CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
45.0%
A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.16.0), RUGGEDCOM ROX MX5000RE (All versions < V2.16.0), RUGGEDCOM ROX RX1400 (All versions < V2.16.0), RUGGEDCOM ROX RX1500 (All versions < V2.16.0), RUGGEDCOM ROX RX1501 (All versions < V2.16.0), RUGGEDCOM ROX RX1510 (All versions < V2.16.0), RUGGEDCOM ROX RX1511 (All versions < V2.16.0), RUGGEDCOM ROX RX1512 (All versions < V2.16.0), RUGGEDCOM ROX RX1524 (All versions < V2.16.0), RUGGEDCOM ROX RX1536 (All versions < V2.16.0), RUGGEDCOM ROX RX5000 (All versions < V2.16.0). The webserver of the affected devices support insecure TLS 1.0 protocol. An attacker could achieve a man-in-the-middle attack and compromise confidentiality and integrity of data.
Vendor | Product | Version | CPE |
---|---|---|---|
siemens | ruggedcom_rox_mx5000_firmware | * | cpe:2.3:o:siemens:ruggedcom_rox_mx5000_firmware:*:*:*:*:*:*:*:* |
siemens | ruggedcom_rox_mx5000 | - | cpe:2.3:h:siemens:ruggedcom_rox_mx5000:-:*:*:*:*:*:*:* |
siemens | ruggedcom_rox_mx5000re_firmware | * | cpe:2.3:o:siemens:ruggedcom_rox_mx5000re_firmware:*:*:*:*:*:*:*:* |
siemens | ruggedcom_rox_mx5000re | - | cpe:2.3:h:siemens:ruggedcom_rox_mx5000re:-:*:*:*:*:*:*:* |
siemens | ruggedcom_rox_rx1400_firmware | * | cpe:2.3:o:siemens:ruggedcom_rox_rx1400_firmware:*:*:*:*:*:*:*:* |
siemens | ruggedcom_rox_rx1400 | - | cpe:2.3:h:siemens:ruggedcom_rox_rx1400:-:*:*:*:*:*:*:* |
siemens | ruggedcom_rox_rx1500_firmware | * | cpe:2.3:o:siemens:ruggedcom_rox_rx1500_firmware:*:*:*:*:*:*:*:* |
siemens | ruggedcom_rox_rx1500 | - | cpe:2.3:h:siemens:ruggedcom_rox_rx1500:-:*:*:*:*:*:*:* |
siemens | ruggedcom_rox_rx1501_firmware | * | cpe:2.3:o:siemens:ruggedcom_rox_rx1501_firmware:*:*:*:*:*:*:*:* |
siemens | ruggedcom_rox_rx1501 | - | cpe:2.3:h:siemens:ruggedcom_rox_rx1501:-:*:*:*:*:*:*:* |
[
{
"vendor": "Siemens",
"product": "RUGGEDCOM ROX MX5000",
"versions": [
{
"version": "All versions < V2.16.0",
"status": "affected"
}
],
"defaultStatus": "unknown"
},
{
"vendor": "Siemens",
"product": "RUGGEDCOM ROX MX5000RE",
"versions": [
{
"version": "All versions < V2.16.0",
"status": "affected"
}
],
"defaultStatus": "unknown"
},
{
"vendor": "Siemens",
"product": "RUGGEDCOM ROX RX1400",
"versions": [
{
"version": "All versions < V2.16.0",
"status": "affected"
}
],
"defaultStatus": "unknown"
},
{
"vendor": "Siemens",
"product": "RUGGEDCOM ROX RX1500",
"versions": [
{
"version": "All versions < V2.16.0",
"status": "affected"
}
],
"defaultStatus": "unknown"
},
{
"vendor": "Siemens",
"product": "RUGGEDCOM ROX RX1501",
"versions": [
{
"version": "All versions < V2.16.0",
"status": "affected"
}
],
"defaultStatus": "unknown"
},
{
"vendor": "Siemens",
"product": "RUGGEDCOM ROX RX1510",
"versions": [
{
"version": "All versions < V2.16.0",
"status": "affected"
}
],
"defaultStatus": "unknown"
},
{
"vendor": "Siemens",
"product": "RUGGEDCOM ROX RX1511",
"versions": [
{
"version": "All versions < V2.16.0",
"status": "affected"
}
],
"defaultStatus": "unknown"
},
{
"vendor": "Siemens",
"product": "RUGGEDCOM ROX RX1512",
"versions": [
{
"version": "All versions < V2.16.0",
"status": "affected"
}
],
"defaultStatus": "unknown"
},
{
"vendor": "Siemens",
"product": "RUGGEDCOM ROX RX1524",
"versions": [
{
"version": "All versions < V2.16.0",
"status": "affected"
}
],
"defaultStatus": "unknown"
},
{
"vendor": "Siemens",
"product": "RUGGEDCOM ROX RX1536",
"versions": [
{
"version": "All versions < V2.16.0",
"status": "affected"
}
],
"defaultStatus": "unknown"
},
{
"vendor": "Siemens",
"product": "RUGGEDCOM ROX RX5000",
"versions": [
{
"version": "All versions < V2.16.0",
"status": "affected"
}
],
"defaultStatus": "unknown"
}
]
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
45.0%