A vulnerability has been identified in SCALANCE XM408-4C (All versions < V6.5), SCALANCE XM408-4C (L3 int.) (All versions < V6.5), SCALANCE XM408-8C (All versions < V6.5), SCALANCE XM408-8C (L3 int.) (All versions < V6.5), SCALANCE XM416-4C (All versions < V6.5), SCALANCE XM416-4C (L3 int.) (All versions < V6.5), SCALANCE XR524-8C, 1x230V (All versions < V6.5), SCALANCE XR524-8C, 1x230V (L3 int.) (All versions < V6.5), SCALANCE XR524-8C, 24V (All versions < V6.5), SCALANCE XR524-8C, 24V (L3 int.) (All versions < V6.5), SCALANCE XR524-8C, 2x230V (All versions < V6.5), SCALANCE XR524-8C, 2x230V (L3 int.) (All versions < V6.5), SCALANCE XR526-8C, 1x230V (All versions < V6.5), SCALANCE XR526-8C, 1x230V (L3 int.) (All versions < V6.5), SCALANCE XR526-8C, 24V (All versions < V6.5), SCALANCE XR526-8C, 24V (L3 int.) (All versions < V6.5), SCALANCE XR526-8C, 2x230V (All versions < V6.5), SCALANCE XR526-8C, 2x230V (L3 int.) (All versions < V6.5), SCALANCE XR528-6M (All versions < V6.5), SCALANCE XR528-6M (2HR2) (All versions < V6.5), SCALANCE XR528-6M (2HR2, L3 int.) (All versions < V6.5), SCALANCE XR528-6M (L3 int.) (All versions < V6.5), SCALANCE XR552-12M (All versions < V6.5), SCALANCE XR552-12M (2HR2) (All versions < V6.5), SCALANCE XR552-12M (2HR2) (All versions < V6.5), SCALANCE XR552-12M (2HR2, L3 int.) (All versions < V6.5). The OSPF protocol implementation in affected devices fails to verify the checksum and length fields in the OSPF LS Update messages. An unauthenticated remote attacker could exploit this vulnerability to cause interruptions in the network by sending specially crafted OSPF packets. Successful exploitation requires OSPF to be enabled on an affected device.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Siemens
Subscribe
|
Scalance Xm408-4c
Subscribe
Scalance Xm408-4c Firmware
Subscribe
Scalance Xm408-4c L3
Subscribe
Scalance Xm408-4c L3 Firmware
Subscribe
Scalance Xm408-8c
Subscribe
Scalance Xm408-8c Firmware
Subscribe
Scalance Xm408-8c L3
Subscribe
Scalance Xm408-8c L3 Firmware
Subscribe
Scalance Xm416-4c
Subscribe
Scalance Xm416-4c Firmware
Subscribe
Scalance Xm416-4c L3
Subscribe
Scalance Xm416-4c L3 Firmware
Subscribe
Scalance Xr524-8c
Subscribe
Scalance Xr524-8c Firmware
Subscribe
Scalance Xr524-8c L3
Subscribe
Scalance Xr524-8c L3 Firmware
Subscribe
Scalance Xr526-8c
Subscribe
Scalance Xr526-8c Firmware
Subscribe
Scalance Xr526-8c L3
Subscribe
Scalance Xr526-8c L3 Firmware
Subscribe
Scalance Xr528-6m
Subscribe
Scalance Xr528-6m 2hr2
Subscribe
Scalance Xr528-6m 2hr2 Firmware
Subscribe
Scalance Xr528-6m 2hr2 L3
Subscribe
Scalance Xr528-6m 2hr2 L3 Firmware
Subscribe
Scalance Xr528-6m Firmware
Subscribe
Scalance Xr528-6m L3
Subscribe
Scalance Xr528-6m L3 Firmware
Subscribe
Scalance Xr552-12m
Subscribe
Scalance Xr552-12m 2hr2
Subscribe
Scalance Xr552-12m 2hr2 Firmware
Subscribe
Scalance Xr552-12m 2hr2 L3
Subscribe
Scalance Xr552-12m 2hr2 L3 Firmware
Subscribe
Scalance Xr552-12m Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-23756 | A vulnerability has been identified in SCALANCE XM408-4C (All versions < V6.5), SCALANCE XM408-4C (L3 int.) (All versions < V6.5), SCALANCE XM408-8C (All versions < V6.5), SCALANCE XM408-8C (L3 int.) (All versions < V6.5), SCALANCE XM416-4C (All versions < V6.5), SCALANCE XM416-4C (L3 int.) (All versions < V6.5), SCALANCE XR524-8C, 1x230V (All versions < V6.5), SCALANCE XR524-8C, 1x230V (L3 int.) (All versions < V6.5), SCALANCE XR524-8C, 24V (All versions < V6.5), SCALANCE XR524-8C, 24V (L3 int.) (All versions < V6.5), SCALANCE XR524-8C, 2x230V (All versions < V6.5), SCALANCE XR524-8C, 2x230V (L3 int.) (All versions < V6.5), SCALANCE XR526-8C, 1x230V (All versions < V6.5), SCALANCE XR526-8C, 1x230V (L3 int.) (All versions < V6.5), SCALANCE XR526-8C, 24V (All versions < V6.5), SCALANCE XR526-8C, 24V (L3 int.) (All versions < V6.5), SCALANCE XR526-8C, 2x230V (All versions < V6.5), SCALANCE XR526-8C, 2x230V (L3 int.) (All versions < V6.5), SCALANCE XR528-6M (All versions < V6.5), SCALANCE XR528-6M (2HR2) (All versions < V6.5), SCALANCE XR528-6M (2HR2, L3 int.) (All versions < V6.5), SCALANCE XR528-6M (L3 int.) (All versions < V6.5), SCALANCE XR552-12M (All versions < V6.5), SCALANCE XR552-12M (2HR2) (All versions < V6.5), SCALANCE XR552-12M (2HR2) (All versions < V6.5), SCALANCE XR552-12M (2HR2, L3 int.) (All versions < V6.5). The OSPF protocol implementation in affected devices fails to verify the checksum and length fields in the OSPF LS Update messages. An unauthenticated remote attacker could exploit this vulnerability to cause interruptions in the network by sending specially crafted OSPF packets. Successful exploitation requires OSPF to be enabled on an affected device. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2024-08-04T01:16:03.731Z
Reserved: 2021-07-21T00:00:00
Link: CVE-2021-37182
No data.
Status : Modified
Published: 2022-06-14T10:15:17.747
Modified: 2024-11-21T06:14:48.583
Link: CVE-2021-37182
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD