Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2023-52236
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability has been identified in RUGGEDCOM i800 (All versions), RUGGEDCOM i801 (All versions), RUGGEDCOM i802 (All versions), RUGGEDCOM i803 (All versions), RUGGEDCOM M2100 (All versions), RUGGEDCOM M2200 (All versions), RUGGEDCOM M969 (All versions), RUGGEDCOM RMC30 (All versions), RUGGEDCOM RMC8388 V4.X (All versions), RUGGEDCOM RMC8388 V5.X (All versions < V5.10.0), RUGGEDCOM RP110 (All versions), RUGGEDCOM RS1600 (All versions), RUGGEDCOM RS1600F (All versions), RUGGEDCOM RS1600T (All versions), RUGGEDCOM RS400 (All versions), RUGGEDCOM RS401 (All versions), RUGGEDCOM RS416 (All versions), RUGGEDCOM RS416P (All versions), RUGGEDCOM RS416Pv2 V4.X (All versions), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.10.0), RUGGEDCOM RS416v2 V4.X (All versions), RUGGEDCOM RS416v2 V5.X (All versions < V5.10.0), RUGGEDCOM RS8000 (All versions), RUGGEDCOM RS8000A (All versions), RUGGEDCOM RS8000H (All versions), RUGGEDCOM RS8000T (All versions), RUGGEDCOM RS900 (All versions), RUGGEDCOM RS900 (32M) V4.X (All versions), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900G (All versions), RUGGEDCOM RS900G (32M) V4.X (All versions), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900GP (All versions), RUGGEDCOM RS900L (All versions), RUGGEDCOM RS900M-GETS-C01 (All versions), RUGGEDCOM RS900M-GETS-XX (All versions), RUGGEDCOM RS900M-STND-C01 (All versions), RUGGEDCOM RS900M-STND-XX (All versions), RUGGEDCOM RS900W (All versions), RUGGEDCOM RS910 (All versions), RUGGEDCOM RS910L (All versions), RUGGEDCOM RS910W (All versions), RUGGEDCOM RS920L (All versions), RUGGEDCOM RS920W (All versions), RUGGEDCOM RS930L (All versions), RUGGEDCOM RS930W (All versions), RUGGEDCOM RS940G (All versions), RUGGEDCOM RS969 (All versions), RUGGEDCOM RSG2100 (All versions), RUGGEDCOM RSG2100 (32M) V4.X (All versions), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2100P (All versions), RUGGEDCOM RSG2100P (32M) V4.X (All versions), RUGGEDCOM RSG2100P (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2200 (All versions), RUGGEDCOM RSG2288 V4.X (All versions), RUGGEDCOM RSG2288 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300 V4.X (All versions), RUGGEDCOM RSG2300 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300P V4.X (All versions), RUGGEDCOM RSG2300P V5.X (All versions < V5.10.0), RUGGEDCOM RSG2488 V4.X (All versions), RUGGEDCOM RSG2488 V5.X (All versions < V5.10.0), RUGGEDCOM RSG907R (All versions < V5.10.0), RUGGEDCOM RSG908C (All versions < V5.10.0), RUGGEDCOM RSG909R (All versions < V5.10.0), RUGGEDCOM RSG910C (All versions < V5.10.0), RUGGEDCOM RSG920P V4.X (All versions), RUGGEDCOM RSG920P V5.X (All versions < V5.10.0), RUGGEDCOM RSL910 (All versions < V5.10.0), RUGGEDCOM RST2228 (All versions < V5.10.0), RUGGEDCOM RST2228P (All versions < V5.10.0), RUGGEDCOM RST916C (All versions < V5.10.0), RUGGEDCOM RST916P (All versions < V5.10.0). The affected products support insecure cryptographic algorithms. An attacker could leverage these legacy algorithms to achieve a man-in-the-middle attack or impersonate communicating parties.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
使用已被攻破或存在风险的密码学算法
Source: NVD (National Vulnerability Database)
Vulnerability Title
