OSPF Protocol Vulnerability in SCALANCE Network Devices by Siemens
CVE-2021-37182

7.5HIGH

Key Information:

Summary

A vulnerability exists in multiple SCALANCE network devices from Siemens where the OSPF protocol implementation does not properly validate the checksum and length fields of OSPF LS Update messages. This flaw enables an unauthenticated remote attacker to disrupt network services by sending specially crafted OSPF packets. For successful exploitation, OSPF must be enabled on the target device, potentially leading to significant network interruptions.

Affected Version(s)

SCALANCE XM408-4C All versions < V6.5

SCALANCE XM408-4C (L3 int.) All versions < V6.5

SCALANCE XM408-8C All versions < V6.5

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.