CVE-2023-44322

A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.0). Affected devices can be configured to send emails when certain events occur on the device. When presented with an invalid response from the SMTP server, the device triggers an error that disrupts email sending. An attacker with access to the network can use this to do disable notification of users when certain events occur.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:siemens:6gk5205-3bb00-2ab2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5205-3bb00-2ab2:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:siemens:6gk5205-3bb00-2tb2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5205-3bb00-2tb2:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:siemens:6gk5205-3bd00-2tb2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5205-3bd00-2tb2:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:siemens:6gk5205-3bd00-2ab2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5205-3bd00-2ab2:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:siemens:6gk5205-3bf00-2tb2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5205-3bf00-2tb2:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:siemens:6gk5205-3bf00-2ab2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5205-3bf00-2ab2:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:siemens:6gk5208-0ba00-2tb2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5208-0ba00-2tb2:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:siemens:6gk5208-0ba00-2ab2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5208-0ba00-2ab2:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:siemens:6gk5213-3bd00-2tb2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5213-3bd00-2tb2:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:siemens:6gk5213-3bd00-2ab2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5213-3bd00-2ab2:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:siemens:6gk5213-3bb00-2tb2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5213-3bb00-2tb2:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:siemens:6gk5213-3bb00-2ab2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5213-3bb00-2ab2:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:siemens:6gk5213-3bf00-2tb2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5213-3bf00-2tb2:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:siemens:6gk5213-3bf00-2ab2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5213-3bf00-2ab2:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:siemens:6gk5216-0ba00-2tb2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5216-0ba00-2tb2:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:siemens:6gk5216-0ba00-2ab2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5216-0ba00-2ab2:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
cpe:2.3:o:siemens:6gk5206-2bd00-2ac2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5206-2bd00-2ac2:-:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
cpe:2.3:o:siemens:6gk5206-2bb00-2ac2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5206-2bb00-2ac2:-:*:*:*:*:*:*:*

Configuration 19 (hide)

AND
cpe:2.3:o:siemens:6gk5206-2rs00-2ac2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5206-2rs00-2ac2:-:*:*:*:*:*:*:*

Configuration 20 (hide)

AND
cpe:2.3:o:siemens:6gk5206-2rs00-5ac2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5206-2rs00-5ac2:-:*:*:*:*:*:*:*

Configuration 21 (hide)

AND
cpe:2.3:o:siemens:6gk5206-2rs00-5fc2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5206-2rs00-5fc2:-:*:*:*:*:*:*:*

Configuration 22 (hide)

AND
cpe:2.3:o:siemens:6gk5206-2bs00-2ac2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5206-2bs00-2ac2:-:*:*:*:*:*:*:*

Configuration 23 (hide)

AND
cpe:2.3:o:siemens:6gk5206-2bs00-2fc2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5206-2bs00-2fc2:-:*:*:*:*:*:*:*

Configuration 24 (hide)

AND
cpe:2.3:o:siemens:6gk5206-2gs00-2ac2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5206-2gs00-2ac2:-:*:*:*:*:*:*:*

Configuration 25 (hide)

AND
cpe:2.3:o:siemens:6gk5206-2gs00-2tc2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5206-2gs00-2tc2:-:*:*:*:*:*:*:*

Configuration 26 (hide)

AND
cpe:2.3:o:siemens:6gk5206-2gs00-2fc2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5206-2gs00-2fc2:-:*:*:*:*:*:*:*

Configuration 27 (hide)

AND
cpe:2.3:o:siemens:6gk5208-0ba00-2ac2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5208-0ba00-2ac2:-:*:*:*:*:*:*:*

Configuration 28 (hide)

AND
cpe:2.3:o:siemens:6gk5208-0ba00-2fc2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5208-0ba00-2fc2:-:*:*:*:*:*:*:*

Configuration 29 (hide)

AND
cpe:2.3:o:siemens:6gk5208-0ga00-2ac2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5208-0ga00-2ac2:-:*:*:*:*:*:*:*

Configuration 30 (hide)

AND
cpe:2.3:o:siemens:6gk5208-0ga00-2tc2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5208-0ga00-2tc2:-:*:*:*:*:*:*:*

Configuration 31 (hide)

