Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-31895

CVSS 8.1 · High EPSS 1.16% · P79
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-31895

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability has been identified in RUGGEDCOM i800 (All versions < V4.3.7), RUGGEDCOM i801 (All versions < V4.3.7), RUGGEDCOM i802 (All versions < V4.3.7), RUGGEDCOM i803 (All versions < V4.3.7), RUGGEDCOM M2100 (All versions < V4.3.7), RUGGEDCOM M2200 (All versions < V4.3.7), RUGGEDCOM M969 (All versions < V4.3.7), RUGGEDCOM RMC30 (All versions < V4.3.7), RUGGEDCOM RMC8388 V4.X (All versions < V4.3.7), RUGGEDCOM RMC8388 V5.X (All versions < V5.5.4), RUGGEDCOM RP110 (All versions < V4.3.7), RUGGEDCOM RS1600 (All versions < V4.3.7), RUGGEDCOM RS1600F (All versions < V4.3.7), RUGGEDCOM RS1600T (All versions < V4.3.7), RUGGEDCOM RS400 (All versions < V4.3.7), RUGGEDCOM RS401 (All versions < V4.3.7), RUGGEDCOM RS416 (All versions < V4.3.7), RUGGEDCOM RS416P (All versions < V4.3.7), RUGGEDCOM RS416Pv2 V4.X (All versions < V4.3.7), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.5.4), RUGGEDCOM RS416v2 V4.X (All versions < V4.3.7), RUGGEDCOM RS416v2 V5.X (All versions < 5.5.4), RUGGEDCOM RS8000 (All versions < V4.3.7), RUGGEDCOM RS8000A (All versions < V4.3.7), RUGGEDCOM RS8000H (All versions < V4.3.7), RUGGEDCOM RS8000T (All versions < V4.3.7), RUGGEDCOM RS900 (32M) V4.X (All versions < V4.3.7), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.5.4), RUGGEDCOM RS900G (All versions < V4.3.7), RUGGEDCOM RS900G (32M) V4.X (All versions < V4.3.7), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.5.4), RUGGEDCOM RS900GP (All versions < V4.3.7), RUGGEDCOM RS900L (All versions < V4.3.7), RUGGEDCOM RS900W (All versions < V4.3.7), RUGGEDCOM RS910 (All versions < V4.3.7), RUGGEDCOM RS910L (All versions < V4.3.7), RUGGEDCOM RS910W (All versions < V4.3.7), RUGGEDCOM RS920L (All versions < V4.3.7), RUGGEDCOM RS920W (All versions < V4.3.7), RUGGEDCOM RS930L (All versions < V4.3.7), RUGGEDCOM RS930W (All versions < V4.3.7), RUGGEDCOM RS940G (All versions < V4.3.7), RUGGEDCOM RS969 (All versions < V4.3.7), RUGGEDCOM RSG2100 (All versions < V4.3.7), RUGGEDCOM RSG2100 (32M) V4.X (All versions < V4.3.7), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.5.4), RUGGEDCOM RSG2100P (All versions < V4.3.7), RUGGEDCOM RSG2100P (32M) V4.X (All versions < V4.3.7), RUGGEDCOM RSG2100P (32M) V5.X (All versions < V5.5.4), RUGGEDCOM RSG2200 (All versions < V4.3.7), RUGGEDCOM RSG2288 V4.X (All versions < V4.3.7), RUGGEDCOM RSG2288 V5.X (All versions < V5.5.4), RUGGEDCOM RSG2300 V4.X (All versions < V4.3.7), RUGGEDCOM RSG2300 V5.X (All versions < V5.5.4), RUGGEDCOM RSG2300P V4.X (All versions < V4.3.7), RUGGEDCOM RSG2300P V5.X (All versions < V5.5.4), RUGGEDCOM RSG2488 V4.X (All versions < V4.3.7), RUGGEDCOM RSG2488 V5.X (All versions < V5.5.4), RUGGEDCOM RSG907R (All versions < V5.5.4), RUGGEDCOM RSG908C (All versions < V5.5.4), RUGGEDCOM RSG909R (All versions < V5.5.4), RUGGEDCOM RSG910C (All versions < V5.5.4), RUGGEDCOM RSG920P V4.X (All versions < V4.3.7), RUGGEDCOM RSG920P V5.X (All versions < V5.5.4), RUGGEDCOM RSL910 (All versions < V5.5.4), RUGGEDCOM RST2228 (All versions < V5.5.4), RUGGEDCOM RST2228P (All versions < V5.5.4), RUGGEDCOM RST916C (All versions < V5.5.4), RUGGEDCOM RST916P (All versions < V5.5.4). The DHCP client in affected devices fails to properly sanitize incoming DHCP packets. This could allow an unauthenticated remote attacker to cause memory to be overwritten, potentially allowing remote code execution.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
未进行输入大小检查的缓冲区拷贝(传统缓冲区溢出)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Siemens RUGGEDCOM安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Siemens RUGGEDCOM是德国西门子(Siemens)公司的一个通信设备。为电力,交通,石油和天然气及其他行业提供快速可靠的通信。 Siemens RUGGEDCOM存在安全漏洞,该漏洞源于受影响设备中的 DHCP 客户端无法正确清理传入的 DHCP 数据包。以下产品和版本受到影响:RUGGEDCOM ROS M2100 (All versions < V4.3.7), RUGGEDCOM ROS M2200 (All versions < V4.3.7), RUGGEDCOM ROS M969
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
SiemensRUGGEDCOM i800 All versions < V4.3.7 -
SiemensRUGGEDCOM i801 All versions < V4.3.7 -
SiemensRUGGEDCOM i802 All versions < V4.3.7 -
SiemensRUGGEDCOM i803 All versions < V4.3.7 -
SiemensRUGGEDCOM M2100 All versions < V4.3.7 -
SiemensRUGGEDCOM M2200 All versions < V4.3.7 -
SiemensRUGGEDCOM M969 All versions < V4.3.7 -
SiemensRUGGEDCOM RMC30 All versions < V4.3.7 -
SiemensRUGGEDCOM RMC8388 V4.X All versions < V4.3.7 -
SiemensRUGGEDCOM RMC8388 V5.X 0 ~ V5.5.4 -
SiemensRUGGEDCOM RP110 All versions < V4.3.7 -
SiemensRUGGEDCOM RS1600 0 ~ V4.3.7 -
SiemensRUGGEDCOM RS1600F 0 ~ V4.3.7 -
SiemensRUGGEDCOM RS1600T 0 ~ V4.3.7 -
SiemensRUGGEDCOM RS400 All versions < V4.3.7 -
SiemensRUGGEDCOM RS401 All versions < V4.3.7 -
SiemensRUGGEDCOM RS416 All versions < V4.3.7 -
SiemensRUGGEDCOM RS416P 0 ~ V4.3.7 -
SiemensRUGGEDCOM RS416Pv2 V4.X 0 ~ V4.3.7 -
SiemensRUGGEDCOM RS416Pv2 V5.X 0 ~ V5.5.4 -
SiemensRUGGEDCOM RS416v2 V4.X All versions < V4.3.7 -
SiemensRUGGEDCOM RS416v2 V5.X All versions < 5.5.4 -
SiemensRUGGEDCOM RS8000 All versions < V4.3.7 -
SiemensRUGGEDCOM RS8000A All versions < V4.3.7 -
SiemensRUGGEDCOM RS8000H All versions < V4.3.7 -
SiemensRUGGEDCOM RS8000T All versions < V4.3.7 -
SiemensRUGGEDCOM RS900 (32M) V4.X All versions < V4.3.7 -
SiemensRUGGEDCOM RS900 (32M) V5.X All versions < V5.5.4 -
SiemensRUGGEDCOM RS900G All versions < V4.3.7 -
SiemensRUGGEDCOM RS900G (32M) V4.X All versions < V4.3.7 -
SiemensRUGGEDCOM RS900G (32M) V5.X All versions < V5.5.4 -
SiemensRUGGEDCOM RS900GP All versions < V4.3.7 -
SiemensRUGGEDCOM RS900L All versions < V4.3.7 -
SiemensRUGGEDCOM RS900W All versions < V4.3.7 -
SiemensRUGGEDCOM RS910 All versions < V4.3.7 -
SiemensRUGGEDCOM RS910L All versions < V4.3.7 -
SiemensRUGGEDCOM RS910W All versions < V4.3.7 -
SiemensRUGGEDCOM RS920L All versions < V4.3.7 -
SiemensRUGGEDCOM RS920W All versions < V4.3.7 -
SiemensRUGGEDCOM RS930L All versions < V4.3.7 -
SiemensRUGGEDCOM RS930W All versions < V4.3.7 -
SiemensRUGGEDCOM RS940G All versions < V4.3.7 -
SiemensRUGGEDCOM RS969 All versions < V4.3.7 -
SiemensRUGGEDCOM RSG2100 0 ~ V4.3.7 -
SiemensRUGGEDCOM RSG2100 (32M) V4.X All versions < V4.3.7 -
SiemensRUGGEDCOM RSG2100 (32M) V5.X All versions < V5.5.4 -
SiemensRUGGEDCOM RSG2100P All versions < V4.3.7 -
SiemensRUGGEDCOM RSG2100P (32M) V4.X All versions < V4.3.7 -
SiemensRUGGEDCOM RSG2100P (32M) V5.X All versions < V5.5.4 -
SiemensRUGGEDCOM RSG2200 All versions < V4.3.7 -
SiemensRUGGEDCOM RSG2288 V4.X All versions < V4.3.7 -
SiemensRUGGEDCOM RSG2288 V5.X All versions < V5.5.4 -
SiemensRUGGEDCOM RSG2300 V4.X All versions < V4.3.7 -
SiemensRUGGEDCOM RSG2300 V5.X All versions < V5.5.4 -
SiemensRUGGEDCOM RSG2300P V4.X All versions < V4.3.7 -
SiemensRUGGEDCOM RSG2300P V5.X All versions < V5.5.4 -
SiemensRUGGEDCOM RSG2488 V4.X All versions < V4.3.7 -
SiemensRUGGEDCOM RSG2488 V5.X All versions < V5.5.4 -
SiemensRUGGEDCOM RSG907R 0 ~ V5.5.4 -
SiemensRUGGEDCOM RSG908C 0 ~ V5.5.4 -
SiemensRUGGEDCOM RSG909R 0 ~ V5.5.4 -
SiemensRUGGEDCOM RSG910C 0 ~ V5.5.4 -
SiemensRUGGEDCOM RSG920P V4.X All versions < V4.3.7 -
SiemensRUGGEDCOM RSG920P V5.X All versions < V5.5.4 -
SiemensRUGGEDCOM RSL910 All versions < V5.5.4 -
SiemensRUGGEDCOM RST2228 All versions < V5.5.4 -
SiemensRUGGEDCOM RST2228P 0 ~ V5.5.4 -
SiemensRUGGEDCOM RST916C All versions < V5.5.4 -
SiemensRUGGEDCOM RST916P All versions < V5.5.4 -

