CVE-2021-31895

A vulnerability has been identified in RUGGEDCOM i800 (All versions < V4.3.7), RUGGEDCOM i801 (All versions < V4.3.7), RUGGEDCOM i802 (All versions < V4.3.7), RUGGEDCOM i803 (All versions < V4.3.7), RUGGEDCOM M2100 (All versions < V4.3.7), RUGGEDCOM M2200 (All versions < V4.3.7), RUGGEDCOM M969 (All versions < V4.3.7), RUGGEDCOM RMC30 (All versions < V4.3.7), RUGGEDCOM RMC8388 V4.X (All versions < V4.3.7), RUGGEDCOM RMC8388 V5.X (All versions < V5.5.4), RUGGEDCOM RP110 (All versions < V4.3.7), RUGGEDCOM RS1600 (All versions < V4.3.7), RUGGEDCOM RS1600F (All versions < V4.3.7), RUGGEDCOM RS1600T (All versions < V4.3.7), RUGGEDCOM RS400 (All versions < V4.3.7), RUGGEDCOM RS401 (All versions < V4.3.7), RUGGEDCOM RS416 (All versions < V4.3.7), RUGGEDCOM RS416P (All versions < V4.3.7), RUGGEDCOM RS416Pv2 V4.X (All versions < V4.3.7), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.5.4), RUGGEDCOM RS416v2 V4.X (All versions < V4.3.7), RUGGEDCOM RS416v2 V5.X (All versions < 5.5.4), RUGGEDCOM RS8000 (All versions < V4.3.7), RUGGEDCOM RS8000A (All versions < V4.3.7), RUGGEDCOM RS8000H (All versions < V4.3.7), RUGGEDCOM RS8000T (All versions < V4.3.7), RUGGEDCOM RS900 (32M) V4.X (All versions < V4.3.7), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.5.4), RUGGEDCOM RS900G (All versions < V4.3.7), RUGGEDCOM RS900G (32M) V4.X (All versions < V4.3.7), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.5.4), RUGGEDCOM RS900GP (All versions < V4.3.7), RUGGEDCOM RS900L (All versions < V4.3.7), RUGGEDCOM RS900W (All versions < V4.3.7), RUGGEDCOM RS910 (All versions < V4.3.7), RUGGEDCOM RS910L (All versions < V4.3.7), RUGGEDCOM RS910W (All versions < V4.3.7), RUGGEDCOM RS920L (All versions < V4.3.7), RUGGEDCOM RS920W (All versions < V4.3.7), RUGGEDCOM RS930L (All versions < V4.3.7), RUGGEDCOM RS930W (All versions < V4.3.7), RUGGEDCOM RS940G (All versions < V4.3.7), RUGGEDCOM RS969 (All versions < V4.3.7), RUGGEDCOM RSG2100 (All versions), RUGGEDCOM RSG2100 (32M) V4.X (All versions < V4.3.7), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.5.4), RUGGEDCOM RSG2100P (All versions < V4.3.7), RUGGEDCOM RSG2100P (32M) V4.X (All versions < V4.3.7), RUGGEDCOM RSG2100P (32M) V5.X (All versions < V5.5.4), RUGGEDCOM RSG2100PNC (32M) V4.X (All versions < V4.3.7), RUGGEDCOM RSG2100PNC (32M) V5.X (All versions < V5.5.4), RUGGEDCOM RSG2200 (All versions < V4.3.7), RUGGEDCOM RSG2288 V4.X (All versions < V4.3.7), RUGGEDCOM RSG2288 V5.X (All versions < V5.5.4), RUGGEDCOM RSG2300 V4.X (All versions < V4.3.7), RUGGEDCOM RSG2300 V5.X (All versions < V5.5.4), RUGGEDCOM RSG2300P V4.X (All versions < V4.3.7), RUGGEDCOM RSG2300P V5.X (All versions < V5.5.4), RUGGEDCOM RSG2488 V4.X (All versions < V4.3.7), RUGGEDCOM RSG2488 V5.X (All versions < V5.5.4), RUGGEDCOM RSG907R (All versions < V5.5.4), RUGGEDCOM RSG908C (All versions < V5.5.4), RUGGEDCOM RSG909R (All versions < V5.5.4), RUGGEDCOM RSG910C (All versions < V5.5.4), RUGGEDCOM RSG920P V4.X (All versions < V4.3.7), RUGGEDCOM RSG920P V5.X (All versions < V5.5.4), RUGGEDCOM RSL910 (All versions < V5.5.4), RUGGEDCOM RST2228 (All versions < V5.5.4), RUGGEDCOM RST2228P (All versions < V5.5.4), RUGGEDCOM RST916C (All versions < V5.5.4), RUGGEDCOM RST916P (All versions < V5.5.4). The DHCP client in affected devices fails to properly sanitize incoming DHCP packets. This could allow an unauthenticated remote attacker to cause memory to be overwritten, potentially allowing remote code execution.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_i800:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_i800:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_i801:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_i801:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_i802:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_i802:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_i803:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_i803:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_m969:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_m969:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_m2100:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_m2100:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_m2200:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_m2200:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rmc:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rmc:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rmc20:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rmc20:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rmc30:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rmc30:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rmc40:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rmc40:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rmc41:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rmc41:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
OR cpe:2.3:o:siemens:ruggedcom_ros_rmc8388:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:ruggedcom_ros_rmc8388:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rmc8388:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rp110:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rp110:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rs400:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs400:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rs401:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs401:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rs416:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs416:-:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
OR cpe:2.3:o:siemens:ruggedcom_ros_rs416v2:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:ruggedcom_ros_rs416v2:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs416v2:-:*:*:*:*:*:*:*

Configuration 19 (hide)

AND
OR cpe:2.3:o:siemens:ruggedcom_ros_rs900:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:ruggedcom_ros_rs900:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs900:-:*:*:*:*:*:*:*

Configuration 20 (hide)

AND
OR cpe:2.3:o:siemens:ruggedcom_ros_rs900g:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:ruggedcom_ros_rs900g:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs900g:-:*:*:*:*:*:*:*

Configuration 21 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rs900gp:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs900gp:-:*:*:*:*:*:*:*

Configuration 22 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rs900l:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs900l:-:*:*:*:*:*:*:*

Configuration 23 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rs900w:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs900w:-:*:*:*:*:*:*:*

Configuration 24 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rs910:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs910:-:*:*:*:*:*:*:*

Configuration 25 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rs910l:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs910l:-:*:*:*:*:*:*:*

Configuration 26 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rs910w:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs910w:-:*:*:*:*:*:*:*

Configuration 27 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rs920l:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs920l:-:*:*:*:*:*:*:*

Configuration 28 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rs920w:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs920w:-:*:*:*:*:*:*:*

Configuration 29 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rs930l:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs930l:-:*:*:*:*:*:*:*

Configuration 30 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rs930w:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs930w:-:*:*:*:*:*:*:*

Configuration 31 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rs940g:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs940g:-:*:*:*:*:*:*:*

Configuration 32 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rs969:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs969:-:*:*:*:*:*:*:*

Configuration 33 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rs8000:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs8000:-:*:*:*:*:*:*:*

Configuration 34 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rs8000a:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs8000a:-:*:*:*:*:*:*:*

Configuration 35 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rs8000h:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs8000h:-:*:*:*:*:*:*:*

Configuration 36 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rs8000t:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs8000t:-:*:*:*:*:*:*:*

Configuration 37 (hide)

AND
OR cpe:2.3:o:siemens:ruggedcom_ros_rsg900:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:ruggedcom_ros_rsg900:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rsg900:-:*:*:*:*:*:*:*

Configuration 38 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rsg900c:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rsg900c:-:*:*:*:*:*:*:*

Configuration 39 (hide)

AND
OR cpe:2.3:o:siemens:ruggedcom_ros_rsg900g:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:ruggedcom_ros_rsg900g:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rsg900g:-:*:*:*:*:*:*:*

Configuration 40 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rsg900r:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rsg900r:-:*:*:*:*:*:*:*

Configuration 41 (hide)

AND
OR cpe:2.3:o:siemens:ruggedcom_ros_rsg920p:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:ruggedcom_ros_rsg920p:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rsg920p:-:*:*:*:*:*:*:*

Configuration 42 (hide)

AND
OR cpe:2.3:o:siemens:ruggedcom_ros_rsg2100:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:ruggedcom_ros_rsg2100:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rsg2100:-:*:*:*:*:*:*:*

Configuration 43 (hide)

AND
OR cpe:2.3:o:siemens:ruggedcom_ros_rsg2100p:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:ruggedcom_ros_rsg2100p:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rsg2100p:-:*:*:*:*:*:*:*

Configuration 44 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rsg2200:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rsg2200:-:*:*:*:*:*:*:*

Configuration 45 (hide)

AND
OR cpe:2.3:o:siemens:ruggedcom_ros_rsg2288:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:ruggedcom_ros_rsg2288:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rsg2288:-:*:*:*:*:*:*:*

Configuration 46 (hide)

AND
OR cpe:2.3:o:siemens:ruggedcom_ros_rsg2300:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:ruggedcom_ros_rsg2300:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rsg2300:-:*:*:*:*:*:*:*

Configuration 47 (hide)

AND
OR cpe:2.3:o:siemens:ruggedcom_ros_rsg2300p:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:ruggedcom_ros_rsg2300p:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rsg2300p:-:*:*:*:*:*:*:*

Configuration 48 (hide)

AND
OR cpe:2.3:o:siemens:ruggedcom_ros_rsg2488:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:ruggedcom_ros_rsg2488:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rsg2488:-:*:*:*:*:*:*:*

Configuration 49 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rsl910:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rsl910:-:*:*:*:*:*:*:*

Configuration 50 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rst916c:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rst916c:-:*:*:*:*:*:*:*

Configuration 51 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rst916p:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rst916p:-:*:*:*:*:*:*:*

Configuration 52 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ros_rst2228:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rst2228:-:*:*:*:*:*:*:*

History

13 May 2025, 10:15

Type Values Removed Values Added
References
  • () https://cert-portal.siemens.com/productcert/html/ssa-373591.html -
Summary (en) A vulnerability has been identified in RUGGEDCOM ROS M2100 (All versions < V4.3.7), RUGGEDCOM ROS M2200 (All versions < V4.3.7), RUGGEDCOM ROS M969 (All versions < V4.3.7), RUGGEDCOM ROS RMC (All versions < V4.3.7), RUGGEDCOM ROS RMC20 (All versions < V4.3.7), RUGGEDCOM ROS RMC30 (All versions < V4.3.7), RUGGEDCOM ROS RMC40 (All versions < V4.3.7), RUGGEDCOM ROS RMC41 (All versions < V4.3.7), RUGGEDCOM ROS RMC8388 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RMC8388 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RP110 (All versions < V4.3.7), RUGGEDCOM ROS RS400 (All versions < V4.3.7), RUGGEDCOM ROS RS401 (All versions < V4.3.7), RUGGEDCOM ROS RS416 (All versions < V4.3.7), RUGGEDCOM ROS RS416v2 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RS416v2 V5.X (All versions < 5.5.4), RUGGEDCOM ROS RS8000 (All versions < V4.3.7), RUGGEDCOM ROS RS8000A (All versions < V4.3.7), RUGGEDCOM ROS RS8000H (All versions < V4.3.7), RUGGEDCOM ROS RS8000T (All versions < V4.3.7), RUGGEDCOM ROS RS900 (32M) V4.X (All versions < V4.3.7), RUGGEDCOM ROS RS900 (32M) V5.X (All versions < V5.5.4), RUGGEDCOM ROS RS900G (All versions < V4.3.7), RUGGEDCOM ROS RS900G (32M) V4.X (All versions < V4.3.7), RUGGEDCOM ROS RS900G (32M) V5.X (All versions < V5.5.4), RUGGEDCOM ROS RS900GP (All versions < V4.3.7), RUGGEDCOM ROS RS900L (All versions < V4.3.7), RUGGEDCOM ROS RS900W (All versions < V4.3.7), RUGGEDCOM ROS RS910 (All versions < V4.3.7), RUGGEDCOM ROS RS910L (All versions < V4.3.7), RUGGEDCOM ROS RS910W (All versions < V4.3.7), RUGGEDCOM ROS RS920L (All versions < V4.3.7), RUGGEDCOM ROS RS920W (All versions < V4.3.7), RUGGEDCOM ROS RS930L (All versions < V4.3.7), RUGGEDCOM ROS RS930W (All versions < V4.3.7), RUGGEDCOM ROS RS940G (All versions < V4.3.7), RUGGEDCOM ROS RS969 (All versions < V4.3.7), RUGGEDCOM ROS RSG2100 (32M) V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2100 (32M) V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2100 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2100P (All versions < V4.3.7), RUGGEDCOM ROS RSG2100P (32M) V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2100P (32M) V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2200 (All versions < V4.3.7), RUGGEDCOM ROS RSG2288 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2288 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2300 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2300 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2300P V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2300P V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2488 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2488 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG900 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG900 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG900C (All versions < V5.5.4), RUGGEDCOM ROS RSG900G V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG900G V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG900R (All versions < V5.5.4), RUGGEDCOM ROS RSG920P V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG920P V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSL910 (All versions < V5.5.4), RUGGEDCOM ROS RST2228 (All versions < V5.5.4), RUGGEDCOM ROS RST916C (All versions < V5.5.4), RUGGEDCOM ROS RST916P (All versions < V5.5.4), RUGGEDCOM ROS i800 (All versions < V4.3.7), RUGGEDCOM ROS i801 (All versions < V4.3.7), RUGGEDCOM ROS i802 (All versions < V4.3.7), RUGGEDCOM ROS i803 (All versions < V4.3.7). The DHCP client in affected devices fails to properly sanitize incoming DHCP packets. This could allow an unauthenticated remote attacker to cause memory to be overwritten, potentially allowing remote code execution. (en) A vulnerability has been identified in RUGGEDCOM i800 (All versions < V4.3.7), RUGGEDCOM i801 (All versions < V4.3.7), RUGGEDCOM i802 (All versions < V4.3.7), RUGGEDCOM i803 (All versions < V4.3.7), RUGGEDCOM M2100 (All versions < V4.3.7), RUGGEDCOM M2200 (All versions < V4.3.7), RUGGEDCOM M969 (All versions < V4.3.7), RUGGEDCOM RMC30 (All versions < V4.3.7), RUGGEDCOM RMC8388 V4.X (All versions < V4.3.7), RUGGEDCOM RMC8388 V5.X (All versions < V5.5.4), RUGGEDCOM RP110 (All versions < V4.3.7), RUGGEDCOM RS1600 (All versions < V4.3.7), RUGGEDCOM RS1600F (All versions < V4.3.7), RUGGEDCOM RS1600T (All versions < V4.3.7), RUGGEDCOM RS400 (All versions < V4.3.7), RUGGEDCOM RS401 (All versions < V4.3.7), RUGGEDCOM RS416 (All versions < V4.3.7), RUGGEDCOM RS416P (All versions < V4.3.7), RUGGEDCOM RS416Pv2 V4.X (All versions < V4.3.7), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.5.4), RUGGEDCOM RS416v2 V4.X (All versions < V4.3.7), RUGGEDCOM RS416v2 V5.X (All versions < 5.5.4), RUGGEDCOM RS8000 (All versions < V4.3.7), RUGGEDCOM RS8000A (All versions < V4.3.7), RUGGEDCOM RS8000H (All versions < V4.3.7), RUGGEDCOM RS8000T (All versions < V4.3.7), RUGGEDCOM RS900 (32M) V4.X (All versions < V4.3.7), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.5.4), RUGGEDCOM RS900G (All versions < V4.3.7), RUGGEDCOM RS900G (32M) V4.X (All versions < V4.3.7), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.5.4), RUGGEDCOM RS900GP (All versions < V4.3.7), RUGGEDCOM RS900L (All versions < V4.3.7), RUGGEDCOM RS900W (All versions < V4.3.7), RUGGEDCOM RS910 (All versions < V4.3.7), RUGGEDCOM RS910L (All versions < V4.3.7), RUGGEDCOM RS910W (All versions < V4.3.7), RUGGEDCOM RS920L (All versions < V4.3.7), RUGGEDCOM RS920W (All versions < V4.3.7), RUGGEDCOM RS930L (All versions < V4.3.7), RUGGEDCOM RS930W (All versions < V4.3.7), RUGGEDCOM RS940G (All versions < V4.3.7), RUGGEDCOM RS969 (All versions < V4.3.7), RUGGEDCOM RSG2100 (All versions), RUGGEDCOM RSG2100 (32M) V4.X (All versions < V4.3.7), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.5.4), RUGGEDCOM RSG2100P (All versions < V4.3.7), RUGGEDCOM RSG2100P (32M) V4.X (All versions < V4.3.7), RUGGEDCOM RSG2100P (32M) V5.X (All versions < V5.5.4), RUGGEDCOM RSG2100PNC (32M) V4.X (All versions < V4.3.7), RUGGEDCOM RSG2100PNC (32M) V5.X (All versions < V5.5.4), RUGGEDCOM RSG2200 (All versions < V4.3.7), RUGGEDCOM RSG2288 V4.X (All versions < V4.3.7), RUGGEDCOM RSG2288 V5.X (All versions < V5.5.4), RUGGEDCOM RSG2300 V4.X (All versions < V4.3.7), RUGGEDCOM RSG2300 V5.X (All versions < V5.5.4), RUGGEDCOM RSG2300P V4.X (All versions < V4.3.7), RUGGEDCOM RSG2300P V5.X (All versions < V5.5.4), RUGGEDCOM RSG2488 V4.X (All versions < V4.3.7), RUGGEDCOM RSG2488 V5.X (All versions < V5.5.4), RUGGEDCOM RSG907R (All versions < V5.5.4), RUGGEDCOM RSG908C (All versions < V5.5.4), RUGGEDCOM RSG909R (All versions < V5.5.4), RUGGEDCOM RSG910C (All versions < V5.5.4), RUGGEDCOM RSG920P V4.X (All versions < V4.3.7), RUGGEDCOM RSG920P V5.X (All versions < V5.5.4), RUGGEDCOM RSL910 (All versions < V5.5.4), RUGGEDCOM RST2228 (All versions < V5.5.4), RUGGEDCOM RST2228P (All versions < V5.5.4), RUGGEDCOM RST916C (All versions < V5.5.4), RUGGEDCOM RST916P (All versions < V5.5.4). The DHCP client in affected devices fails to properly sanitize incoming DHCP packets. This could allow an unauthenticated remote attacker to cause memory to be overwritten, potentially allowing remote code execution.
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 8.1

21 Nov 2024, 06:06

Type Values Removed Values Added
References () https://cert-portal.siemens.com/productcert/pdf/ssa-373591.pdf - Vendor Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-373591.pdf - Vendor Advisory

Information

Published : 2021-07-13 11:15

Updated : 2025-05-13 10:15


NVD link : CVE-2021-31895

Mitre link : CVE-2021-31895

CVE.ORG link : CVE-2021-31895


JSON object : View

Products Affected

siemens

  • ruggedcom_rsg2488
  • ruggedcom_ros_rs8000t
  • ruggedcom_rs8000
  • ruggedcom_rsg2200
  • ruggedcom_ros_rsg2300p
  • ruggedcom_m2200
  • ruggedcom_ros_m2200
  • ruggedcom_ros_rs416v2
  • ruggedcom_rs400
  • ruggedcom_ros_rs8000a
  • ruggedcom_rs920w
  • ruggedcom_rs401
  • ruggedcom_ros_rsg900c
  • ruggedcom_ros_rsg2288
  • ruggedcom_ros_rs920l
  • ruggedcom_ros_i803
  • ruggedcom_rsg2100p
  • ruggedcom_ros_rs416
  • ruggedcom_ros_rsg900r
  • ruggedcom_ros_rmc
  • ruggedcom_rst916p
  • ruggedcom_ros_rs910w
  • ruggedcom_rsg2300p
  • ruggedcom_ros_i801
  • ruggedcom_rmc8388
  • ruggedcom_rsg900
  • ruggedcom_rsg900c
  • ruggedcom_ros_rs900w
  • ruggedcom_ros_rs900
  • ruggedcom_ros_rs910
  • ruggedcom_m969
  • ruggedcom_rsg920p
  • ruggedcom_rsg2100
  • ruggedcom_rmc30
  • ruggedcom_rs900g
  • ruggedcom_ros_rs900l
  • ruggedcom_rs8000a
  • ruggedcom_ros_rmc41
  • ruggedcom_rs910l
  • ruggedcom_ros_rsg900
  • ruggedcom_ros_rmc30
  • ruggedcom_ros_rs920w
  • ruggedcom_rs8000h
  • ruggedcom_ros_i800
  • ruggedcom_ros_rs900gp
  • ruggedcom_ros_rs8000
  • ruggedcom_rs940g
  • ruggedcom_ros_rsg920p
  • ruggedcom_ros_i802
  • ruggedcom_ros_rs969
  • ruggedcom_rs920l
  • ruggedcom_i803
  • ruggedcom_ros_rs940g
  • ruggedcom_ros_rsl910
  • ruggedcom_ros_rs910l
  • ruggedcom_rs900l
  • ruggedcom_rst2228
  • ruggedcom_rst916c
  • ruggedcom_rs416v2
  • ruggedcom_i802
  • ruggedcom_rmc
  • ruggedcom_ros_rs930w
  • ruggedcom_ros_rs930l
  • ruggedcom_i801
  • ruggedcom_rmc20
  • ruggedcom_rsg900r
  • ruggedcom_ros_rst916p
  • ruggedcom_rsg900g
  • ruggedcom_ros_rsg2300
  • ruggedcom_rs416
  • ruggedcom_rs900gp
  • ruggedcom_ros_rmc40
  • ruggedcom_rmc40
  • ruggedcom_ros_rs401
  • ruggedcom_rs910
  • ruggedcom_ros_rsg2488
  • ruggedcom_ros_rsg2200
  • ruggedcom_rsg2288
  • ruggedcom_ros_rst2228
  • ruggedcom_rs900
  • ruggedcom_ros_rs900g
  • ruggedcom_rs930w
  • ruggedcom_ros_m969
  • ruggedcom_ros_rsg900g
  • ruggedcom_ros_rs8000h
  • ruggedcom_ros_m2100
  • ruggedcom_ros_rmc20
  • ruggedcom_ros_rs400
  • ruggedcom_rsl910
  • ruggedcom_rs910w
  • ruggedcom_ros_rmc8388
  • ruggedcom_rsg2300
  • ruggedcom_rs8000t
  • ruggedcom_ros_rsg2100
  • ruggedcom_ros_rp110
  • ruggedcom_ros_rst916c
  • ruggedcom_ros_rsg2100p
  • ruggedcom_rp110
  • ruggedcom_m2100
  • ruggedcom_rs900w
  • ruggedcom_rmc41
  • ruggedcom_rs969
  • ruggedcom_i800
  • ruggedcom_rs930l
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

CWE-787

Out-of-bounds Write