AND
cpe:2.3:o:siemens:6gk5208-0ga00-2fc2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5208-0ga00-2fc2:-:*:*:*:*:*:*:*

Configuration 32 (hide)

AND
cpe:2.3:o:siemens:6gk5208-0ra00-2ac2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5208-0ra00-2ac2:-:*:*:*:*:*:*:*

Configuration 33 (hide)

AND
cpe:2.3:o:siemens:6gk5208-0ra00-5ac2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5208-0ra00-5ac2:-:*:*:*:*:*:*:*

Configuration 34 (hide)

AND
cpe:2.3:o:siemens:6gk5216-0ba00-2ac2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5216-0ba00-2ac2:-:*:*:*:*:*:*:*

Configuration 35 (hide)

AND
cpe:2.3:o:siemens:6gk5216-3rs00-2ac2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5216-3rs00-2ac2:-:*:*:*:*:*:*:*

Configuration 36 (hide)

AND
cpe:2.3:o:siemens:6gk5216-3rs00-5ac2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5216-3rs00-5ac2:-:*:*:*:*:*:*:*

Configuration 37 (hide)

AND
cpe:2.3:o:siemens:6gk5216-4bs00-2ac2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5216-4bs00-2ac2:-:*:*:*:*:*:*:*

Configuration 38 (hide)

AND
cpe:2.3:o:siemens:6gk5216-4gs00-2ac2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5216-4gs00-2ac2:-:*:*:*:*:*:*:*

Configuration 39 (hide)

AND
cpe:2.3:o:siemens:6gk5216-4gs00-2tc2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5216-4gs00-2tc2:-:*:*:*:*:*:*:*

Configuration 40 (hide)

AND
cpe:2.3:o:siemens:6gk5216-4gs00-2fc2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5216-4gs00-2fc2:-:*:*:*:*:*:*:*

Configuration 41 (hide)

AND
cpe:2.3:o:siemens:6gk5216-0ba00-2fc2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5216-0ba00-2fc2:-:*:*:*:*:*:*:*

Configuration 42 (hide)

AND
cpe:2.3:o:siemens:6gk5224-0ba00-2ac2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5224-0ba00-2ac2:-:*:*:*:*:*:*:*

Configuration 43 (hide)

AND
cpe:2.3:o:siemens:6gk5224-4gs00-2ac2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5224-4gs00-2ac2:-:*:*:*:*:*:*:*

Configuration 44 (hide)

AND
cpe:2.3:o:siemens:6gk5224-4gs00-2tc2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5224-4gs00-2tc2:-:*:*:*:*:*:*:*

Configuration 45 (hide)

AND
cpe:2.3:o:siemens:6gk5224-4gs00-2fc2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5224-4gs00-2fc2:-:*:*:*:*:*:*:*

Configuration 46 (hide)

AND
cpe:2.3:o:siemens:6gk5204-0ba00-2gf2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5204-0ba00-2gf2:-:*:*:*:*:*:*:*

Configuration 47 (hide)

AND
cpe:2.3:o:siemens:6gk5204-0ba00-2yf2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5204-0ba00-2yf2:-:*:*:*:*:*:*:*

Configuration 48 (hide)

AND
cpe:2.3:o:siemens:6gk5204-2aa00-2gf2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5204-2aa00-2gf2:-:*:*:*:*:*:*:*

Configuration 49 (hide)

AND
cpe:2.3:o:siemens:6gk5204-2aa00-2yf2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5204-2aa00-2yf2:-:*:*:*:*:*:*:*

Configuration 50 (hide)

AND
cpe:2.3:o:siemens:6gk5208-0ha00-2as6_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5208-0ha00-2as6:-:*:*:*:*:*:*:*

Configuration 51 (hide)

AND
cpe:2.3:o:siemens:6gk5208-0ha00-2ts6_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5208-0ha00-2ts6:-:*:*:*:*:*:*:*

Configuration 52 (hide)

AND
cpe:2.3:o:siemens:6gk5208-0ha00-2es6_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5208-0ha00-2es6:-:*:*:*:*:*:*:*

Configuration 53 (hide)

AND
cpe:2.3:o:siemens:6gk5208-0ua00-5es6_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5208-0ua00-5es6:-:*:*:*:*:*:*:*

