CVE-2025-40569

A vulnerability has been identified in RUGGEDCOM RST2428P (6GK6242-6PA00) (All versions < V3.2), SCALANCE XC316-8 (6GK5324-8TS00-2AC2) (All versions < V3.2), SCALANCE XC324-4 (6GK5328-4TS00-2AC2) (All versions < V3.2), SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2) (All versions < V3.2), SCALANCE XC332 (6GK5332-0GA00-2AC2) (All versions < V3.2), SCALANCE XC416-8 (6GK5424-8TR00-2AC2) (All versions < V3.2), SCALANCE XC424-4 (6GK5428-4TR00-2AC2) (All versions < V3.2), SCALANCE XC432 (6GK5432-0GR00-2AC2) (All versions < V3.2), SCALANCE XCH328 (6GK5328-4TS01-2EC2) (All versions < V3.2), SCALANCE XCM324 (6GK5324-8TS01-2AC2) (All versions < V3.2), SCALANCE XCM328 (6GK5328-4TS01-2AC2) (All versions < V3.2), SCALANCE XCM332 (6GK5332-0GA01-2AC2) (All versions < V3.2), SCALANCE XR302-32 (6GK5334-5TS00-2AR3) (All versions < V3.2), SCALANCE XR302-32 (6GK5334-5TS00-3AR3) (All versions < V3.2), SCALANCE XR302-32 (6GK5334-5TS00-4AR3) (All versions < V3.2), SCALANCE XR322-12 (6GK5334-3TS00-2AR3) (All versions < V3.2), SCALANCE XR322-12 (6GK5334-3TS00-3AR3) (All versions < V3.2), SCALANCE XR322-12 (6GK5334-3TS00-4AR3) (All versions < V3.2), SCALANCE XR326-8 (6GK5334-2TS00-2AR3) (All versions < V3.2), SCALANCE XR326-8 (6GK5334-2TS00-3AR3) (All versions < V3.2), SCALANCE XR326-8 (6GK5334-2TS00-4AR3) (All versions < V3.2), SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3) (All versions < V3.2), SCALANCE XR502-32 (6GK5534-5TR00-2AR3) (All versions < V3.2), SCALANCE XR502-32 (6GK5534-5TR00-3AR3) (All versions < V3.2), SCALANCE XR502-32 (6GK5534-5TR00-4AR3) (All versions < V3.2), SCALANCE XR522-12 (6GK5534-3TR00-2AR3) (All versions < V3.2), SCALANCE XR522-12 (6GK5534-3TR00-3AR3) (All versions < V3.2), SCALANCE XR522-12 (6GK5534-3TR00-4AR3) (All versions < V3.2), SCALANCE XR526-8 (6GK5534-2TR00-2AR3) (All versions < V3.2), SCALANCE XR526-8 (6GK5534-2TR00-3AR3) (All versions < V3.2), SCALANCE XR526-8 (6GK5534-2TR00-4AR3) (All versions < V3.2), SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) (All versions < V3.2), SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) (All versions < V3.2), SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) (All versions < V3.2), SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3) (All versions < V3.2). The "Load Configuration from Local PC" functionality in the web interface of affected products contains a race condition vulnerability. This could allow an authenticated remote attacker to make the affected product load an attacker controlled configuration instead of the legitimate one. Successful exploitation requires that a legitimate administrator invokes the functionality and the attacker wins the race condition.
Configurations

No configuration.

History

12 Jun 2025, 16:06

Type Values Removed Values Added
Summary
  • (es) Se ha identificado una vulnerabilidad en RUGGEDCOM RST2428P (6GK6242-6PA00) (Todas las versiones &lt; V3.2), SCALANCE XC316-8 (6GK5324-8TS00-2AC2) (Todas las versiones &lt; V3.2), SCALANCE XC324-4 (6GK5328-4TS00-2AC2) (Todas las versiones &lt; V3.2), SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2) (Todas las versiones &lt; V3.2), SCALANCE XC332 (6GK5332-0GA00-2AC2) (Todas las versiones &lt; V3.2), SCALANCE XC416-8 (6GK5424-8TR00-2AC2) (Todas las versiones &lt; V3.2), SCALANCE XC424-4 (6GK5428-4TR00-2AC2) (Todas las versiones &lt; V3.2), SCALANCE XC432 (6GK5432-0GR00-2AC2) (Todas las versiones &lt; V3.2), SCALANCE XCH328 (6GK5328-4TS01-2EC2) (Todas las versiones &lt; V3.2), SCALANCE XCM324 (6GK5324-8TS01-2AC2) (Todas las versiones &lt; V3.2), SCALANCE XCM328 (6GK5328-4TS01-2AC2) (Todas las versiones &lt; V3.2), SCALANCE XCM332 (6GK5332-0GA01-2AC2) (Todas las versiones &lt; V3.2), SCALANCE XR302-32 (6GK5334-5TS00-2AR3) (Todas las versiones &lt; V3.2), SCALANCE XR302-32 (6GK5334-5TS00-3AR3) (Todas las versiones &lt; V3.2), SCALANCE XR302-32 (6GK5334-5TS00-4AR3) (Todas las versiones &lt; V3.2), SCALANCE XR322-12 (6GK5334-3TS00-2AR3) (Todas las versiones &lt; V3.2), SCALANCE XR322-12 (6GK5334-3TS00-3AR3) (Todas las versiones &lt; V3.2), SCALANCE XR322-12 (6GK5334-3TS00-4AR3) (Todas las versiones &lt; V3.2), SCALANCE XR326-8 (6GK5334-2TS00-2AR3) (Todas las versiones &lt; V3.2), SCALANCE XR326-8 (6GK5334-2TS00-3AR3) (Todas las versiones &lt; V3.2), SCALANCE XR326-8 (6GK5334-2TS00-4AR3) (Todas las versiones &lt; V3.2), SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3) (Todas las versiones &lt; V3.2), SCALANCE XR502-32 (6GK5534-5TR00-2AR3) (Todas las versiones &lt; V3.2), SCALANCE XR502-32 (6GK5534-5TR00-3AR3) (Todas las versiones &lt; V3.2), SCALANCE XR502-32 (6GK5534-5TR00-4AR3) (Todas las versiones &lt; V3.2), SCALANCE XR522-12 (6GK5534-3TR00-2AR3) (Todas las versiones &lt; V3.2), SCALANCE XR522-12 (6GK5534-3TR00-3AR3) (Todas las versiones &lt; V3.2), SCALANCE XR522-12 (6GK5534-3TR00-4AR3) (Todas las versiones &lt; V3.2), SCALANCE XR526-8 (6GK5534-2TR00-2AR3) (Todas las versiones &lt; V3.2), SCALANCE XR526-8 (6GK5534-2TR00-3AR3) (Todas las versiones &lt; V3.2), SCALANCE XR526-8 (6GK5534-2TR00-4AR3) (Todas las versiones &lt; V3.2), SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) (Todas las versiones &lt; V3.2), SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) (Todas las versiones &lt; V3.2), SCALANCE XRM334 (230 V CA, 8xFO) (6GK5334-2TS01-3AR3) (Todas las versiones &lt; V3.2), SCALANCE XRM334 (230 V CA, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3) (Todas las versiones &lt; V3.2), SCALANCE XRM334 (24 V CC, 12xFO) (6GK5334-3TS01-2AR3) (Todas las versiones &lt; V3.2), SCALANCE XRM334 (24 V CC, 8xFO) (6GK5334-2TS01-2AR3) (Todas las versiones &lt; V3.2), SCALANCE XRM334 (24 V CC, 2 x 10 G, 24 x SFP, 8 x SFP+) (6GK5334-5TS01-2AR3) (Todas las versiones anteriores a la V3.2), SCALANCE XRM334 (2 x 230 V CA, 12 x FO) (6GK5334-3TS01-4AR3) (Todas las versiones anteriores a la V3.2), SCALANCE XRM334 (2 x 230 V CA, 8 x FO) (6GK5334-2TS01-4AR3) (Todas las versiones anteriores a la V3.2), SCALANCE XRM334 (2 x 230 V CA, 2 x 10 G, 24 x SFP, 8 x SFP+) (6GK5334-5TS01-4AR3) (Todas las versiones anteriores a la V3.2). La función "Cargar configuración desde el PC local" en la interfaz web de los productos afectados contiene una vulnerabilidad de condición de ejecución. Esto podría permitir que un atacante remoto autenticado haga que el producto afectado cargue una configuración controlada por el atacante en lugar de la legítima. Para explotar esta vulnerabilidad con éxito, es necesario que un administrador legítimo invoque la funcionalidad y que el atacante supere la condición de ejecución.

10 Jun 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-10 16:15

Updated : 2025-06-12 16:06


NVD link : CVE-2025-40569

Mitre link : CVE-2025-40569

CVE.ORG link : CVE-2025-40569


JSON object : View

Products Affected

No product.

CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')