A vulnerability has been identified in RUGGEDCOM RM1224 (All versions >= V4.3 and < V6.4), SCALANCE M-800 (All versions >= V4.3 and < V6.4), SCALANCE S615 (All versions >= V4.3 and < V6.4), SCALANCE SC-600 Family (All versions >= V2.0 and < V2.1.3), SCALANCE XB-200 (All versions < V4.1), SCALANCE XC-200 (All versions < V4.1), SCALANCE XF-200BA (All versions < V4.1), SCALANCE XM400 (All versions < V6.2), SCALANCE XP-200 (All versions < V4.1), SCALANCE XR-300WG (All versions < V4.1), SCALANCE XR500 (All versions < V6.2). Affected devices contain a stack-based buffer overflow vulnerability in the handling of STP BPDU frames that could allow a remote attacker to trigger a denial-of-service condition or potentially remote code execution. Successful exploitation requires the passive listening feature of the device to be active.

Project Subscriptions

Vendors Products
Siemens Subscribe
Ruggedcom Rm1224 Subscribe
Ruggedcom Rm1224 Firmware Subscribe
Scalance M-800 Subscribe
Scalance M-800 Firmware Subscribe
Scalance S615 Subscribe
Scalance S615 Firmware Subscribe
Scalance Sc622-2c Subscribe
Scalance Sc622-2c Firmware Subscribe
Scalance Sc632-2c Subscribe
Scalance Sc632-2c Firmware Subscribe
Scalance Sc636-2c Subscribe
Scalance Sc636-2c Firmware Subscribe
Scalance Sc642-2c Subscribe
Scalance Sc642-2c Firmware Subscribe
Scalance Sc646-2c Subscribe
Scalance Sc646-2c Firmware Subscribe
Scalance X300wg Subscribe
Scalance X300wg Firmware Subscribe
Scalance Xb-200 Subscribe
Scalance Xb-200 Firmware Subscribe
Scalance Xc-200 Subscribe
Scalance Xc-200 Firmware Subscribe
Scalance Xf-200ba Subscribe
Scalance Xf-200ba Firmware Subscribe
Scalance Xm400 Subscribe
Scalance Xm400 Firmware Subscribe
Scalance Xp-200 Subscribe
Scalance Xp-200 Firmware Subscribe
Scalance Xr500 Subscribe
Scalance Xr500 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-12559 A vulnerability has been identified in RUGGEDCOM RM1224 (All versions >= V4.3 and < V6.4), SCALANCE M-800 (All versions >= V4.3 and < V6.4), SCALANCE S615 (All versions >= V4.3 and < V6.4), SCALANCE SC-600 Family (All versions >= V2.0 and < V2.1.3), SCALANCE XB-200 (All versions < V4.1), SCALANCE XC-200 (All versions < V4.1), SCALANCE XF-200BA (All versions < V4.1), SCALANCE XM400 (All versions < V6.2), SCALANCE XP-200 (All versions < V4.1), SCALANCE XR-300WG (All versions < V4.1), SCALANCE XR500 (All versions < V6.2). Affected devices contain a stack-based buffer overflow vulnerability in the handling of STP BPDU frames that could allow a remote attacker to trigger a denial-of-service condition or potentially remote code execution. Successful exploitation requires the passive listening feature of the device to be active.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2024-08-03T20:11:27.468Z

Reserved: 2021-01-21T00:00:00

Link: CVE-2021-25667

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-03-15T17:15:21.690

Modified: 2024-11-21T05:55:15.360

Link: CVE-2021-25667

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses