Remote Code Execution Vulnerability in Siemens Networking Products
CVE-2018-4833

8.8HIGH

Summary

A vulnerability exists in various Siemens networking products that could allow unprivileged remote attackers within the same local network segment to execute arbitrary code. This is achieved by sending a specially crafted DHCP response to a client's request. The affected products include multiple models of the RUGGEDCOM and SCALANCE series, with specific version limitations. Addressing this vulnerability is essential to mitigate potential exploits.

Affected Version(s)

RFID 181EIP All versions

RUGGEDCOM Win V4.4, V4.5, V5.0, and V5.1

SCALANCE X-200 switch family (incl. SIPLUS NET variants) All versions < V5.2.3

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.