A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2), SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) (All versions < V3.0.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions < V3.0.0), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions < V3.0.0), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (All versions < V3.0.0), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions < V3.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions < V3.0.0), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) (All versions < V3.0.0), SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions < V3.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (All versions < V3.0.0), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions < V3.0.0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) (All versions < V3.0.0). Affected devices truncates usernames longer than 15 characters when accessed via SSH or Telnet. This could allow an attacker to compromise system integrity.
Metrics
Affected Vendors & Products
References
History
Tue, 11 Feb 2025 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2). Affected devices truncates usernames longer than 15 characters when accessed via SSH or Telnet. This could allow an attacker to compromise system integrity. | A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2), SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) (All versions < V3.0.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions < V3.0.0), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions < V3.0.0), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (All versions < V3.0.0), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions < V3.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions < V3.0.0), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) (All versions < V3.0.0), SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions < V3.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (All versions < V3.0.0), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions < V3.0.0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) (All versions < V3.0.0). Affected devices truncates usernames longer than 15 characters when accessed via SSH or Telnet. This could allow an attacker to compromise system integrity. |
References |
|
Wed, 13 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Siemens
Siemens ruggedcom Rm1224 Lte\(4g\) Eu Siemens ruggedcom Rm1224 Lte\(4g\) Eu Firmware Siemens ruggedcom Rm1224 Lte\(4g\) Nam Siemens ruggedcom Rm1224 Lte\(4g\) Nam Firmware Siemens scalance M804pb Siemens scalance M804pb Firmware Siemens scalance M812-1 \(annex A\) Siemens scalance M812-1 \(annex A\) Firmware Siemens scalance M812-1 \(annex B\) Siemens scalance M812-1 \(annex B\) Firmware Siemens scalance M816-1 \(annex A\) Siemens scalance M816-1 \(annex A\) Firmware Siemens scalance M816-1 \(annex B\) Siemens scalance M816-1 \(annex B\) Firmware Siemens scalance M826-2 Siemens scalance M826-2 Firmware Siemens scalance M874-2 Siemens scalance M874-2 Firmware Siemens scalance M874-3 Siemens scalance M874-3 \(cn\) Siemens scalance M874-3 \(cn\) Firmware Siemens scalance M874-3 Firmware Siemens scalance M876-3 Siemens scalance M876-3 \(rok\) Siemens scalance M876-3 \(rok\) Firmware Siemens scalance M876-3 Firmware Siemens scalance M876-4 Siemens scalance M876-4 \(eu\) Siemens scalance M876-4 \(eu\) Firmware Siemens scalance M876-4 \(nam\) Siemens scalance M876-4 \(nam\) Firmware Siemens scalance M876-4 Firmware Siemens scalance Mum853-1 \(a1\) Siemens scalance Mum853-1 \(a1\) Firmware Siemens scalance Mum853-1 \(b1\) Siemens scalance Mum853-1 \(b1\) Firmware Siemens scalance Mum853-1 \(eu\) Siemens scalance Mum853-1 \(eu\) Firmware Siemens scalance Mum856-1 \(a1\) Siemens scalance Mum856-1 \(a1\) Firmware Siemens scalance Mum856-1 \(b1\) Siemens scalance Mum856-1 \(b1\) Firmware Siemens scalance Mum856-1 \(cn\) Siemens scalance Mum856-1 \(cn\) Firmware Siemens scalance Mum856-1 \(eu\) Siemens scalance Mum856-1 \(eu\) Firmware Siemens scalance Mum856-1 \(row\) Siemens scalance Mum856-1 \(row\) Firmware Siemens scalance S615 Siemens scalance S615 Eec Siemens scalance S615 Eec Firmware Siemens scalance S615 Firmware |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:h:siemens:ruggedcom_rm1224_lte\(4g\)_eu:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:ruggedcom_rm1224_lte\(4g\)_nam:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:scalance_m804pb:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:scalance_m812-1_\(annex_a\):-:*:*:*:*:*:*:* cpe:2.3:h:siemens:scalance_m812-1_\(annex_b\):-:*:*:*:*:*:*:* cpe:2.3:h:siemens:scalance_m816-1_\(annex_a\):-:*:*:*:*:*:*:* cpe:2.3:h:siemens:scalance_m816-1_\(annex_b\):-:*:*:*:*:*:*:* cpe:2.3:h:siemens:scalance_m826-2:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:scalance_m874-2:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:scalance_m874-3:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:scalance_m874-3_\(cn\):-:*:*:*:*:*:*:* cpe:2.3:h:siemens:scalance_m876-3:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:scalance_m876-3_\(rok\):-:*:*:*:*:*:*:* cpe:2.3:h:siemens:scalance_m876-4:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:scalance_m876-4_\(eu\):-:*:*:*:*:*:*:* cpe:2.3:h:siemens:scalance_m876-4_\(nam\):-:*:*:*:*:*:*:* cpe:2.3:h:siemens:scalance_mum853-1_\(a1\):-:*:*:*:*:*:*:* cpe:2.3:h:siemens:scalance_mum853-1_\(b1\):-:*:*:*:*:*:*:* cpe:2.3:h:siemens:scalance_mum853-1_\(eu\):-:*:*:*:*:*:*:* cpe:2.3:h:siemens:scalance_mum856-1_\(a1\):-:*:*:*:*:*:*:* cpe:2.3:h:siemens:scalance_mum856-1_\(b1\):-:*:*:*:*:*:*:* cpe:2.3:h:siemens:scalance_mum856-1_\(cn\):-:*:*:*:*:*:*:* cpe:2.3:h:siemens:scalance_mum856-1_\(eu\):-:*:*:*:*:*:*:* cpe:2.3:h:siemens:scalance_mum856-1_\(row\):-:*:*:*:*:*:*:* cpe:2.3:h:siemens:scalance_s615:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:scalance_s615_eec:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:ruggedcom_rm1224_lte\(4g\)_eu_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:ruggedcom_rm1224_lte\(4g\)_nam_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:scalance_m804pb_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:scalance_m812-1_\(annex_a\)_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:scalance_m812-1_\(annex_b\)_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:scalance_m816-1_\(annex_a\)_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:scalance_m816-1_\(annex_b\)_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:scalance_m826-2_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:scalance_m874-2_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:scalance_m874-3_\(cn\)_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:scalance_m874-3_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:scalance_m876-3_\(rok\)_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:scalance_m876-3_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:scalance_m876-4_\(eu\)_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:scalance_m876-4_\(nam\)_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:scalance_m876-4_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:scalance_mum853-1_\(a1\)_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:scalance_mum853-1_\(b1\)_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:scalance_mum853-1_\(eu\)_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:scalance_mum856-1_\(a1\)_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:scalance_mum856-1_\(b1\)_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:scalance_mum856-1_\(cn\)_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:scalance_mum856-1_\(eu\)_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:scalance_mum856-1_\(row\)_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:scalance_s615_eec_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:scalance_s615_firmware:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Siemens
Siemens ruggedcom Rm1224 Lte\(4g\) Eu Siemens ruggedcom Rm1224 Lte\(4g\) Eu Firmware Siemens ruggedcom Rm1224 Lte\(4g\) Nam Siemens ruggedcom Rm1224 Lte\(4g\) Nam Firmware Siemens scalance M804pb Siemens scalance M804pb Firmware Siemens scalance M812-1 \(annex A\) Siemens scalance M812-1 \(annex A\) Firmware Siemens scalance M812-1 \(annex B\) Siemens scalance M812-1 \(annex B\) Firmware Siemens scalance M816-1 \(annex A\) Siemens scalance M816-1 \(annex A\) Firmware Siemens scalance M816-1 \(annex B\) Siemens scalance M816-1 \(annex B\) Firmware Siemens scalance M826-2 Siemens scalance M826-2 Firmware Siemens scalance M874-2 Siemens scalance M874-2 Firmware Siemens scalance M874-3 Siemens scalance M874-3 \(cn\) Siemens scalance M874-3 \(cn\) Firmware Siemens scalance M874-3 Firmware Siemens scalance M876-3 Siemens scalance M876-3 \(rok\) Siemens scalance M876-3 \(rok\) Firmware Siemens scalance M876-3 Firmware Siemens scalance M876-4 Siemens scalance M876-4 \(eu\) Siemens scalance M876-4 \(eu\) Firmware Siemens scalance M876-4 \(nam\) Siemens scalance M876-4 \(nam\) Firmware Siemens scalance M876-4 Firmware Siemens scalance Mum853-1 \(a1\) Siemens scalance Mum853-1 \(a1\) Firmware Siemens scalance Mum853-1 \(b1\) Siemens scalance Mum853-1 \(b1\) Firmware Siemens scalance Mum853-1 \(eu\) Siemens scalance Mum853-1 \(eu\) Firmware Siemens scalance Mum856-1 \(a1\) Siemens scalance Mum856-1 \(a1\) Firmware Siemens scalance Mum856-1 \(b1\) Siemens scalance Mum856-1 \(b1\) Firmware Siemens scalance Mum856-1 \(cn\) Siemens scalance Mum856-1 \(cn\) Firmware Siemens scalance Mum856-1 \(eu\) Siemens scalance Mum856-1 \(eu\) Firmware Siemens scalance Mum856-1 \(row\) Siemens scalance Mum856-1 \(row\) Firmware Siemens scalance S615 Siemens scalance S615 Eec Siemens scalance S615 Eec Firmware Siemens scalance S615 Firmware |
Tue, 12 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 12 Nov 2024 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2). Affected devices truncates usernames longer than 15 characters when accessed via SSH or Telnet. This could allow an attacker to compromise system integrity. | |
Weaknesses | CWE-20 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2025-02-11T10:28:46.678Z
Reserved: 2024-10-24T11:37:28.687Z
Link: CVE-2024-50560

Updated: 2024-11-12T14:49:57.864Z

Status : Modified
Published: 2024-11-12T13:15:12.913
Modified: 2025-02-11T11:15:13.803
Link: CVE-2024-50560

No data.