Latest siemens scalance sc622-2c firmware Vulnerabilities

Affected devices store the CLI user passwords encrypted in flash memory. Attackers with physical access to the device could retrieve the file and decrypt the CLI user passwords.
Siemens Ruggedcom Rm1224 Lte\(4g\) Eu Firmware
Siemens Ruggedcom Rm1224 Lte\(4g\) Eu
Siemens Ruggedcom Rm1224 Lte\(4g\) Nam Firmware
Siemens Ruggedcom Rm1224 Lte\(4g\) Nam
Siemens Scalance M804pb Firmware
Siemens Scalance M804pb
and 196 more
Affected devices use a weak encryption scheme to encrypt the debug zip file. This could allow an authenticated attacker to decrypt the contents of the file and retrieve debug information about the sys...
Siemens Ruggedcom Rm1224 Lte\(4g\) Eu Firmware
Siemens Ruggedcom Rm1224 Lte\(4g\) Eu
Siemens Ruggedcom Rm1224 Lte\(4g\) Nam Firmware
Siemens Ruggedcom Rm1224 Lte\(4g\) Nam
Siemens Scalance M804pb Firmware
Siemens Scalance M804pb
and 196 more
Affected devices do not check the TFTP blocksize correctly. This could allow an authenticated attacker to read from an uninitialized buffer that potentially contains previously allocated data.
Siemens Ruggedcom Rm1224 Lte\(4g\) Eu Firmware
Siemens Ruggedcom Rm1224 Lte\(4g\) Eu
Siemens Ruggedcom Rm1224 Lte\(4g\) Nam Firmware
Siemens Ruggedcom Rm1224 Lte\(4g\) Nam
Siemens Scalance M804pb Firmware
Siemens Scalance M804pb
and 398 more
Affected devices do not properly sanitize data introduced by an user when rendering the web interface. This could allow an authenticated remote attacker with administrative privileges to inject code a...
Siemens Scalance M-800 Firmware
Siemens SCALANCE M-800
Siemens Scalance S615 Firmware
Siemens SCALANCE S615
Siemens Scalance Sc-600 Firmware<2.3.1
Siemens SCALANCE SC-600
and 174 more
Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell.
Siemens Scalance M-800 Firmware
Siemens SCALANCE M-800
Siemens Scalance S615 Firmware
Siemens SCALANCE S615
Siemens Scalance Sc-600 Firmware<2.3.1
Siemens SCALANCE SC-600
and 174 more
A malicious server can serve excessive amounts of `Set-Cookie:` headers in a HTTP response to curl and curl < 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HT...
debian/curl
Apple macOS Ventura<13
Haxx Curl>=7.71.0<7.84.0
Fedoraproject Fedora=35
Debian Debian Linux=11.0
NetApp Clustered Data ONTAP
and 47 more
A vulnerability was found in curl. This issue occurs because the number of acceptable "links" in the "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited nu...
redhat/jbcs-httpd24-curl<0:7.86.0-2.el8
redhat/jbcs-httpd24-curl<0:7.86.0-2.el7
redhat/curl<0:7.61.1-22.el8_6.4
redhat/curl<0:7.61.1-18.el8_4.3
redhat/curl<0:7.76.1-14.el9_0.5
debian/curl<=7.64.0-4+deb10u2
and 57 more
A use-after-free in Busybox 1.35-x's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the copyvar function.
Busybox Busybox=1.35.0
Siemens Scalance Sc622-2c Firmware<3.0
Siemens Scalance Sc622-2c
Siemens Scalance Sc626-2c Firmware<3.0
Siemens Scalance Sc626-2c
Siemens Scalance Sc632-2c Firmware<3.0
and 7 more
The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of...
debian/strongswan
Strongswan Strongswan>=4.2.10<5.9.4
Debian Debian Linux=9.0
Debian Debian Linux=10.0
Debian Debian Linux=11.0
Fedoraproject Fedora=33
and 45 more
A vulnerability has been identified in RUGGEDCOM RM1224 (All versions >= V4.3 and < V6.4), SCALANCE M-800 (All versions >= V4.3 and < V6.4), SCALANCE S615 (All versions >= V4.3 and < V6.4), SCALANCE S...
Siemens Ruggedcom Rm1224 Firmware>=4.3<6.4
Siemens RUGGEDCOM RM1224
Siemens Scalance M-800 Firmware>=4.3<6.4
Siemens SCALANCE M-800
Siemens Scalance S615 Firmware>=4.3<6.4
Siemens SCALANCE S615
and 29 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203