Buffer Overflow Vulnerability in RUGGEDCOM RM1224 and SCALANCE Products
CVE-2021-25667
8.8HIGH
Key Information:
- Vendor
- Siemens
- Vendor
- CVE Published:
- 15 March 2021
Summary
A stack-based buffer overflow vulnerability exists in specific RUGGEDCOM RM1224 and SCALANCE devices when handling STP BPDU frames. If exploited, a remote attacker could trigger a denial-of-service condition or potentially execute arbitrary code. The successful exploitation of this vulnerability depends on the passive listening feature being enabled on the device. Affected products include various models within the RUGGEDCOM and SCALANCE families, all of which are susceptible to this severe security loophole.
Affected Version(s)
RUGGEDCOM RM1224 All versions >= V4.3 and < V6.4
SCALANCE M-800 All versions >= V4.3 and < V6.4
SCALANCE S615 All versions >= V4.3 and < V6.4
References
EPSS Score
13% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved