Remote Code Execution Risk in RUGGEDCOM ROS by Siemens
CVE-2021-31895

9.8CRITICAL

Key Information:

Vendor
Siemens
Vendor
CVE Published:
13 July 2021

Summary

A significant vulnerability has been found in multiple versions of Siemens RUGGEDCOM ROS. Specifically, the DHCP client within these devices inadequately sanitizes incoming DHCP packets. This weakness allows malicious actors to craft malicious DHCP packets that, when processed by the affected devices, can lead to memory corruption. The exploit could potentially enable unauthorized remote code execution, compromising the security and integrity of the affected network devices.

Affected Version(s)

RUGGEDCOM ROS i800 All versions < V4.3.7

RUGGEDCOM ROS i801 All versions < V4.3.7

RUGGEDCOM ROS i802 All versions < V4.3.7

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.