Siemens多款产品 加密问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Siemens RUGGEDCOM i800等都是德国西门子(Siemens)公司的一款交换机。 Siemens多款产品存在加密问题漏洞,该漏洞源于使用不安全的加密算法,可能导致中间人攻击。以下产品及版本受到影响:RUGGEDCOM i800、RUGGEDCOM i801、RUGGEDCOM i802、RUGGEDCOM i803、RUGGEDCOM M2100、RUGGEDCOM M2200、RUGGEDCOM M969、RUGGEDCOM RMC30、RUGGEDCOM RMC8388 V4.X、RU
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
SiemensRUGGEDCOM i800 0 ~ * -
SiemensRUGGEDCOM i801 0 ~ * -
SiemensRUGGEDCOM i802 0 ~ * -
SiemensRUGGEDCOM i803 0 ~ * -
SiemensRUGGEDCOM M2100 0 ~ * -
SiemensRUGGEDCOM M2200 0 ~ * -
SiemensRUGGEDCOM M969 0 ~ * -
SiemensRUGGEDCOM RMC30 0 ~ * -
SiemensRUGGEDCOM RMC8388 V4.X 0 ~ * -
SiemensRUGGEDCOM RMC8388 V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RP110 0 ~ * -
SiemensRUGGEDCOM RS1600 0 ~ * -
SiemensRUGGEDCOM RS1600F 0 ~ * -
SiemensRUGGEDCOM RS1600T 0 ~ * -
SiemensRUGGEDCOM RS400 0 ~ * -
SiemensRUGGEDCOM RS401 0 ~ * -
SiemensRUGGEDCOM RS416 0 ~ * -
SiemensRUGGEDCOM RS416P 0 ~ * -
SiemensRUGGEDCOM RS416Pv2 V4.X 0 ~ * -
SiemensRUGGEDCOM RS416Pv2 V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RS416v2 V4.X 0 ~ * -
SiemensRUGGEDCOM RS416v2 V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RS8000 0 ~ * -
SiemensRUGGEDCOM RS8000A 0 ~ * -
SiemensRUGGEDCOM RS8000H 0 ~ * -
SiemensRUGGEDCOM RS8000T 0 ~ * -
SiemensRUGGEDCOM RS900 0 ~ * -
SiemensRUGGEDCOM RS900 (32M) V4.X 0 ~ * -
SiemensRUGGEDCOM RS900 (32M) V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RS900G 0 ~ * -
SiemensRUGGEDCOM RS900G (32M) V4.X 0 ~ * -
SiemensRUGGEDCOM RS900G (32M) V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RS900GP 0 ~ * -
SiemensRUGGEDCOM RS900L 0 ~ * -
SiemensRUGGEDCOM RS900M-GETS-C01 0 ~ * -
SiemensRUGGEDCOM RS900M-GETS-XX 0 ~ * -
SiemensRUGGEDCOM RS900M-STND-C01 0 ~ * -
SiemensRUGGEDCOM RS900M-STND-XX 0 ~ * -
SiemensRUGGEDCOM RS900W 0 ~ * -
SiemensRUGGEDCOM RS910 0 ~ * -
SiemensRUGGEDCOM RS910L 0 ~ * -
SiemensRUGGEDCOM RS910W 0 ~ * -
SiemensRUGGEDCOM RS920L 0 ~ * -
SiemensRUGGEDCOM RS920W 0 ~ * -
SiemensRUGGEDCOM RS930L 0 ~ * -
SiemensRUGGEDCOM RS930W 0 ~ * -
SiemensRUGGEDCOM RS940G 0 ~ * -
SiemensRUGGEDCOM RS969 0 ~ * -
SiemensRUGGEDCOM RSG2100 0 ~ * -
SiemensRUGGEDCOM RSG2100 (32M) V4.X 0 ~ * -
SiemensRUGGEDCOM RSG2100 (32M) V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSG2100P 0 ~ * -
SiemensRUGGEDCOM RSG2100P (32M) V4.X 0 ~ * -
SiemensRUGGEDCOM RSG2100P (32M) V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSG2200 0 ~ * -
SiemensRUGGEDCOM RSG2288 V4.X 0 ~ * -
SiemensRUGGEDCOM RSG2288 V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSG2300 V4.X 0 ~ * -
SiemensRUGGEDCOM RSG2300 V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSG2300P V4.X 0 ~ * -
SiemensRUGGEDCOM RSG2300P V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSG2488 V4.X 0 ~ * -
SiemensRUGGEDCOM RSG2488 V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSG907R 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSG908C 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSG909R 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSG910C 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSG920P V4.X 0 ~ * -
SiemensRUGGEDCOM RSG920P V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSL910 0 ~ V5.10.0 -
SiemensRUGGEDCOM RST2228 0 ~ V5.10.0 -
SiemensRUGGEDCOM RST2228P 0 ~ V5.10.0 -
SiemensRUGGEDCOM RST916C 0 ~ V5.10.0 -
SiemensRUGGEDCOM RST916P 0 ~ V5.10.0 -
II. Public POCs for CVE-2023-52236
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2023-52236
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-52236

No comments yet


Leave a comment