2023-11-14
|
CVE-2023-44322
|
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router...
|
6ag1206\-2bb00\-7ac2_firmware, 6ag1206\-2bs00\-7ac2_firmware, 6ag1208\-0ba00\-7ac2_firmware, 6ag1216\-4bs00\-7ac2_firmware, 6gk5204\-0ba00\-2gf2_firmware, 6gk5204\-0ba00\-2yf2_firmware, 6gk5204\-2aa00\-2gf2_firmware, 6gk5204\-2aa00\-2yf2_firmware, 6gk5205\-3bb00\-2ab2_firmware, 6gk5205\-3bb00\-2tb2_firmware, 6gk5205\-3bd00\-2ab2_firmware, 6gk5205\-3bd00\-2tb2_firmware, 6gk5205\-3bf00\-2ab2_firmware, 6gk5205\-3bf00\-2tb2_firmware, 6gk5206\-2bb00\-2ac2_firmware, 6gk5206\-2bd00\-2ac2_firmware, 6gk5206\-2bs00\-2ac2_firmware, 6gk5206\-2bs00\-2fc2_firmware, 6gk5206\-2gs00\-2ac2_firmware, 6gk5206\-2gs00\-2fc2_firmware, 6gk5206\-2gs00\-2tc2_firmware, 6gk5206\-2rs00\-2ac2_firmware, 6gk5206\-2rs00\-5ac2_firmware, 6gk5206\-2rs00\-5fc2_firmware, 6gk5208\-0ba00\-2ab2_firmware, 6gk5208\-0ba00\-2ac2_firmware, 6gk5208\-0ba00\-2fc2_firmware, 6gk5208\-0ba00\-2tb2_firmware, 6gk5208\-0ga00\-2ac2_firmware, 6gk5208\-0ga00\-2fc2_firmware, 6gk5208\-0ga00\-2tc2_firmware, 6gk5208\-0ha00\-2as6_firmware, 6gk5208\-0ha00\-2es6_firmware, 6gk5208\-0ha00\-2ts6_firmware, 6gk5208\-0ra00\-2ac2_firmware, 6gk5208\-0ra00\-5ac2_firmware, 6gk5208\-0ua00\-5es6_firmware, 6gk5213\-3bb00\-2ab2_firmware, 6gk5213\-3bb00\-2tb2_firmware, 6gk5213\-3bd00\-2ab2_firmware, 6gk5213\-3bd00\-2tb2_firmware, 6gk5213\-3bf00\-2ab2_firmware, 6gk5213\-3bf00\-2tb2_firmware, 6gk5216\-0ba00\-2ab2_firmware, 6gk5216\-0ba00\-2ac2_firmware, 6gk5216\-0ba00\-2fc2_firmware, 6gk5216\-0ba00\-2tb2_firmware, 6gk5216\-0ha00\-2as6_firmware, 6gk5216\-0ha00\-2es6_firmware, 6gk5216\-0ha00\-2ts6_firmware, 6gk5216\-0ua00\-5es6_firmware, 6gk5216\-3rs00\-2ac2_firmware, 6gk5216\-3rs00\-5ac2_firmware, 6gk5216\-4bs00\-2ac2_firmware, 6gk5216\-4gs00\-2ac2_firmware, 6gk5216\-4gs00\-2fc2_firmware, 6gk5216\-4gs00\-2tc2_firmware, 6gk5224\-0ba00\-2ac2_firmware, 6gk5224\-4gs00\-2ac2_firmware, 6gk5224\-4gs00\-2fc2_firmware, 6gk5224\-4gs00\-2tc2_firmware, 6gk5324\-0ba00\-2ar3_firmware, 6gk5324\-0ba00\-3ar3_firmware, 6gk5326\-2qs00\-3ar3_firmware, 6gk5326\-2qs00\-3rr3_firmware, 6gk5328\-4fs00\-2ar3_firmware, 6gk5328\-4fs00\-2rr3_firmware, 6gk5328\-4fs00\-3ar3_firmware, 6gk5328\-4fs00\-3rr3_firmware, 6gk5328\-4ss00\-2ar3_firmware, 6gk5328\-4ss00\-3ar3_firmware
|
5.9
|
|
2023-11-14
|
CVE-2023-44317
|
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V7.2.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V7.2.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1...
|
Scalance_xb205\-3_\(Sc\,_pn\)_firmware, Scalance_xb205\-3_\(St\,_e\/ip\)_firmware, Scalance_xb205\-3_\(St\,_pn\)_firmware, Scalance_xb205\-3ld_\(Sc\,_e\/ip\)_firmware, Scalance_xb205\-3ld_\(Sc\,_pn\)_firmware, Scalance_xb208_\(E\/ip\)_firmware, Scalance_xb208_\(Pn\)_firmware, Scalance_xb213\-3_\(Sc\,_e\/ip\)_firmware, Scalance_xb213\-3_\(Sc\,_pn\)_firmware, Scalance_xb213\-3_\(St\,_e\/ip\)_firmware, Scalance_xb213\-3_\(St\,_pn\)_firmware, Scalance_xb213\-3ld_\(Sc\,_e\/ip\)_firmware, Scalance_xb213\-3ld_\(Sc\,_pn\)_firmware, Scalance_xb216_\(E\/ip\)_firmware, Scalance_xb216_\(Pn\)_firmware, Scalance_xc206\-2_\(Sc\)_firmware, Scalance_xc206\-2_\(St\/bfoc\)_firmware, Scalance_xc206\-2g_poe_\(54_v_dc\)_firmware, Scalance_xc206\-2g_poe_eec_\(54_v_dc\)_firmware, Scalance_xc206\-2g_poe_firmware, Scalance_xc206\-2sfp_eec_firmware, Scalance_xc206\-2sfp_firmware, Scalance_xc206\-2sfp_g_\(Eip_def\.\)_firmware, Scalance_xc206\-2sfp_g_eec_firmware, Scalance_xc206\-2sfp_g_firmware, Scalance_xc208_firmware, Scalance_xc208eec_firmware, Scalance_xc208g_\(Eip_def\.\)_firmware, Scalance_xc208g_eec_firmware, Scalance_xc208g_firmware, Scalance_xc208g_poe_\(54_v_dc\)_firmware, Scalance_xc208g_poe_firmware, Scalance_xc216\-3g_poe_\(54_v_dc\)_firmware, Scalance_xc216\-3g_poe_firmware, Scalance_xc216\-4c_firmware, Scalance_xc216\-4c_g_\(Eip_def\.\)_firmware, Scalance_xc216\-4c_g_eec_firmware, Scalance_xc216\-4c_g_firmware, Scalance_xc216_firmware, Scalance_xc216eec_firmware, Scalance_xc224\-4c_g_\(Eip_def\.\)_firmware, Scalance_xc224\-4c_g_eec_firmware, Scalance_xc224\-4c_g_firmware, Scalance_xc224_firmware, Scalance_xf204\-2ba_dna_firmware, Scalance_xf204\-2ba_firmware, Scalance_xf204_dna_firmware, Scalance_xf204_firmware, Scalance_xp208_\(Ethernet\/ip\)_firmware, Scalance_xp208_firmware, Scalance_xp208eec_firmware, Scalance_xp208poe_eec_firmware, Scalance_xp216_\(Ethernet\/ip\)_firmware, Scalance_xp216_firmware, Scalance_xp216eec_firmware, Scalance_xp216poe_eec_firmware, Scalance_xr324wg_\(24_x_fe\,_ac_230v\)_firmware, Scalance_xr324wg_\(24_x_fe\,_dc_24v\)_firmware, Scalance_xr326\-2c_poe_wg_\(Without_ul\)_firmware, Scalance_xr326\-2c_poe_wg_firmware, Scalance_xr328\-4c_wg_\(24xfe\,4xge\,ac230v\)_firmware, Scalance_xr328\-4c_wg_\(24xfe\,_4xge\,_24v\)_firmware, Scalance_xr328\-4c_wg_\(24xfe\,_4xge\,dc24v\)_firmware, Scalance_xr328\-4c_wg_\(28xge\,_ac_230v\)_firmware, Scalance_xr328\-4c_wg_\(28xge\,_dc_24v\)_firmware, Siplus_net_scalance_xc206\-2_firmware, Siplus_net_scalance_xc206\-2sfp_firmware, Siplus_net_scalance_xc208_firmware, Siplus_net_scalance_xc216\-4c_firmware
|
N/A
|
|
2023-11-14
|
CVE-2023-44318
|
Affected devices use a hardcoded key to obfuscate the configuration backup that an administrator can export from the device. This could allow an authenticated attacker with administrative privileges or an attacker that obtains a configuration backup to extract configuration information from the exported file.
|
6ag1206\-2bb00\-7ac2_firmware, 6ag1206\-2bs00\-7ac2_firmware, 6ag1208\-0ba00\-7ac2_firmware, 6ag1216\-4bs00\-7ac2_firmware, 6gk5204\-0ba00\-2gf2_firmware, 6gk5204\-0ba00\-2yf2_firmware, 6gk5204\-2aa00\-2gf2_firmware, 6gk5204\-2aa00\-2yf2_firmware, 6gk5205\-3bb00\-2ab2_firmware, 6gk5205\-3bb00\-2tb2_firmware, 6gk5205\-3bd00\-2ab2_firmware, 6gk5205\-3bd00\-2tb2_firmware, 6gk5205\-3bf00\-2ab2_firmware, 6gk5205\-3bf00\-2tb2_firmware, 6gk5206\-2bb00\-2ac2_firmware, 6gk5206\-2bd00\-2ac2_firmware, 6gk5206\-2bs00\-2ac2_firmware, 6gk5206\-2bs00\-2fc2_firmware, 6gk5206\-2gs00\-2ac2_firmware, 6gk5206\-2gs00\-2fc2_firmware, 6gk5206\-2gs00\-2tc2_firmware, 6gk5206\-2rs00\-2ac2_firmware, 6gk5206\-2rs00\-5ac2_firmware, 6gk5206\-2rs00\-5fc2_firmware, 6gk5208\-0ba00\-2ab2_firmware, 6gk5208\-0ba00\-2ac2_firmware, 6gk5208\-0ba00\-2fc2_firmware, 6gk5208\-0ba00\-2tb2_firmware, 6gk5208\-0ga00\-2ac2_firmware, 6gk5208\-0ga00\-2fc2_firmware, 6gk5208\-0ga00\-2tc2_firmware, 6gk5208\-0ha00\-2as6_firmware, 6gk5208\-0ha00\-2es6_firmware, 6gk5208\-0ha00\-2ts6_firmware, 6gk5208\-0ra00\-2ac2_firmware, 6gk5208\-0ra00\-5ac2_firmware, 6gk5208\-0ua00\-5es6_firmware, 6gk5213\-3bb00\-2ab2_firmware, 6gk5213\-3bb00\-2tb2_firmware, 6gk5213\-3bd00\-2ab2_firmware, 6gk5213\-3bd00\-2tb2_firmware, 6gk5213\-3bf00\-2ab2_firmware, 6gk5213\-3bf00\-2tb2_firmware, 6gk5216\-0ba00\-2ab2_firmware, 6gk5216\-0ba00\-2ac2_firmware, 6gk5216\-0ba00\-2fc2_firmware, 6gk5216\-0ba00\-2tb2_firmware, 6gk5216\-0ha00\-2as6_firmware, 6gk5216\-0ha00\-2es6_firmware, 6gk5216\-0ha00\-2ts6_firmware, 6gk5216\-0ua00\-5es6_firmware, 6gk5216\-3rs00\-2ac2_firmware, 6gk5216\-3rs00\-5ac2_firmware, 6gk5216\-4bs00\-2ac2_firmware, 6gk5216\-4gs00\-2ac2_firmware, 6gk5216\-4gs00\-2fc2_firmware, 6gk5216\-4gs00\-2tc2_firmware, 6gk5224\-0ba00\-2ac2_firmware, 6gk5224\-4gs00\-2ac2_firmware, 6gk5224\-4gs00\-2fc2_firmware, 6gk5224\-4gs00\-2tc2_firmware, 6gk5324\-0ba00\-2ar3_firmware, 6gk5324\-0ba00\-3ar3_firmware, 6gk5326\-2qs00\-3ar3_firmware, 6gk5326\-2qs00\-3rr3_firmware, 6gk5328\-4fs00\-2ar3_firmware, 6gk5328\-4fs00\-2rr3_firmware, 6gk5328\-4fs00\-3ar3_firmware, 6gk5328\-4fs00\-3rr3_firmware, 6gk5328\-4ss00\-2ar3_firmware, 6gk5328\-4ss00\-3ar3_firmware
|
4.9
|
|
2023-11-14
|
CVE-2023-44319
|
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router...
