Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidad en RUGGEDCOM (CVE-2022-39158)

Gravedad CVSS v3.1:
MEDIA
Tipo:
CWE-400 Consumo de recursos no controlado (Agotamiento de recursos)
Fecha de publicación:
13/09/2022
Última modificación:
14/11/2023

Descripción

Se ha identificado una vulnerabilidad en <br /> RUGGEDCOM i800, <br /> RUGGEDCOM i800NC, <br /> RUGGEDCOM i801, <br /> RUGGEDCOM i801NC, <br /> RUGGEDCOM i802, <br /> RUGGEDCOM i802NC, <br /> RUGGEDCOM i803, <br /> RUGGEDCOM i803NC, <br /> RUGGEDCOM M2100, <br /> RUGGEDCOM M2100F, <br /> RUGGEDCOM M210 0NC, <br /> RUGGEDCOM M2200, <br /> RUGGEDCOM M2200F, <br /> RUGGEDCOM M2200NC, <br /> RUGGEDCOM M969 , <br /> RUGGEDCOM M969F, <br /> RUGGEDCOM M969NC, <br /> RUGGEDCOM RMC30, <br /> RUGGEDCOM RMC30NC, <br /> RUGGEDCOM RMC8388 V4.X, <br /> RUGGEDCOM RMC8388 V5.X, <br /> RUGGEDCOM RMC8388NC V4.X, <br /> RUGGEDCOM RMC8388NC V5.X, <br /> RUGGEDCOM RMC8388 NC V5.X, <br /> RUGGEDCOM RP110, <br /> RUGGEDCOM RP110NC, <br /> RUGGEDCOM RS1600, <br /> RUGGEDCOM RS1600F, <br /> RUGGEDCOM RS1600FNC, <br /> RUGGEDCOM RS1600NC, <br /> RUGGEDCOM RS1600T, <br /> RUGGEDCOM RS1600TNC, <br /> RUGGEDCOM RS400, <br /> RUGGEDCOM RS400F, <br /> RUGGEDCOM RS400NC, <br /> RUGGEDCOM RS401, <br /> RUGGEDCOM RS401NC, <br /> RUGGEDCOM RS416, <br /> RUGGEDCOM RS416F, <br /> RUGGEDCOM RS416NC, <br /> RUGGEDCOM RS416NC v2, <br /> RUGGEDCOM RS416NC v2, <br /> RUGGEDCOM RS416P, <br /> RUGGEDCOM RS416PF, <br /> RUGGEDCOM RS416PNC, <br /> RUGGEDCOM RS416PNC v2, <br /> RUGGEDCOM RS416PNC v2, <br /> RUGGEDCOM RS416Pv2, <br /> RUGGEDCOM RS416v2, <br /> RUGGEDCOM RS8000, <br /> RUGGEDCOM RS8000A, <br /> RUGGEDCOM RS8000ANC, <br /> RUGGED COM RS8000H, <br /> RUGGEDCOM RS8000HNC, <br /> RUGGEDCOM RS8000NC, <br /> RUGGEDCOM RS8000T, <br /> RUGGEDCOM RS8000TNC, <br /> RUGGEDCOM RS900, <br /> RUGGEDCOM RS900 (32M) V4.X, <br /> RUGGEDCOM RS900 (32M) V5.X, <br /> RUGGEDCOM RS900F, <br /> RUGGEDCOM RS900G, <br /> RUGGEDCOM RS900G (32M) V4.X, <br /> RUGGEDCOM RS900G (32M) V5.X, <br /> RUGGEDCOM RS900GF, <br /> RUGGEDCOM RS900GNC, <br /> RUGGED COMRS900GNC( 32M) V4.X, <br /> RUGGEDCOM RS900GNC(32M) V5.X, <br /> RUGGEDCOM RS900GNC(32M) V5.X, <br /> RUGGEDCOM RS900GP, <br /> RUGGEDCOM RS900GPF, <br /> RUGGEDCOM RS900GPNC, <br /> RUGGEDCOM RS900L, <br /> RUGGEDCOM RS900LNC, <br /> RUGGEDCOM RS900M-GET S-C01, <br /> RUGGEDCOM RS900M-GETS -Xx, <br /> ruggedcom rs900m-stnd-c01, <br /> ruggedcom rs900m-stnd-xx, <br /> ruggedcom rs900mnc-gets-c01, <br /> ruggedcom rs900mnc-gets-xx, <br /> rs900mnc-stnd-xx, <br /> rs900mnc-stnd-xxc.Com, <br /> rs900mnc-stnd-xx, <br /> rsugugedcom rs900mnc-stnd-xxc, <br /> rs900mnc-stnd-xx, <br /> rsugugedcom rs900mnc-stnd-xxcc, <br /> RUGGEDCOM RS900NC(32M) V4.X, <br /> RUGGEDCOM RS900NC(32M) V5.X, <br /> RUGGEDCOM RS900NC(32M) V5.X,<br /> RUGGEDCOM RS900W, <br /> RUGGEDCOM RS910, <br /> RUGGEDCOM RS910L,<br /> RUGGEDCOM RS910LNC, <br /> RUGGEDCOM RS910NC, <br /> RUGGEDCOM RS910W, <br /> RUGGEDCOM RS920L, <br /> RUGGEDCOM RS920LNC, <br /> RUGGEDCOM RS920W, <br /> RUGGEDCOM RS930L, <br /> RUGGEDCOM RS930LNC , <br /> RUGGEDCOM RS930W, <br /> RUGGEDCOM RS940G, <br /> RUGGEDCOM RS940GF, <br /> RUGGEDCOM RS940GNC, <br /> RUGGEDCOM RS969, <br /> RUGGEDCOM RS969NC , <br /> RUGGEDCOM RSG2100, <br /> RUGGEDCOM RSG2100 (32M) V4.X, <br /> RUGGEDCOM RSG2100 (32M) V5.X, <br /> RUGGEDCOM RSG2100F, <br /> RUGGEDCOM RSG2100NC, <br /> RUGGEDCOM RSG2100NC(32M) V4.X, <br /> RUGGEDCOM RSG2100NC(32M) V 5.X, <br /> RUGGEDCOM RSG2100NC(32M ) V5.X, <br /> RUGGEDCOM RSG2100P, <br /> RUGGEDCOM RSG2100PF, <br /> RUGGEDCOM RSG2100PNC, <br /> RUGGEDCOM RSG2200, <br /> RUGGEDCOM RSG2200F, <br /> RUGGEDCOM RSG2200NC, <br /> RUGGEDCOM RSG2288 V4.X, <br /> RUGGEDCOM RSG2288 V5.X, <br /> RUGGEDCOM RSG2288NC V4.X, <br /> RUGGEDCOM RSG2288NC V5.X, <br /> RUGGEDCOM RSG2288NC V5 .X, <br /> RUGGEDCOM RSG2300 V4.X, <br /> RUGGEDCOM RSG2300 V5.X, <br /> RUGGEDCOM RSG2300F, <br /> RUGGEDCOM RSG2300NC V4.X, <br /> RUGGEDCOM RSG2300NC V5.X, <br /> RUGGEDCOM RSG2300NC V5.X, <br /> RUGGEDCOM RSG2300P V4.X, <br /> RUGGEDCOM RSG2300P V5.X, <br /> RUGGEDCOM RSG2300PF , <br /> RUGGEDCOM RSG2300PNC V4.X, <br /> RUGGEDCOM RSG2300PNC V5.X, <br /> RUGGEDCOM RSG2300PNC V5.X, <br /> RUGGEDCOM RSG2488 V4.X, <br /> RUGGEDCOM RSG2488 V5.X, <br /> RUGGEDCOM RSG2488F, <br /> RUGGEDCOM RSG2488NC V4.X, <br /> RUGGED COM RSG2488NC V5.X, <br /> RUGGEDCOM RSG2488NC V5. X, <br /> RUGGEDCOM RSG907R, <br /> RUGGEDCOM RSG908C, <br /> RUGGEDCOM RSG909R, <br /> RUGGEDCOM RSG910C, <br /> RUGGEDCOM RSG920P V4.X, <br /> RUGGEDCOM RSG920P V5.X, <br /> RUGGEDCOM RSG920PNC V4.X, <br /> RUGGEDCOM RSG920PNC V5.X, <br /> RUGGEDCOM RS G920PNC V5.X, <br /> RUGGEDCOM RSL910, <br /> RUGGEDCOM RSL910NC, <br /> RUGGEDCOM RSL910NC, <br /> RUGGEDCOM RST2228, <br /> RUGGEDCOM RST2228P, <br /> RUGGEDCOM RST916C, <br /> RUGGEDCOM RST916P. <br /> <br /> Los dispositivos afectados manejan incorrectamente solicitudes HTTP parciales, lo que los hace vulnerables a ataques de slowloris. Esto podría permitir que un atacante remoto cree una condición de denegación de servicio que persista hasta que finalice el ataque.

Productos y versiones vulnerables

CPE Desde Hasta
cpe:2.3:o:siemens:ruggedcom_ros:*:*:*:*:*:*:*:* 5.6.0 (excluyendo)
cpe:2.3:h:siemens:ruggedcom_rmc8388:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs416pv2:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs416v2:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs900_\(32m\):-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs900g_\(32m\):-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rsg2100_\(32m\):-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rsg2288:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rsg2300:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rsg2300p:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rsg2488:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rsg907r:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rsg908c:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rsg909r:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rsg910c:-:*:*:*:*:*:*:*