
All of | ||
Siemens Ruggedcom RM1224 LTE (4G) NAM Firmware | <8.2 | |
Siemens Ruggedcom RM1224 LTE (4G) NAM | ||
All of | ||
siemens scalance m804pb firmware | <8.2 | |
Siemens SCALANCE M804PB | ||
All of | ||
Siemens SCALANCE M812-1 Firmware | <8.2 | |
Siemens SCALANCE M812-1 (Annex A) | ||
All of | ||
Siemens SCALANCE M812-1 (Annex B) Firmware | <8.2 | |
Siemens SCALANCE M812-1 (annex b) | ||
All of | ||
Siemens SCALANCE M816-1 (Annex A) Firmware | <8.2 | |
siemens SCALANCE M816-1 (annex a) | ||
All of | ||
siemens SCALANCE M816-1 (annex b) firmware | <8.2 | |
Siemens SCALANCE M816-1 (annex b) | ||
All of | ||
siemens scalance m826-2 firmware | <8.2 | |
siemens scalance m826-2 | ||
All of | ||
siemens scalance m874-2 firmware | <8.2 | |
siemens scalance m874-2 | ||
All of | ||
siemens scalance m874-3 firmware | <8.2 | |
Siemens SCALANCE M874-3 | ||
All of | ||
Siemens SCALANCE M874-3 (CN) Firmware | <8.2 | |
Siemens SCALANCE M874-3 | ||
All of | ||
siemens scalance m876-3 firmware | <8.2 | |
siemens scalance m876-3 | ||
All of | ||
siemens SCALANCE M876-3 (rok) firmware | <8.2 | |
Siemens SCALANCE M876-3 (rok) | ||
All of | ||
siemens scalance m876-4 firmware | <8.2 | |
Siemens SCALANCE M876-4 (EU) Firmware | ||
All of | ||
Siemens SCALANCE M876-4 (EU) Firmware | <8.2 | |
Siemens SCALANCE M876-4 | ||
All of | ||
Siemens SCALANCE M876-4 (NAM) Firmware | <8.2 | |
Siemens SCALANCE M876-4 | ||
All of | ||
Siemens SCALANCE MUM853-1 (a1) firmware | <8.2 | |
Siemens SCALANCE MUM853-1 | ||
All of | ||
Siemens SCALANCE MUM853-1 (b1) firmware | <8.2 | |
siemens SCALANCE MUM853-1 (b1) | ||
All of | ||
Siemens SCALANCE MUM853-1 (eu) Firmware | <8.2 | |
Siemens SCALANCE MUM853-1 (EU) | ||
All of | ||
Siemens SCALANCE MUM856-1 (a1) firmware | <8.2 | |
Siemens SCALANCE MUM856-1 (a1) | ||
All of | ||
Siemens SCALANCE MUM856-1 (b1) Firmware | <8.2 | |
Siemens SCALANCE MUM856-1 (b1) | ||
All of | ||
Siemens SCALANCE MUM856-1 (cn) firmware | <8.2 | |
siemens SCALANCE MUM856-1 (cn) | ||
All of | ||
siemens SCALANCE MUM856-1 (eu) firmware | <8.2 | |
Siemens SCALANCE MUM856-1 (eu) | ||
All of | ||
Siemens SCALANCE MUM856-1 Firmware | <8.2 | |
Siemens SCALANCE MUM856-1 (ROW) | ||
All of | ||
Siemens SCALANCE S615 EEC LAN-Router firmware | <8.2 | |
Siemens Scalance S615 EEC Firmware | ||
All of | ||
Siemens Scalance S615 Firmware | <8.2 | |
Siemens SCALANCE S615 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50558 has not been assigned a specific CVSS score, but it poses significant risks to the affected Siemens devices.
To mitigate CVE-2024-50558, upgrade all affected Siemens devices to version 8.2 or later.
CVE-2024-50558 impacts several Siemens devices, including RUGGEDCOM RM1224 LTE models and SCALANCE series routers with firmware versions prior to 8.2.
CVE-2024-50558 represents vulnerabilities that could potentially allow unauthorized access or manipulation of device functionality.
Yes, it is crucial to review and ensure that all affected devices are updated to version 8.2 or newer, regardless of recent updates.