|
6ag1206\-2bb00\-7ac2_firmware, 6ag1206\-2bs00\-7ac2_firmware, 6ag1208\-0ba00\-7ac2_firmware, 6ag1216\-4bs00\-7ac2_firmware, 6gk5204\-0ba00\-2gf2_firmware, 6gk5204\-0ba00\-2yf2_firmware, 6gk5204\-2aa00\-2gf2_firmware, 6gk5204\-2aa00\-2yf2_firmware, 6gk5205\-3bb00\-2ab2_firmware, 6gk5205\-3bb00\-2tb2_firmware, 6gk5205\-3bd00\-2ab2_firmware, 6gk5205\-3bd00\-2tb2_firmware, 6gk5205\-3bf00\-2ab2_firmware, 6gk5205\-3bf00\-2tb2_firmware, 6gk5206\-2bb00\-2ac2_firmware, 6gk5206\-2bd00\-2ac2_firmware, 6gk5206\-2bs00\-2ac2_firmware, 6gk5206\-2bs00\-2fc2_firmware, 6gk5206\-2gs00\-2ac2_firmware, 6gk5206\-2gs00\-2fc2_firmware, 6gk5206\-2gs00\-2tc2_firmware, 6gk5206\-2rs00\-2ac2_firmware, 6gk5206\-2rs00\-5ac2_firmware, 6gk5206\-2rs00\-5fc2_firmware, 6gk5208\-0ba00\-2ab2_firmware, 6gk5208\-0ba00\-2ac2_firmware, 6gk5208\-0ba00\-2fc2_firmware, 6gk5208\-0ba00\-2tb2_firmware, 6gk5208\-0ga00\-2ac2_firmware, 6gk5208\-0ga00\-2fc2_firmware, 6gk5208\-0ga00\-2tc2_firmware, 6gk5208\-0ha00\-2as6_firmware, 6gk5208\-0ha00\-2es6_firmware, 6gk5208\-0ha00\-2ts6_firmware, 6gk5208\-0ra00\-2ac2_firmware, 6gk5208\-0ra00\-5ac2_firmware, 6gk5208\-0ua00\-5es6_firmware, 6gk5213\-3bb00\-2ab2_firmware, 6gk5213\-3bb00\-2tb2_firmware, 6gk5213\-3bd00\-2ab2_firmware, 6gk5213\-3bd00\-2tb2_firmware, 6gk5213\-3bf00\-2ab2_firmware, 6gk5213\-3bf00\-2tb2_firmware, 6gk5216\-0ba00\-2ab2_firmware, 6gk5216\-0ba00\-2ac2_firmware, 6gk5216\-0ba00\-2fc2_firmware, 6gk5216\-0ba00\-2tb2_firmware, 6gk5216\-0ha00\-2as6_firmware, 6gk5216\-0ha00\-2es6_firmware, 6gk5216\-0ha00\-2ts6_firmware, 6gk5216\-0ua00\-5es6_firmware, 6gk5216\-3rs00\-2ac2_firmware, 6gk5216\-3rs00\-5ac2_firmware, 6gk5216\-4bs00\-2ac2_firmware, 6gk5216\-4gs00\-2ac2_firmware, 6gk5216\-4gs00\-2fc2_firmware, 6gk5216\-4gs00\-2tc2_firmware, 6gk5224\-0ba00\-2ac2_firmware, 6gk5224\-4gs00\-2ac2_firmware, 6gk5224\-4gs00\-2fc2_firmware, 6gk5224\-4gs00\-2tc2_firmware, 6gk5324\-0ba00\-2ar3_firmware, 6gk5324\-0ba00\-3ar3_firmware, 6gk5326\-2qs00\-3ar3_firmware, 6gk5326\-2qs00\-3rr3_firmware, 6gk5328\-4fs00\-2ar3_firmware, 6gk5328\-4fs00\-2rr3_firmware, 6gk5328\-4fs00\-3ar3_firmware, 6gk5328\-4fs00\-3rr3_firmware, 6gk5328\-4ss00\-2ar3_firmware, 6gk5328\-4ss00\-3ar3_firmware
|
4.9
|
|
2023-11-14
|
CVE-2023-44374
|
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router...
|
6ag1206\-2bb00\-7ac2_firmware, 6ag1206\-2bs00\-7ac2_firmware, 6ag1208\-0ba00\-7ac2_firmware, 6ag1216\-4bs00\-7ac2_firmware, 6gk5204\-0ba00\-2gf2_firmware, 6gk5204\-0ba00\-2yf2_firmware, 6gk5204\-2aa00\-2gf2_firmware, 6gk5204\-2aa00\-2yf2_firmware, 6gk5205\-3bb00\-2ab2_firmware, 6gk5205\-3bb00\-2tb2_firmware, 6gk5205\-3bd00\-2ab2_firmware, 6gk5205\-3bd00\-2tb2_firmware, 6gk5205\-3bf00\-2ab2_firmware, 6gk5205\-3bf00\-2tb2_firmware, 6gk5206\-2bb00\-2ac2_firmware, 6gk5206\-2bd00\-2ac2_firmware, 6gk5206\-2bs00\-2ac2_firmware, 6gk5206\-2bs00\-2fc2_firmware, 6gk5206\-2gs00\-2ac2_firmware, 6gk5206\-2gs00\-2fc2_firmware, 6gk5206\-2gs00\-2tc2_firmware, 6gk5206\-2rs00\-2ac2_firmware, 6gk5206\-2rs00\-5ac2_firmware, 6gk5206\-2rs00\-5fc2_firmware, 6gk5208\-0ba00\-2ab2_firmware, 6gk5208\-0ba00\-2ac2_firmware, 6gk5208\-0ba00\-2fc2_firmware, 6gk5208\-0ba00\-2tb2_firmware, 6gk5208\-0ga00\-2ac2_firmware, 6gk5208\-0ga00\-2fc2_firmware, 6gk5208\-0ga00\-2tc2_firmware, 6gk5208\-0ha00\-2as6_firmware, 6gk5208\-0ha00\-2es6_firmware, 6gk5208\-0ha00\-2ts6_firmware, 6gk5208\-0ra00\-2ac2_firmware, 6gk5208\-0ra00\-5ac2_firmware, 6gk5208\-0ua00\-5es6_firmware, 6gk5213\-3bb00\-2ab2_firmware, 6gk5213\-3bb00\-2tb2_firmware, 6gk5213\-3bd00\-2ab2_firmware, 6gk5213\-3bd00\-2tb2_firmware, 6gk5213\-3bf00\-2ab2_firmware, 6gk5213\-3bf00\-2tb2_firmware, 6gk5216\-0ba00\-2ab2_firmware, 6gk5216\-0ba00\-2ac2_firmware, 6gk5216\-0ba00\-2fc2_firmware, 6gk5216\-0ba00\-2tb2_firmware, 6gk5216\-0ha00\-2as6_firmware, 6gk5216\-0ha00\-2es6_firmware, 6gk5216\-0ha00\-2ts6_firmware, 6gk5216\-0ua00\-5es6_firmware, 6gk5216\-3rs00\-2ac2_firmware, 6gk5216\-3rs00\-5ac2_firmware, 6gk5216\-4bs00\-2ac2_firmware, 6gk5216\-4gs00\-2ac2_firmware, 6gk5216\-4gs00\-2fc2_firmware, 6gk5216\-4gs00\-2tc2_firmware, 6gk5224\-0ba00\-2ac2_firmware, 6gk5224\-4gs00\-2ac2_firmware, 6gk5224\-4gs00\-2fc2_firmware, 6gk5224\-4gs00\-2tc2_firmware, 6gk5324\-0ba00\-2ar3_firmware, 6gk5324\-0ba00\-3ar3_firmware, 6gk5326\-2qs00\-3ar3_firmware, 6gk5326\-2qs00\-3rr3_firmware, 6gk5328\-4fs00\-2ar3_firmware, 6gk5328\-4fs00\-2rr3_firmware, 6gk5328\-4fs00\-3ar3_firmware, 6gk5328\-4fs00\-3rr3_firmware, 6gk5328\-4ss00\-2ar3_firmware, 6gk5328\-4ss00\-3ar3_firmware
|
8.8
|
|
2023-11-14
|
CVE-2023-43503
|
A vulnerability has been identified in COMOS (All versions < V10.4.4). Caching system in the affected application leaks sensitive information such as user and project information in cleartext via UDP.
|
Comos
|
7.5
|
|
2023-11-14
|
CVE-2023-43504
|
A vulnerability has been identified in COMOS (All versions < V10.4.4). Ptmcast executable used for testing cache validation service in affected application is vulnerable to Structured Exception Handler (SEH) based buffer overflow. This could allow an attacker to execute arbitrary code on the target system or cause denial of service condition.
|
Comos
|
9.8
|
|