Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2025-41224
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability has been identified in RUGGEDCOM RMC8388 V5.X (All versions < V5.10.0), RUGGEDCOM RMC8388NC V5.X (All versions < V5.10.0), RUGGEDCOM RS416NCv2 V5.X (All versions < V5.10.0), RUGGEDCOM RS416PNCv2 V5.X (All versions < V5.10.0), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.10.0), RUGGEDCOM RS416v2 V5.X (All versions < V5.10.0), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900GNC(32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900NC(32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2100NC(32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2100P (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2100PNC (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2288 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2288NC V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300NC V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300P V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300PNC V5.X (All versions < V5.10.0), RUGGEDCOM RSG2488 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2488NC V5.X (All versions < V5.10.0), RUGGEDCOM RSG907R (All versions < V5.10.0), RUGGEDCOM RSG908C (All versions < V5.10.0), RUGGEDCOM RSG909R (All versions < V5.10.0), RUGGEDCOM RSG910C (All versions < V5.10.0), RUGGEDCOM RSG920P V5.X (All versions < V5.10.0), RUGGEDCOM RSG920PNC V5.X (All versions < V5.10.0), RUGGEDCOM RSL910 (All versions < V5.10.0), RUGGEDCOM RSL910NC (All versions < V5.10.0), RUGGEDCOM RST2228 (All versions < V5.10.0), RUGGEDCOM RST2228P (All versions < V5.10.0), RUGGEDCOM RST916C (All versions < V5.10.0), RUGGEDCOM RST916P (All versions < V5.10.0). The affected products do not properly enforce interface access restrictions when changing from management to non-management interface configurations until a system reboot occurs, despite configuration being saved. This could allow an attacker with network access and credentials to gain access to device through non-management and maintain SSH access to the device until reboot.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
保护机制失效
Source: NVD (National Vulnerability Database)
Vulnerability Title
Siemens多款产品 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Siemens RUGGEDCOM RMC8388等都是德国西门子(Siemens)公司的产品。Siemens RUGGEDCOM RMC8388是一款时间信号转换器。Siemens RUGGEDCOM RMC8388NC是一款时间信号转换器。Siemens RUGGEDCOM RS416NCv2是一款通用级串行设备服务器。 Siemens多款产品存在安全漏洞,该漏洞源于未正确执行接口访问限制,可能导致未授权访问。以下产品及版本受到影响:RUGGEDCOM RMC8388 V5.X V5.10.0之前版本
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
SiemensRUGGEDCOM RMC8388 V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RMC8388NC V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RS416NCv2 V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RS416PNCv2 V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RS416Pv2 V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RS416v2 V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RS900 (32M) V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RS900G (32M) V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RS900GNC(32M) V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RS900NC(32M) V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSG2100 (32M) V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSG2100NC(32M) V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSG2100P (32M) V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSG2100PNC (32M) V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSG2288 V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSG2288NC V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSG2300 V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSG2300NC V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSG2300P V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSG2300PNC V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSG2488 V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSG2488NC V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSG907R 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSG908C 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSG909R 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSG910C 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSG920P V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSG920PNC V5.X 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSL910 0 ~ V5.10.0 -
SiemensRUGGEDCOM RSL910NC 0 ~ V5.10.0 -
SiemensRUGGEDCOM RST2228 0 ~ V5.10.0 -
SiemensRUGGEDCOM RST2228P 0 ~ V5.10.0 -
SiemensRUGGEDCOM RST916C 0 ~ V5.10.0 -
SiemensRUGGEDCOM RST916P 0 ~ V5.10.0 -
II. Public POCs for CVE-2025-41224
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2025-41224
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2025-41224

No comments yet


Leave a comment