II. Public POCs for CVE-2021-31895

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-31895

登录查看更多情报信息。

Same Patch Batch · Siemens · 2021-07-13 · 56 CVEs total

CVE-2020-284007.5 HIGHSiemens SCALANCE S602安全漏洞
CVE-2021-34332Siemens Jt2go 和 Siemens Teamcenter Visualization 安全漏洞
CVE-2021-34320Siemens JT2GO 和 Siemens Teamcenter Visualization 缓冲区错误漏洞
CVE-2021-34327Siemens JT2GO 缓冲区错误漏洞
CVE-2021-34330Siemens Jt2go和Siemens Teamcenter Visualization 输入验证错误漏洞
CVE-2021-34329Siemens JT2GO和Siemens Teamcenter Visualization 缓冲区错误漏洞
CVE-2021-34328Siemens JT2GO 缓冲区错误漏洞
CVE-2021-34331Siemens Jt2go 和 Siemens Teamcenter Visualization 缓冲区错误漏洞
CVE-2021-34319Siemens Jt2go 和 Siemens Teamcenter Visualization 缓冲区错误漏洞
CVE-2021-34318Siemens Jt2go和Siemens Teamcenter Visualization 输入验证错误漏洞
CVE-2021-34317Siemens JT2GO 和 Siemens Teamcenter Visualization 缓冲区错误漏洞
CVE-2021-34316Siemens Jt2go 和 Siemens Teamcenter Visualization 缓冲区错误漏洞
CVE-2021-34315Siemens Jt2go 和 Siemens Teamcenter Visualization 缓冲区错误漏洞
CVE-2021-34314Siemens Jt2go 和 Siemens Teamcenter Visualization 缓冲区错误漏洞
CVE-2021-34313Siemens Jt2go 缓冲区错误漏洞
CVE-2021-34312Siemens JT2GO 和 Siemens Teamcenter Visualization 缓冲区错误漏洞
CVE-2021-34311Siemens Jt2go 和 Siemens Teamcenter Visualization 缓冲区错误漏洞
CVE-2021-34310Siemens Jt2go 和 Siemens Teamcenter Visualization 缓冲区错误漏洞
CVE-2021-34309Siemens Jt2go 和 Siemens Teamcenter Visualization 缓冲区错误漏洞
CVE-2021-34308Siemens JT2GO 缓冲区错误漏洞

Showing top 20 of 56 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2021-31895

No comments yet


Leave a comment