Vulnerabilidad en RUGGEDCOM (CVE-2022-39158)
Fecha de publicación:
13/09/2022
Se ha identificado una vulnerabilidad en <br />
RUGGEDCOM i800, <br />
RUGGEDCOM i800NC, <br />
RUGGEDCOM i801, <br />
RUGGEDCOM i801NC, <br />
RUGGEDCOM i802, <br />
RUGGEDCOM i802NC, <br />
RUGGEDCOM i803, <br />
RUGGEDCOM i803NC, <br />
RUGGEDCOM M2100, <br />
RUGGEDCOM M2100F, <br />
RUGGEDCOM M210 0NC, <br />
RUGGEDCOM M2200, <br />
RUGGEDCOM M2200F, <br />
RUGGEDCOM M2200NC, <br />
RUGGEDCOM M969 , <br />
RUGGEDCOM M969F, <br />
RUGGEDCOM M969NC, <br />
RUGGEDCOM RMC30, <br />
RUGGEDCOM RMC30NC, <br />
RUGGEDCOM RMC8388 V4.X, <br />
RUGGEDCOM RMC8388 V5.X, <br />
RUGGEDCOM RMC8388NC V4.X, <br />
RUGGEDCOM RMC8388NC V5.X, <br />
RUGGEDCOM RMC8388 NC V5.X, <br />
RUGGEDCOM RP110, <br />
RUGGEDCOM RP110NC, <br />
RUGGEDCOM RS1600, <br />
RUGGEDCOM RS1600F, <br />
RUGGEDCOM RS1600FNC, <br />
RUGGEDCOM RS1600NC, <br />
RUGGEDCOM RS1600T, <br />
RUGGEDCOM RS1600TNC, <br />
RUGGEDCOM RS400, <br />
RUGGEDCOM RS400F, <br />
RUGGEDCOM RS400NC, <br />
RUGGEDCOM RS401, <br />
RUGGEDCOM RS401NC, <br />
RUGGEDCOM RS416, <br />
RUGGEDCOM RS416F, <br />
RUGGEDCOM RS416NC, <br />
RUGGEDCOM RS416NC v2, <br />
RUGGEDCOM RS416NC v2, <br />
RUGGEDCOM RS416P, <br />
RUGGEDCOM RS416PF, <br />
RUGGEDCOM RS416PNC, <br />
RUGGEDCOM RS416PNC v2, <br />
RUGGEDCOM RS416PNC v2, <br />
RUGGEDCOM RS416Pv2, <br />
RUGGEDCOM RS416v2, <br />
RUGGEDCOM RS8000, <br />
RUGGEDCOM RS8000A, <br />
RUGGEDCOM RS8000ANC, <br />
RUGGED COM RS8000H, <br />
RUGGEDCOM RS8000HNC, <br />
RUGGEDCOM RS8000NC, <br />
RUGGEDCOM RS8000T, <br />
RUGGEDCOM RS8000TNC, <br />
RUGGEDCOM RS900, <br />
RUGGEDCOM RS900 (32M) V4.X, <br />
RUGGEDCOM RS900 (32M) V5.X, <br />
RUGGEDCOM RS900F, <br />
RUGGEDCOM RS900G, <br />
RUGGEDCOM RS900G (32M) V4.X, <br />
RUGGEDCOM RS900G (32M) V5.X, <br />
RUGGEDCOM RS900GF, <br />
RUGGEDCOM RS900GNC, <br />
RUGGED COMRS900GNC( 32M) V4.X, <br />
RUGGEDCOM RS900GNC(32M) V5.X, <br />
RUGGEDCOM RS900GNC(32M) V5.X, <br />
RUGGEDCOM RS900GP, <br />
RUGGEDCOM RS900GPF, <br />
RUGGEDCOM RS900GPNC, <br />
RUGGEDCOM RS900L, <br />
RUGGEDCOM RS900LNC, <br />
RUGGEDCOM RS900M-GET S-C01, <br />
RUGGEDCOM RS900M-GETS -Xx, <br />
ruggedcom rs900m-stnd-c01, <br />
ruggedcom rs900m-stnd-xx, <br />
ruggedcom rs900mnc-gets-c01, <br />
ruggedcom rs900mnc-gets-xx, <br />
rs900mnc-stnd-xx, <br />
rs900mnc-stnd-xxc.Com, <br />
rs900mnc-stnd-xx, <br />
rsugugedcom rs900mnc-stnd-xxc, <br />
rs900mnc-stnd-xx, <br />
