Weak Cipher Configuration in RUGGEDCOM Devices by Siemens
CVE-2021-37209
6.7MEDIUM
Key Information:
- Vendor
Siemens
- Vendor
- CVE Published:
- 8 March 2022
What is CVE-2021-37209?
A significant vulnerability exists in various RUGGEDCOM devices due to the default configuration of the SSH server, which permits weak ciphers. This configuration can expose the systems to man-in-the-middle attacks, allowing unauthorized users to intercept, read, or modify data transmitted between legitimate clients and the vulnerable devices. Users are urged to upgrade to the latest software versions to mitigate these security risks.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
RUGGEDCOM i800 0
RUGGEDCOM i801 0
RUGGEDCOM i802 0
References
CVSS V3.1
Score:
6.7
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
High
Availability:
Low
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved