HIGH · 7.2

CVE-2023-49692

A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V7.2.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V7.2.2), SCALANCE M80...

Vulnerability Description

A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V7.2.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V7.2.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V7.2.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V7.2.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V7.2.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V7.2.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V7.2.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V7.2.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V7.2.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V7.2.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V7.2.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V7.2.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V7.2.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V7.2.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V7.2.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V7.2.2). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the parsing of the IPSEC configuration. This could allow malicious local administrators to issue commands on system level after a new connection is established.

CVSS Score

7.2

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
Siemens6Gk6108-4Am00-2Ba2 Firmware< 7.2.2
Siemens6Gk6108-4Am00-2Ba2-
Siemens6Gk6108-4Am00-2Da2 Firmware< 7.2.2
Siemens6Gk6108-4Am00-2Da2-
Siemens6Gk5804-0Ap00-2Aa2 Firmware< 7.2.2
Siemens6Gk5804-0Ap00-2Aa2-
Siemens6Gk5812-1Aa00-2Aa2 Firmware< 7.2.2
Siemens6Gk5812-1Aa00-2Aa2-
Siemens6Gk5812-1Ba00-2Aa2 Firmware< 7.2.2
Siemens6Gk5812-1Ba00-2Aa2-
Siemens6Gk5816-1Aa00-2Aa2 Firmware< 7.2.2
Siemens6Gk5816-1Aa00-2Aa2-
Siemens6Gk5816-1Ba00-2Aa2 Firmware< 7.2.2
Siemens6Gk5816-1Ba00-2Aa2-
Siemens6Gk5826-2Ab00-2Ab2 Firmware< 7.2.2
Siemens6Gk5826-2Ab00-2Ab2-
Siemens6Gk5874-2Aa00-2Aa2 Firmware< 7.2.2
Siemens6Gk5874-2Aa00-2Aa2-
Siemens6Gk5874-3Aa00-2Aa2 Firmware< 7.2.2
Siemens6Gk5874-3Aa00-2Aa2-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2023-49692?

CVE-2023-49692 is a vulnerability with a CVSS score of 7.2 (HIGH). A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V7.2.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V7.2.2), SCALANCE M80...

How severe is CVE-2023-49692?

CVE-2023-49692 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2023-49692?

Check the references section above for vendor advisories and patch information. Affected products include: Siemens 6Gk6108-4Am00-2Ba2 Firmware, Siemens 6Gk6108-4Am00-2Ba2, Siemens 6Gk6108-4Am00-2Da2 Firmware, Siemens 6Gk6108-4Am00-2Da2, Siemens 6Gk5804-0Ap00-2Aa2 Firmware.