Configuration 54 (hide)

AND
cpe:2.3:o:siemens:6gk5216-0ha00-2as6_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5216-0ha00-2as6:-:*:*:*:*:*:*:*

Configuration 55 (hide)

AND
cpe:2.3:o:siemens:6gk5216-0ha00-2ts6_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5216-0ha00-2ts6:-:*:*:*:*:*:*:*

Configuration 56 (hide)

AND
cpe:2.3:o:siemens:6gk5216-0ha00-2es6_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5216-0ha00-2es6:-:*:*:*:*:*:*:*

Configuration 57 (hide)

AND
cpe:2.3:o:siemens:6gk5216-0ua00-5es6_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5216-0ua00-5es6:-:*:*:*:*:*:*:*

Configuration 58 (hide)

AND
cpe:2.3:o:siemens:6gk5324-0ba00-3ar3_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5324-0ba00-3ar3:-:*:*:*:*:*:*:*

Configuration 59 (hide)

AND
cpe:2.3:o:siemens:6gk5324-0ba00-2ar3_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5324-0ba00-2ar3:-:*:*:*:*:*:*:*

Configuration 60 (hide)

AND
cpe:2.3:o:siemens:6gk5326-2qs00-3ar3_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5326-2qs00-3ar3:-:*:*:*:*:*:*:*

Configuration 61 (hide)

AND
cpe:2.3:o:siemens:6gk5326-2qs00-3rr3_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5326-2qs00-3rr3:-:*:*:*:*:*:*:*

Configuration 62 (hide)

AND
cpe:2.3:o:siemens:6gk5328-4fs00-3ar3_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5328-4fs00-3ar3:-:*:*:*:*:*:*:*

Configuration 63 (hide)

AND
cpe:2.3:o:siemens:6gk5328-4fs00-3rr3_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5328-4fs00-3rr3:-:*:*:*:*:*:*:*

Configuration 64 (hide)

AND
cpe:2.3:o:siemens:6gk5328-4fs00-2ar3_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5328-4fs00-2ar3:-:*:*:*:*:*:*:*

Configuration 65 (hide)

AND
cpe:2.3:o:siemens:6gk5328-4fs00-2rr3_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5328-4fs00-2rr3:-:*:*:*:*:*:*:*

Configuration 66 (hide)

AND
cpe:2.3:o:siemens:6gk5328-4ss00-3ar3_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5328-4ss00-3ar3:-:*:*:*:*:*:*:*

Configuration 67 (hide)

AND
cpe:2.3:o:siemens:6gk5328-4ss00-2ar3_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6gk5328-4ss00-2ar3:-:*:*:*:*:*:*:*

Configuration 68 (hide)

AND
cpe:2.3:o:siemens:6ag1206-2bb00-7ac2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6ag1206-2bb00-7ac2:-:*:*:*:*:*:*:*

Configuration 69 (hide)

AND
cpe:2.3:o:siemens:6ag1206-2bs00-7ac2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6ag1206-2bs00-7ac2:-:*:*:*:*:*:*:*

Configuration 70 (hide)

AND
cpe:2.3:o:siemens:6ag1208-0ba00-7ac2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6ag1208-0ba00-7ac2:-:*:*:*:*:*:*:*

Configuration 71 (hide)

AND
cpe:2.3:o:siemens:6ag1216-4bs00-7ac2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6ag1216-4bs00-7ac2:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:25

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.9
v2 : unknown
v3 : 3.7
References () https://cert-portal.siemens.com/productcert/html/ssa-180704.html - () https://cert-portal.siemens.com/productcert/html/ssa-180704.html -
References () https://cert-portal.siemens.com/productcert/html/ssa-602936.html - () https://cert-portal.siemens.com/productcert/html/ssa-602936.html -
References () https://cert-portal.siemens.com/productcert/html/ssa-699386.html - () https://cert-portal.siemens.com/productcert/html/ssa-699386.html -
References () https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf - () https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf -
References () https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf - Vendor Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf - Vendor Advisory

13 Aug 2024, 08:15

Type Values Removed Values Added
Summary (en) Affected devices can be configured to send emails when certain events occur on the device. When presented with an invalid response from the SMTP server, the device triggers an error that disrupts email sending. An attacker with access to the network can use this to do disable notification of users when certain events occur. (en) A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.0). Affected devices can be configured to send emails when certain events occur on the device. When presented with an invalid response from the SMTP server, the device triggers an error that disrupts email sending. An attacker with access to the network can use this to do disable notification of users when certain events occur.

13 Feb 2024, 09:15

Type Values Removed Values Added
References
  • () https://cert-portal.siemens.com/productcert/html/ssa-180704.html -
  • () https://cert-portal.siemens.com/productcert/html/ssa-602936.html -
  • () https://cert-portal.siemens.com/productcert/html/ssa-699386.html -
Summary (en) A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU, RUGGEDCOM RM1224 LTE(4G) NAM, SCALANCE M804PB, SCALANCE M812-1 ADSL-Router (Annex A), SCALANCE M812-1 ADSL-Router (Annex B), SCALANCE M816-1 ADSL-Router (Annex A), SCALANCE M816-1 ADSL-Router (Annex B), SCALANCE M826-2 SHDSL-Router, SCALANCE M874-2, SCALANCE M874-3, SCALANCE M876-3 (EVDO), SCALANCE M876-3 (ROK), SCALANCE M876-4, SCALANCE M876-4 (EU), SCALANCE M876-4 (NAM), SCALANCE MUM853-1 (EU), SCALANCE MUM856-1 (EU), SCALANCE MUM856-1 (RoW), SCALANCE S615, SCALANCE S615 EEC, SCALANCE XB205-3 (SC, PN), SCALANCE XB205-3 (ST, E/IP), SCALANCE XB205-3 (ST, E/IP), SCALANCE XB205-3 (ST, PN), SCALANCE XB205-3LD (SC, E/IP), SCALANCE XB205-3LD (SC, PN), SCALANCE XB208 (E/IP), SCALANCE XB208 (PN), SCALANCE XB213-3 (SC, E/IP), SCALANCE XB213-3 (SC, PN), SCALANCE XB213-3 (ST, E/IP), SCALANCE XB213-3 (ST, PN), SCALANCE XB213-3LD (SC, E/IP), SCALANCE XB213-3LD (SC, PN), SCALANCE XB216 (E/IP), SCALANCE XB216 (PN), SCALANCE XC206-2 (SC), SCALANCE XC206-2 (ST/BFOC), SCALANCE XC206-2G PoE, SCALANCE XC206-2G PoE (54 V DC), SCALANCE XC206-2G PoE EEC (54 V DC), SCALANCE XC206-2SFP, SCALANCE XC206-2SFP EEC, SCALANCE XC206-2SFP G, SCALANCE XC206-2SFP G (EIP DEF.), SCALANCE XC206-2SFP G EEC, SCALANCE XC208, SCALANCE XC208EEC, SCALANCE XC208G, SCALANCE XC208G (EIP def.), SCALANCE XC208G EEC, SCALANCE XC208G PoE, SCALANCE XC208G PoE (54 V DC), SCALANCE XC216, SCALANCE XC216-3G PoE, SCALANCE XC216-3G PoE (54 V DC), SCALANCE XC216-4C, SCALANCE XC216-4C G, SCALANCE XC216-4C G (EIP Def.), SCALANCE XC216-4C G EEC, SCALANCE XC216EEC, SCALANCE XC224, SCALANCE XC224-4C G, SCALANCE XC224-4C G (EIP Def.), SCALANCE XC224-4C G EEC, SCALANCE XF204, SCALANCE XF204 DNA, SCALANCE XF204-2BA, SCALANCE XF204-2BA DNA, SCALANCE XP208, SCALANCE XP208 (Ethernet/IP), SCALANCE XP208EEC, SCALANCE XP208PoE EEC, SCALANCE XP216, SCALANCE XP216 (Ethernet/IP), SCALANCE XP216EEC, SCALANCE XP216POE EEC, SCALANCE XR324WG (24 x FE, AC 230V), SCALANCE XR324WG (24 X FE, DC 24V), SCALANCE XR326-2C PoE WG, SCALANCE XR326-2C PoE WG (without UL), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V), SCALANCE XR328-4C WG (28xGE, AC 230V), SCALANCE XR328-4C WG (28xGE, DC 24V), SIPLUS NET SCALANCE XC206-2, SIPLUS NET SCALANCE XC206-2SFP, SIPLUS NET SCALANCE XC208, SIPLUS NET SCALANCE XC216-4C. Affected devices can be configured to send emails when certain events occur on the device. When presented with an invalid response from the SMTP server, the device triggers an error that disrupts email sending. An attacker with access to the network can use this to do disable notification of users when certain events occur. (en) Affected devices can be configured to send emails when certain events occur on the device. When presented with an invalid response from the SMTP server, the device triggers an error that disrupts email sending. An attacker with access to the network can use this to do disable notification of users when certain events occur.

12 Dec 2023, 12:15

Type Values Removed Values Added
Summary A vulnerability has been identified in SCALANCE XB205-3 (SC, PN) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB205-3 (ST, PN) (All versions < V4.5), SCALANCE XB205-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB205-3LD (SC, PN) (All versions < V4.5), SCALANCE XB208 (E/IP) (All versions < V4.5), SCALANCE XB208 (PN) (All versions < V4.5), SCALANCE XB213-3 (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3 (SC, PN) (All versions < V4.5), SCALANCE XB213-3 (ST, E/IP) (All versions < V4.5), SCALANCE XB213-3 (ST, PN) (All versions < V4.5), SCALANCE XB213-3LD (SC, E/IP) (All versions < V4.5), SCALANCE XB213-3LD (SC, PN) (All versions < V4.5), SCALANCE XB216 (E/IP) (All versions < V4.5), SCALANCE XB216 (PN) (All versions < V4.5), SCALANCE XC206-2 (SC) (All versions < V4.5), SCALANCE XC206-2 (ST/BFOC) (All versions < V4.5), SCALANCE XC206-2G PoE (All versions < V4.5), SCALANCE XC206-2G PoE (54 V DC) (All versions < V4.5), SCALANCE XC206-2G PoE EEC (54 V DC) (All versions < V4.5), SCALANCE XC206-2SFP (All versions < V4.5), SCALANCE XC206-2SFP EEC (All versions < V4.5), SCALANCE XC206-2SFP G (All versions < V4.5), SCALANCE XC206-2SFP G (EIP DEF.) (All versions < V4.5), SCALANCE XC206-2SFP G EEC (All versions < V4.5), SCALANCE XC208 (All versions < V4.5), SCALANCE XC208EEC (All versions < V4.5), SCALANCE XC208G (All versions < V4.5), SCALANCE XC208G (EIP def.) (All versions < V4.5), SCALANCE XC208G EEC (All versions < V4.5), SCALANCE XC208G PoE (All versions < V4.5), SCALANCE XC208G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216 (All versions < V4.5), SCALANCE XC216-3G PoE (All versions < V4.5), SCALANCE XC216-3G PoE (54 V DC) (All versions < V4.5), SCALANCE XC216-4C (All versions < V4.5), SCALANCE XC216-4C G (All versions < V4.5), SCALANCE XC216-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC216-4C G EEC (All versions < V4.5), SCALANCE XC216EEC (All versions < V4.5), SCALANCE XC224 (All versions < V4.5), SCALANCE XC224-4C G (All versions < V4.5), SCALANCE XC224-4C G (EIP Def.) (All versions < V4.5), SCALANCE XC224-4C G EEC (All versions < V4.5), SCALANCE XF204 (All versions < V4.5), SCALANCE XF204 DNA (All versions < V4.5), SCALANCE XF204-2BA (All versions < V4.5), SCALANCE XF204-2BA DNA (All versions < V4.5), SCALANCE XP208 (All versions < V4.5), SCALANCE XP208 (Ethernet/IP) (All versions < V4.5), SCALANCE XP208EEC (All versions < V4.5), SCALANCE XP208PoE EEC (All versions < V4.5), SCALANCE XP216 (All versions < V4.5), SCALANCE XP216 (Ethernet/IP) (All versions < V4.5), SCALANCE XP216EEC (All versions < V4.5), SCALANCE XP216POE EEC (All versions < V4.5), SCALANCE XR324WG (24 x FE, AC 230V) (All versions < V4.5), SCALANCE XR324WG (24 X FE, DC 24V) (All versions < V4.5), SCALANCE XR326-2C PoE WG (All versions < V4.5), SCALANCE XR326-2C PoE WG (without UL) (All versions < V4.5), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, AC 230V) (All versions < V4.5), SCALANCE XR328-4C WG (28xGE, DC 24V) (All versions < V4.5), SIPLUS NET SCALANCE XC206-2 (All versions < V4.5), SIPLUS NET SCALANCE XC206-2SFP (All versions < V4.5), SIPLUS NET SCALANCE XC208 (All versions < V4.5), SIPLUS NET SCALANCE XC216-4C (All versions < V4.5). Affected devices can be configured to send emails when certain events occur on the device. When presented with an invalid response from the SMTP server, the device triggers an error that disrupts email sending. An attacker with access to the network can use this to do disable notification of users when certain events occur. A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU, RUGGEDCOM RM1224 LTE(4G) NAM, SCALANCE M804PB, SCALANCE M812-1 ADSL-Router (Annex A), SCALANCE M812-1 ADSL-Router (Annex B), SCALANCE M816-1 ADSL-Router (Annex A), SCALANCE M816-1 ADSL-Router (Annex B), SCALANCE M826-2 SHDSL-Router, SCALANCE M874-2, SCALANCE M874-3, SCALANCE M876-3 (EVDO), SCALANCE M876-3 (ROK), SCALANCE M876-4, SCALANCE M876-4 (EU), SCALANCE M876-4 (NAM), SCALANCE MUM853-1 (EU), SCALANCE MUM856-1 (EU), SCALANCE MUM856-1 (RoW), SCALANCE S615, SCALANCE S615 EEC, SCALANCE XB205-3 (SC, PN), SCALANCE XB205-3 (ST, E/IP), SCALANCE XB205-3 (ST, E/IP), SCALANCE XB205-3 (ST, PN), SCALANCE XB205-3LD (SC, E/IP), SCALANCE XB205-3LD (SC, PN), SCALANCE XB208 (E/IP), SCALANCE XB208 (PN), SCALANCE XB213-3 (SC, E/IP), SCALANCE XB213-3 (SC, PN), SCALANCE XB213-3 (ST, E/IP), SCALANCE XB213-3 (ST, PN), SCALANCE XB213-3LD (SC, E/IP), SCALANCE XB213-3LD (SC, PN), SCALANCE XB216 (E/IP), SCALANCE XB216 (PN), SCALANCE XC206-2 (SC), SCALANCE XC206-2 (ST/BFOC), SCALANCE XC206-2G PoE, SCALANCE XC206-2G PoE (54 V DC), SCALANCE XC206-2G PoE EEC (54 V DC), SCALANCE XC206-2SFP, SCALANCE XC206-2SFP EEC, SCALANCE XC206-2SFP G, SCALANCE XC206-2SFP G (EIP DEF.), SCALANCE XC206-2SFP G EEC, SCALANCE XC208, SCALANCE XC208EEC, SCALANCE XC208G, SCALANCE XC208G (EIP def.), SCALANCE XC208G EEC, SCALANCE XC208G PoE, SCALANCE XC208G PoE (54 V DC), SCALANCE XC216, SCALANCE XC216-3G PoE, SCALANCE XC216-3G PoE (54 V DC), SCALANCE XC216-4C, SCALANCE XC216-4C G, SCALANCE XC216-4C G (EIP Def.), SCALANCE XC216-4C G EEC, SCALANCE XC216EEC, SCALANCE XC224, SCALANCE XC224-4C G, SCALANCE XC224-4C G (EIP Def.), SCALANCE XC224-4C G EEC, SCALANCE XF204, SCALANCE XF204 DNA, SCALANCE XF204-2BA, SCALANCE XF204-2BA DNA, SCALANCE XP208, SCALANCE XP208 (Ethernet/IP), SCALANCE XP208EEC, SCALANCE XP208PoE EEC, SCALANCE XP216, SCALANCE XP216 (Ethernet/IP), SCALANCE XP216EEC, SCALANCE XP216POE EEC, SCALANCE XR324WG (24 x FE, AC 230V), SCALANCE XR324WG (24 X FE, DC 24V), SCALANCE XR326-2C PoE WG, SCALANCE XR326-2C PoE WG (without UL), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V), SCALANCE XR328-4C WG (28xGE, AC 230V), SCALANCE XR328-4C WG (28xGE, DC 24V), SIPLUS NET SCALANCE XC206-2, SIPLUS NET SCALANCE XC206-2SFP, SIPLUS NET SCALANCE XC208, SIPLUS NET SCALANCE XC216-4C. Affected devices can be configured to send emails when certain events occur on the device. When presented with an invalid response from the SMTP server, the device triggers an error that disrupts email sending. An attacker with access to the network can use this to do disable notification of users when certain events occur.
References
  • () https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf -
CWE CWE-252

28 Nov 2023, 18:13

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-14 11:15

Updated : 2024-11-21 08:25


NVD link : CVE-2023-44322

Mitre link : CVE-2023-44322

CVE.ORG link : CVE-2023-44322


JSON object : View

Products Affected

siemens

  • 6gk5205-3bf00-2tb2
  • 6gk5208-0ba00-2tb2_firmware
  • 6gk5206-2bd00-2ac2
  • 6gk5213-3bd00-2tb2
  • 6gk5224-4gs00-2tc2_firmware
  • 6gk5328-4fs00-2rr3_firmware
  • 6gk5213-3bb00-2tb2_firmware
  • 6gk5216-4gs00-2ac2_firmware
  • 6gk5208-0ba00-2ac2
  • 6gk5208-0ba00-2fc2
  • 6gk5328-4fs00-3rr3
  • 6ag1208-0ba00-7ac2
  • 6gk5328-4fs00-3ar3_firmware
  • 6gk5205-3bb00-2ab2
  • 6gk5328-4ss00-3ar3_firmware
  • 6gk5213-3bb00-2ab2_firmware
  • 6gk5216-3rs00-2ac2
  • 6gk5216-0ua00-5es6
  • 6gk5208-0ha00-2as6
  • 6gk5213-3bb00-2ab2
  • 6gk5206-2bb00-2ac2_firmware
  • 6gk5328-4fs00-3rr3_firmware
  • 6gk5216-3rs00-2ac2_firmware
  • 6gk5216-0ha00-2ts6_firmware
  • 6gk5208-0ba00-2ab2_firmware
  • 6gk5216-0ha00-2as6_firmware
  • 6gk5208-0ra00-5ac2
  • 6ag1216-4bs00-7ac2
  • 6gk5204-2aa00-2yf2_firmware
  • 6gk5224-4gs00-2ac2
  • 6gk5208-0ha00-2as6_firmware
  • 6gk5216-4gs00-2fc2_firmware
  • 6gk5224-0ba00-2ac2_firmware
  • 6gk5216-4gs00-2ac2
  • 6gk5208-0ba00-2ab2
  • 6gk5213-3bd00-2ab2_firmware
  • 6gk5208-0ua00-5es6
  • 6gk5208-0ra00-2ac2_firmware
  • 6gk5205-3bf00-2ab2_firmware
  • 6gk5213-3bd00-2ab2
  • 6gk5205-3bf00-2tb2_firmware
  • 6gk5205-3bd00-2tb2
  • 6gk5205-3bb00-2tb2
  • 6gk5206-2rs00-2ac2
  • 6gk5216-0ba00-2tb2_firmware
  • 6gk5213-3bb00-2tb2
  • 6gk5326-2qs00-3rr3
  • 6gk5204-2aa00-2gf2_firmware
  • 6gk5206-2gs00-2tc2
  • 6gk5204-0ba00-2gf2
  • 6gk5216-3rs00-5ac2_firmware
  • 6gk5216-4gs00-2tc2
  • 6gk5205-3bb00-2tb2_firmware
  • 6ag1208-0ba00-7ac2_firmware
  • 6gk5204-2aa00-2yf2
  • 6gk5206-2rs00-5ac2_firmware
  • 6gk5208-0ba00-2fc2_firmware
  • 6gk5208-0ba00-2tb2
  • 6gk5328-4ss00-2ar3_firmware
  • 6gk5206-2rs00-2ac2_firmware
  • 6gk5216-0ba00-2ac2_firmware
  • 6gk5204-0ba00-2gf2_firmware
  • 6gk5328-4ss00-3ar3
  • 6gk5208-0ga00-2fc2
  • 6gk5324-0ba00-2ar3_firmware
  • 6gk5216-4gs00-2tc2_firmware
  • 6gk5206-2rs00-5ac2
  • 6gk5206-2bs00-2fc2
  • 6gk5206-2bs00-2ac2
  • 6gk5328-4fs00-2ar3
  • 6gk5206-2bs00-2ac2_firmware
  • 6gk5216-0ba00-2ac2
  • 6gk5216-4gs00-2fc2
  • 6gk5216-0ba00-2fc2
  • 6gk5224-4gs00-2fc2_firmware
  • 6gk5324-0ba00-3ar3
  • 6gk5216-0ba00-2ab2_firmware
  • 6gk5206-2gs00-2fc2
  • 6gk5208-0ga00-2fc2_firmware
  • 6gk5326-2qs00-3ar3_firmware
  • 6gk5206-2rs00-5fc2
  • 6gk5204-2aa00-2gf2
  • 6gk5216-0ba00-2ab2
  • 6gk5205-3bd00-2ab2
  • 6gk5324-0ba00-2ar3
  • 6gk5206-2bb00-2ac2
  • 6gk5324-0ba00-3ar3_firmware
  • 6gk5216-0ba00-2tb2
  • 6gk5213-3bf00-2tb2
  • 6ag1206-2bs00-7ac2
  • 6gk5326-2qs00-3ar3
  • 6gk5208-0ga00-2ac2
  • 6gk5216-0ha00-2es6_firmware
  • 6gk5216-4bs00-2ac2_firmware
  • 6gk5326-2qs00-3rr3_firmware
  • 6gk5328-4ss00-2ar3
  • 6gk5205-3bd00-2tb2_firmware
  • 6gk5206-2gs00-2fc2_firmware
  • 6gk5208-0ha00-2ts6_firmware
  • 6gk5216-4bs00-2ac2
  • 6gk5216-0ba00-2fc2_firmware
  • 6gk5206-2gs00-2ac2_firmware
  • 6ag1206-2bb00-7ac2
  • 6gk5208-0ga00-2ac2_firmware
  • 6gk5206-2rs00-5fc2_firmware
  • 6gk5224-4gs00-2tc2
  • 6gk5208-0ga00-2tc2_firmware
  • 6gk5216-0ua00-5es6_firmware
  • 6ag1216-4bs00-7ac2_firmware
  • 6gk5205-3bf00-2ab2
  • 6gk5206-2bs00-2fc2_firmware
  • 6gk5206-2gs00-2tc2_firmware
  • 6gk5216-0ha00-2ts6
  • 6gk5224-0ba00-2ac2
  • 6gk5208-0ha00-2es6
  • 6gk5208-0ba00-2ac2_firmware
  • 6gk5216-3rs00-5ac2
  • 6gk5213-3bf00-2tb2_firmware
  • 6gk5208-0ga00-2tc2
  • 6gk5213-3bf00-2ab2_firmware
  • 6gk5205-3bd00-2ab2_firmware
  • 6gk5216-0ha00-2as6
  • 6ag1206-2bs00-7ac2_firmware
  • 6gk5208-0ha00-2ts6
  • 6gk5328-4fs00-3ar3
  • 6gk5224-4gs00-2fc2
  • 6gk5328-4fs00-2rr3
  • 6gk5213-3bd00-2tb2_firmware
  • 6gk5328-4fs00-2ar3_firmware
  • 6gk5208-0ra00-2ac2
  • 6gk5208-0ha00-2es6_firmware
  • 6gk5205-3bb00-2ab2_firmware
  • 6gk5206-2bd00-2ac2_firmware
  • 6gk5208-0ra00-5ac2_firmware
  • 6gk5204-0ba00-2yf2
  • 6ag1206-2bb00-7ac2_firmware
  • 6gk5216-0ha00-2es6
  • 6gk5204-0ba00-2yf2_firmware
  • 6gk5224-4gs00-2ac2_firmware
  • 6gk5206-2gs00-2ac2
  • 6gk5213-3bf00-2ab2
  • 6gk5208-0ua00-5es6_firmware
CWE
CWE-252

Unchecked Return Value