OSPF Protocol Vulnerability in SCALANCE Network Devices by Siemens
CVE-2021-37182
7.5HIGH
Key Information:
- Vendor
- Siemens
- Vendor
- CVE Published:
- 14 June 2022
Summary
A vulnerability exists in multiple SCALANCE network devices from Siemens where the OSPF protocol implementation does not properly validate the checksum and length fields of OSPF LS Update messages. This flaw enables an unauthenticated remote attacker to disrupt network services by sending specially crafted OSPF packets. For successful exploitation, OSPF must be enabled on the target device, potentially leading to significant network interruptions.
Affected Version(s)
SCALANCE XM408-4C All versions < V6.5
SCALANCE XM408-4C (L3 int.) All versions < V6.5
SCALANCE XM408-8C All versions < V6.5
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved