Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2024-39675
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability has been identified in RUGGEDCOM RMC30 (All versions < V4.3.10), RUGGEDCOM RMC30NC (All versions < V4.3.10), RUGGEDCOM RP110 (All versions < V4.3.10), RUGGEDCOM RP110NC (All versions < V4.3.10), RUGGEDCOM RS400 (All versions < V4.3.10), RUGGEDCOM RS400NC (All versions < V4.3.10), RUGGEDCOM RS401 (All versions < V4.3.10), RUGGEDCOM RS401NC (All versions < V4.3.10), RUGGEDCOM RS416 (All versions < V4.3.10), RUGGEDCOM RS416NC (All versions < V4.3.10), RUGGEDCOM RS416NCv2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416NCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416P (All versions < V4.3.10), RUGGEDCOM RS416PNC (All versions < V4.3.10), RUGGEDCOM RS416PNCv2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416PNCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416Pv2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416v2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416v2 V5.X (All versions < V5.9.0), RUGGEDCOM RS910 (All versions < V4.3.10), RUGGEDCOM RS910L (All versions), RUGGEDCOM RS910LNC (All versions), RUGGEDCOM RS910NC (All versions < V4.3.10), RUGGEDCOM RS910W (All versions < V4.3.10), RUGGEDCOM RS920L (All versions), RUGGEDCOM RS920LNC (All versions), RUGGEDCOM RS920W (All versions). In some configurations the affected products wrongly enable the Modbus service in non-managed VLANS. Only serial devices are affected by this vulnerability.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
将系统数据暴露到未授权控制的范围
Source: NVD (National Vulnerability Database)
Vulnerability Title
Siemens 多款产品安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Siemens RUGGEDCOM Series是德国西门子(Siemens)公司的一系列工业通信设备。 Siemens 多款产品存在安全漏洞,该漏洞源于在某些配置中,受影响的产品错误地在非托管 VLAN 中启用了 Modbus 服务。以下产品及版本受到影响:Siemens RUGGEDCOM RMC30 V4.3.10 版本之前, RUGGEDCOM RMC30NC V4.3.10 版本之前, RUGGEDCOM RP110 V4.3.10 版本之前, RUGGEDCOM RP110NC V4.3.10
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
SiemensRUGGEDCOM RMC30 0 ~ V4.3.10 -
SiemensRUGGEDCOM RMC30NC 0 ~ V4.3.10 -
SiemensRUGGEDCOM RP110 0 ~ V4.3.10 -
SiemensRUGGEDCOM RP110NC 0 ~ V4.3.10 -
SiemensRUGGEDCOM RS400 0 ~ V4.3.10 -
SiemensRUGGEDCOM RS400NC 0 ~ V4.3.10 -
SiemensRUGGEDCOM RS401 0 ~ V4.3.10 -
SiemensRUGGEDCOM RS401NC 0 ~ V4.3.10 -
SiemensRUGGEDCOM RS416 0 ~ V4.3.10 -
SiemensRUGGEDCOM RS416NC 0 ~ V4.3.10 -
SiemensRUGGEDCOM RS416NCv2 V4.X 0 ~ V4.3.10 -
SiemensRUGGEDCOM RS416NCv2 V5.X 0 ~ V5.9.0 -
SiemensRUGGEDCOM RS416P 0 ~ V4.3.10 -
SiemensRUGGEDCOM RS416PNC 0 ~ V4.3.10 -
SiemensRUGGEDCOM RS416PNCv2 V4.X 0 ~ V4.3.10 -
SiemensRUGGEDCOM RS416PNCv2 V5.X 0 ~ V5.9.0 -
SiemensRUGGEDCOM RS416Pv2 V4.X 0 ~ V4.3.10 -
SiemensRUGGEDCOM RS416Pv2 V5.X 0 ~ V5.9.0 -
SiemensRUGGEDCOM RS416v2 V4.X 0 ~ V4.3.10 -
SiemensRUGGEDCOM RS416v2 V5.X 0 ~ V5.9.0 -
SiemensRUGGEDCOM RS910 0 ~ V4.3.10 -
SiemensRUGGEDCOM RS910L 0 ~ * -
SiemensRUGGEDCOM RS910LNC 0 ~ * -
SiemensRUGGEDCOM RS910NC 0 ~ V4.3.10 -
SiemensRUGGEDCOM RS910W 0 ~ V4.3.10 -
SiemensRUGGEDCOM RS920L 0 ~ * -
SiemensRUGGEDCOM RS920LNC 0 ~ * -
SiemensRUGGEDCOM RS920W 0 ~ * -
II. Public POCs for CVE-2024-39675
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2024-39675
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2024-39675

No comments yet


Leave a comment