CVE-2022-46140
Severity CVSS v4.0:
HIGH
Type:
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
Publication date:
13/12/2022
Last modified:
14/01/2025
Description
Affected devices use a weak encryption scheme to encrypt the debug zip file. This could allow an authenticated attacker to decrypt the contents of the file and retrieve debug information about the system.
Impact
Base Score 4.0
7.10
Severity 4.0
HIGH
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:siemens:ruggedcom_rm1224_lte\(4g\)_eu_firmware:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:siemens:ruggedcom_rm1224_lte\(4g\)_eu:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:siemens:ruggedcom_rm1224_lte\(4g\)_nam_firmware:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:siemens:ruggedcom_rm1224_lte\(4g\)_nam:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:siemens:scalance_m804pb_firmware:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:siemens:scalance_m804pb:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:siemens:scalance_m812-1_adsl-router_firmware:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:siemens:scalance_m812-1_adsl-router:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:siemens:scalance_m816-1_adsl-router_firmware:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:siemens:scalance_m816-1_adsl-router:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:siemens:scalance_m826-2_shdsl-router_firmware:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:siemens:scalance_m826-2_shdsl-router:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:siemens:scalance_m874-2_firmware:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:siemens:scalance_m874-2:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:siemens:scalance_m874-3_firmware:*:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



