支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2023-44374 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

漏洞
N/A
来源: 美国国家漏洞数据库 NVD
漏洞信息
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.0), SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) (All versions < V3.0.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions < V3.0.0), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions < V3.0.0), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (All versions < V3.0.0), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions < V3.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions < V3.0.0), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) (All versions < V3.0.0), SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions < V3.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (All versions < V3.0.0), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions < V3.0.0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) (All versions < V3.0.0). Affected devices allow to change the password, but insufficiently check which password is to be changed. With this an authenticated attacker could, under certain conditions, be able to change the password of another, potential admin user, which could allow to escalate privileges.
来源: 美国国家漏洞数据库 NVD
漏洞信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
来源: 美国国家漏洞数据库 NVD
漏洞
在多现场上下文中未能对共享数据进行同步访问
来源: 美国国家漏洞数据库 NVD
漏洞
Siemens 多款产品 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
漏洞信息
Siemens SCALANCE是德国西门子(Siemens)公司的一系列以太网交换机。可连接到工业控制系统 (ICS) 设备,包括可编程逻辑控制器 (PLC) 和人机界面 (HMI) 系统。 Siemens 多款产品存在安全漏洞,该漏洞源于受影响的设备允许更改密码,但未充分检查要更改的密码。以下产品及版本受到影响:SCALANCE XB205-3 (SC, PN), SCALANCE XB205-3 (ST, E/IP), SCALANCE XB205-3 (ST, E/IP), SCALANCE XB
来源: 中国国家信息安全漏洞库 CNNVD
漏洞信息
N/A
来源: 中国国家信息安全漏洞库 CNNVD
漏洞
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
SiemensRUGGEDCOM RM1224 LTE(4G) EU 0 ~ V8.0 -
SiemensRUGGEDCOM RM1224 LTE(4G) NAM 0 ~ V8.0 -
SiemensSCALANCE M804PB 0 ~ V8.0 -
SiemensSCALANCE M812-1 ADSL-Router 0 ~ V8.0 -
SiemensSCALANCE M812-1 ADSL-Router 0 ~ V8.0 -
SiemensSCALANCE M816-1 ADSL-Router 0 ~ V8.0 -
SiemensSCALANCE M816-1 ADSL-Router 0 ~ V8.0 -
SiemensSCALANCE M826-2 SHDSL-Router 0 ~ V8.0 -
SiemensSCALANCE M874-2 0 ~ V8.0 -
SiemensSCALANCE M874-3 0 ~ V8.0 -
SiemensSCALANCE M876-3 (ROK) 0 ~ V8.0 -
SiemensSCALANCE M876-4 0 ~ V8.0 -
SiemensSCALANCE M876-4 (EU) 0 ~ V8.0 -
SiemensSCALANCE M876-4 (NAM) 0 ~ V8.0 -
SiemensSCALANCE MUM853-1 (EU) 0 ~ V8.0 -
SiemensSCALANCE MUM856-1 (EU) 0 ~ V8.0 -
SiemensSCALANCE MUM856-1 (RoW) 0 ~ V8.0 -
SiemensSCALANCE S615 EEC LAN-Router 0 ~ V8.0 -
SiemensSCALANCE S615 LAN-Router 0 ~ V8.0 -
SiemensSCALANCE WAB762-1 0 ~ V3.0.0 -
SiemensSCALANCE WAM763-1 0 ~ V3.0.0 -
SiemensSCALANCE WAM763-1 (ME) 0 ~ V3.0.0 -
SiemensSCALANCE WAM763-1 (US) 0 ~ V3.0.0 -
SiemensSCALANCE WAM766-1 0 ~ V3.0.0 -
SiemensSCALANCE WAM766-1 (ME) 0 ~ V3.0.0 -
SiemensSCALANCE WAM766-1 (US) 0 ~ V3.0.0 -
SiemensSCALANCE WAM766-1 EEC 0 ~ V3.0.0 -
SiemensSCALANCE WAM766-1 EEC (ME) 0 ~ V3.0.0 -
SiemensSCALANCE WAM766-1 EEC (US) 0 ~ V3.0.0 -
SiemensSCALANCE WUB762-1 0 ~ V3.0.0 -
SiemensSCALANCE WUB762-1 iFeatures 0 ~ V3.0.0 -
SiemensSCALANCE WUM763-1 0 ~ V3.0.0 -
SiemensSCALANCE WUM763-1 0 ~ V3.0.0 -
SiemensSCALANCE WUM763-1 (US) 0 ~ V3.0.0 -
SiemensSCALANCE WUM763-1 (US) 0 ~ V3.0.0 -
SiemensSCALANCE WUM766-1 0 ~ V3.0.0 -
SiemensSCALANCE WUM766-1 (ME) 0 ~ V3.0.0 -
SiemensSCALANCE WUM766-1 (USA) 0 ~ V3.0.0 -
二、漏洞 CVE-2023-44374 的公开POC
#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2023-44374 的情报信息
登录 三、漏洞 %(cve_id)s 的情报信息
新漏洞
四、漏洞 CVE-2023-44374 的评论

暂无评论


发表评论