CVE-2021-25667

A vulnerability has been identified in RUGGEDCOM RM1224 (All versions >= V4.3 and < V6.4), SCALANCE M-800 (All versions >= V4.3 and < V6.4), SCALANCE S615 (All versions >= V4.3 and < V6.4), SCALANCE SC-600 Family (All versions >= V2.0 and < V2.1.3), SCALANCE XB-200 (All versions < V4.1), SCALANCE XC-200 (All versions < V4.1), SCALANCE XF-200BA (All versions < V4.1), SCALANCE XM400 (All versions < V6.2), SCALANCE XP-200 (All versions < V4.1), SCALANCE XR-300WG (All versions < V4.1), SCALANCE XR500 (All versions < V6.2). Affected devices contain a stack-based buffer overflow vulnerability in the handling of STP BPDU frames that could allow a remote attacker to trigger a denial-of-service condition or potentially remote code execution. Successful exploitation requires the passive listening feature of the device to be active.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.8 HIGH
ADJACENT_NETWORK
LOW
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
siemensCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 74%
VendorProductVersion
siemensruggedcom_rm1224_firmware
4.3 ≤
𝑥
< 6.4
siemensscalance_m-800_firmware
4.3 ≤
𝑥
< 6.4
siemensscalance_s615_firmware
4.3 ≤
𝑥
< 6.4
siemensscalance_x300wg_firmware
𝑥
< 4.1
siemensscalance_xm400_firmware
𝑥
< 6.2
siemensscalance_xr500_firmware
𝑥
< 6.2
siemensscalance_sc622-2c_firmware
𝑥
≤ 2.0
siemensscalance_sc622-2c_firmware
2.1 ≤
𝑥
< 2.1.3
siemensscalance_sc632-2c_firmware
𝑥
≤ 2.0
siemensscalance_sc632-2c_firmware
2.1 ≤
𝑥
< 2.1.3
siemensscalance_sc636-2c_firmware
𝑥
≤ 2.0
siemensscalance_sc636-2c_firmware
2.1 ≤
𝑥
< 2.1.3
siemensscalance_sc642-2c_firmware
𝑥
≤ 2.0
siemensscalance_sc642-2c_firmware
2.1 ≤
𝑥
< 2.1.3
siemensscalance_sc646-2c_firmware
𝑥
≤ 2.0
siemensscalance_sc646-2c_firmware
2.1 ≤
𝑥
< 2.1.3
siemensscalance_xb-200_firmware
𝑥
< 4.1
siemensscalance_xc-200_firmware
𝑥
< 4.1
siemensscalance_xf-200ba_firmware
𝑥
< 4.1
siemensscalance_xp-200_firmware
𝑥
< 4.1
𝑥
= Vulnerable software versions