Buffer Overflow Vulnerability in RUGGEDCOM RM1224 and SCALANCE Products
CVE-2021-25667

8.8HIGH

Key Information:

Vendor
Siemens
Vendor
CVE Published:
15 March 2021

Summary

A stack-based buffer overflow vulnerability exists in specific RUGGEDCOM RM1224 and SCALANCE devices when handling STP BPDU frames. If exploited, a remote attacker could trigger a denial-of-service condition or potentially execute arbitrary code. The successful exploitation of this vulnerability depends on the passive listening feature being enabled on the device. Affected products include various models within the RUGGEDCOM and SCALANCE families, all of which are susceptible to this severe security loophole.

Affected Version(s)

RUGGEDCOM RM1224 All versions >= V4.3 and < V6.4

SCALANCE M-800 All versions >= V4.3 and < V6.4

SCALANCE S615 All versions >= V4.3 and < V6.4

References

EPSS Score

13% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.