rsugugedcom rs900mnc-stnd-xxcc, <br />
RUGGEDCOM RS900NC(32M) V4.X, <br />
RUGGEDCOM RS900NC(32M) V5.X, <br />
RUGGEDCOM RS900NC(32M) V5.X,<br />
RUGGEDCOM RS900W, <br />
RUGGEDCOM RS910, <br />
RUGGEDCOM RS910L,<br />
RUGGEDCOM RS910LNC, <br />
RUGGEDCOM RS910NC, <br />
RUGGEDCOM RS910W, <br />
RUGGEDCOM RS920L, <br />
RUGGEDCOM RS920LNC, <br />
RUGGEDCOM RS920W, <br />
RUGGEDCOM RS930L, <br />
RUGGEDCOM RS930LNC , <br />
RUGGEDCOM RS930W, <br />
RUGGEDCOM RS940G, <br />
RUGGEDCOM RS940GF, <br />
RUGGEDCOM RS940GNC, <br />
RUGGEDCOM RS969, <br />
RUGGEDCOM RS969NC , <br />
RUGGEDCOM RSG2100, <br />
RUGGEDCOM RSG2100 (32M) V4.X, <br />
RUGGEDCOM RSG2100 (32M) V5.X, <br />
RUGGEDCOM RSG2100F, <br />
RUGGEDCOM RSG2100NC, <br />
RUGGEDCOM RSG2100NC(32M) V4.X, <br />
RUGGEDCOM RSG2100NC(32M) V 5.X, <br />
RUGGEDCOM RSG2100NC(32M ) V5.X, <br />
RUGGEDCOM RSG2100P, <br />
RUGGEDCOM RSG2100PF, <br />
RUGGEDCOM RSG2100PNC, <br />
RUGGEDCOM RSG2200, <br />
RUGGEDCOM RSG2200F, <br />
RUGGEDCOM RSG2200NC, <br />
RUGGEDCOM RSG2288 V4.X, <br />
RUGGEDCOM RSG2288 V5.X, <br />
RUGGEDCOM RSG2288NC V4.X, <br />
RUGGEDCOM RSG2288NC V5.X, <br />
RUGGEDCOM RSG2288NC V5 .X, <br />
RUGGEDCOM RSG2300 V4.X, <br />
RUGGEDCOM RSG2300 V5.X, <br />
RUGGEDCOM RSG2300F, <br />
RUGGEDCOM RSG2300NC V4.X, <br />
RUGGEDCOM RSG2300NC V5.X, <br />
RUGGEDCOM RSG2300NC V5.X, <br />
RUGGEDCOM RSG2300P V4.X, <br />
RUGGEDCOM RSG2300P V5.X, <br />
RUGGEDCOM RSG2300PF , <br />
RUGGEDCOM RSG2300PNC V4.X, <br />
RUGGEDCOM RSG2300PNC V5.X, <br />
RUGGEDCOM RSG2300PNC V5.X, <br />
RUGGEDCOM RSG2488 V4.X, <br />
RUGGEDCOM RSG2488 V5.X, <br />
RUGGEDCOM RSG2488F, <br />
RUGGEDCOM RSG2488NC V4.X, <br />
RUGGED COM RSG2488NC V5.X, <br />
RUGGEDCOM RSG2488NC V5. X, <br />
RUGGEDCOM RSG907R, <br />
RUGGEDCOM RSG908C, <br />
RUGGEDCOM RSG909R, <br />
RUGGEDCOM RSG910C, <br />
RUGGEDCOM RSG920P V4.X, <br />
RUGGEDCOM RSG920P V5.X, <br />
RUGGEDCOM RSG920PNC V4.X, <br />
RUGGEDCOM RSG920PNC V5.X, <br />
RUGGEDCOM RS G920PNC V5.X, <br />
RUGGEDCOM RSL910, <br />
RUGGEDCOM RSL910NC, <br />
RUGGEDCOM RSL910NC, <br />
RUGGEDCOM RST2228, <br />
RUGGEDCOM RST2228P, <br />
RUGGEDCOM RST916C, <br />
RUGGEDCOM RST916P. <br />
<br />
Los dispositivos afectados manejan incorrectamente solicitudes HTTP parciales, lo que los hace vulnerables a ataques de slowloris. Esto podría permitir que un atacante remoto cree una condición de denegación de servicio que persista hasta que finalice el ataque.
Gravedad CVSS v3.1: MEDIA
Última modificación:
12/08/2025