Vulnerability Description
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.0), SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) (All versions < V3.0.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions < V3.0.0), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions < V3.0.0), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (All versions < V3.0.0), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions < V3.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions < V3.0.0), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) (All versions < V3.0.0), SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions < V3.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (All versions < V3.0.0), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions < V3.0.0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) (All versions < V3.0.0). Affected devices can be configured to send emails when certain events occur on the device. When presented with an invalid response from the SMTP server, the device triggers an error that disrupts email sending. An attacker with access to the network can use this to do disable notification of users when certain events occur.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Siemens | 6Gk5205-3Bb00-2Ab2 Firmware | < 4.5 |
| Siemens | 6Gk5205-3Bb00-2Ab2 | - |
| Siemens | 6Gk5205-3Bb00-2Tb2 Firmware | < 4.5 |
| Siemens | 6Gk5205-3Bb00-2Tb2 | - |
| Siemens | 6Gk5205-3Bd00-2Tb2 Firmware | < 4.5 |
| Siemens | 6Gk5205-3Bd00-2Tb2 | - |
| Siemens | 6Gk5205-3Bd00-2Ab2 Firmware | < 4.5 |
| Siemens | 6Gk5205-3Bd00-2Ab2 | - |
| Siemens | 6Gk5205-3Bf00-2Tb2 Firmware | <= 4.5 |
| Siemens | 6Gk5205-3Bf00-2Tb2 | - |
| Siemens | 6Gk5205-3Bf00-2Ab2 Firmware | < 4.5 |
| Siemens | 6Gk5205-3Bf00-2Ab2 | - |
| Siemens | 6Gk5208-0Ba00-2Tb2 Firmware | < 4.5 |
| Siemens | 6Gk5208-0Ba00-2Tb2 | - |
| Siemens | 6Gk5208-0Ba00-2Ab2 Firmware | < 4.5 |
| Siemens | 6Gk5208-0Ba00-2Ab2 | - |
| Siemens | 6Gk5213-3Bd00-2Tb2 Firmware | < 4.5 |
| Siemens | 6Gk5213-3Bd00-2Tb2 | - |
| Siemens | 6Gk5213-3Bd00-2Ab2 Firmware | < 4.5 |
| Siemens | 6Gk5213-3Bd00-2Ab2 | - |
Related Weaknesses (CWE)
References
- https://cert-portal.siemens.com/productcert/html/ssa-180704.html
- https://cert-portal.siemens.com/productcert/html/ssa-602936.html
- https://cert-portal.siemens.com/productcert/html/ssa-699386.html
- https://cert-portal.siemens.com/productcert/html/ssa-769027.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdfVendor Advisory
- https://cert-portal.siemens.com/productcert/html/ssa-180704.html
- https://cert-portal.siemens.com/productcert/html/ssa-602936.html
- https://cert-portal.siemens.com/productcert/html/ssa-699386.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdfVendor Advisory
FAQ
What is CVE-2023-44322?
CVE-2023-44322 is a vulnerability with a CVSS score of 3.7 (LOW). A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB ...
How severe is CVE-2023-44322?
CVE-2023-44322 has been rated LOW with a CVSS base score of 3.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-44322?
Check the references section above for vendor advisories and patch information. Affected products include: Siemens 6Gk5205-3Bb00-2Ab2 Firmware, Siemens 6Gk5205-3Bb00-2Ab2, Siemens 6Gk5205-3Bb00-2Tb2 Firmware, Siemens 6Gk5205-3Bb00-2Tb2, Siemens 6Gk5205-3Bd00-2Tb2 Firmware.