Product:

Scalance_s615_firmware

(Siemens)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 24
Date Id Summary Products Score Patch Annotated
2018-09-06 CVE-2018-5391 The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size. Ubuntu_linux, Debian_linux, Big\-Ip_access_policy_manager, Big\-Ip_advanced_firewall_manager, Big\-Ip_analytics, Big\-Ip_application_acceleration_manager, Big\-Ip_application_security_manager, Big\-Ip_domain_name_system, Big\-Ip_edge_gateway, Big\-Ip_fraud_protection_service, Big\-Ip_global_traffic_manager, Big\-Ip_link_controller, Big\-Ip_local_traffic_manager, Big\-Ip_policy_enforcement_manager, Big\-Ip_webaccelerator, Linux_kernel, Windows_10, Windows_7, Windows_8\.1, Windows_rt_8\.1, Windows_server_2008, Windows_server_2012, Windows_server_2016, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation, Ruggedcom_rm1224_firmware, Ruggedcom_rox_ii_firmware, Scalance_m\-800_firmware, Scalance_s615_firmware, Scalance_sc\-600_firmware, Scalance_w1700_ieee_802\.11ac_firmware, Scalance_w700_ieee_802\.11a\/b\/g\/n_firmware, Simatic_net_cp_1242\-7_firmware, Simatic_net_cp_1243\-1_firmware, Simatic_net_cp_1243\-7_lte_eu_firmware, Simatic_net_cp_1243\-7_lte_us_firmware, Simatic_net_cp_1243\-8_irc_firmware, Simatic_net_cp_1542sp\-1_firmware, Simatic_net_cp_1542sp\-1_irc_firmware, Simatic_net_cp_1543\-1_firmware, Simatic_net_cp_1543sp\-1_firmware, Simatic_rf185c_firmware, Simatic_rf186c_firmware, Simatic_rf186ci_firmware, Simatic_rf188_firmware, Simatic_rf188ci_firmware, Sinema_remote_connect_server_firmware 7.5
2022-10-11 CVE-2022-31766 A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (All versions < V7.1.2), RUGGEDCOM RM1224 LTE(4G) NAM (All versions < V7.1.2), SCALANCE M804PB (All versions < V7.1.2), SCALANCE M812-1 ADSL-Router (Annex A) (All versions < V7.1.2), SCALANCE M812-1 ADSL-Router (Annex B) (All versions < V7.1.2), SCALANCE M816-1 ADSL-Router (Annex A) (All versions < V7.1.2), SCALANCE M816-1 ADSL-Router (Annex B) (All versions < V7.1.2), SCALANCE M826-2 SHDSL-Router (All versions < V7.1.2),... Ruggedcom_rm1224_firmware, Scalance_m804pb_firmware, Scalance_m812\-1_firmware, Scalance_m816\-1_firmware, Scalance_m826\-2_firmware, Scalance_m874\-2_firmware, Scalance_m874\-3_firmware, Scalance_m876\-3_firmware, Scalance_m876\-4_firmware, Scalance_mum853\-1_firmware, Scalance_mum856\-1_firmware, Scalance_s615_firmware, Scalance_wam763\-1_firmware, Scalance_wam766\-1_firmware, Scalance_wum763\-1_firmware, Scalance_wum766\-1_firmware 8.6
2022-08-10 CVE-2022-36325 Affected devices do not properly sanitize data introduced by an user when rendering the web interface. This could allow an authenticated remote attacker with administrative privileges to inject code and lead to a DOM-based XSS. Scalance_m\-800_firmware, Scalance_s615_firmware, Scalance_sc622\-2c_firmware, Scalance_sc632\-2c_firmware, Scalance_sc636\-2c_firmware, Scalance_sc642\-2c_firmware, Scalance_sc646\-2c_firmware, Scalance_sc\-600_firmware, Scalance_w700_ieee_802\.11ac_firmware, Scalance_w700_ieee_802\.11ax_firmware, Scalance_w700_ieee_802\.11n_firmware, Scalance_xb205\-3_firmware, Scalance_xb205\-3ld_firmware, Scalance_xb208_firmware, Scalance_xb213\-3_firmware, Scalance_xb213\-3ld_firmware, Scalance_xb216_firmware, Scalance_xb\-200_firmware, Scalance_xc206\-2_firmware, Scalance_xc206\-2g_poe__firmware, Scalance_xc206\-2g_poe_eec_firmware, Scalance_xc206\-2sfp_eec_firmware, Scalance_xc206\-2sfp_g_\(E\/ip\)_firmware, Scalance_xc206\-2sfp_g_eec_firmware, Scalance_xc206\-2sfp_g_firmware, Scalance_xc208_firmware, Scalance_xc208eec_firmware, Scalance_xc208g_\(E\/ip\)_firmware, Scalance_xc208g_eec_firmware, Scalance_xc208g_firmware, Scalance_xc208g_poe_firmware, Scalance_xc216\-4c_firmware, Scalance_xc216\-4c_g_\(E\/ip\)_firmware, Scalance_xc216\-4c_g_eec_firmware, Scalance_xc216\-4c_g_firmware, Scalance_xc216_firmware, Scalance_xc216eec_firmware, Scalance_xc224\-4c_g_\(E\/ip\)_firmware, Scalance_xc224\-4c_g__firmware, Scalance_xc224\-4c_g_eec_firmware, Scalance_xc224__firmware, Scalance_xc\-200_firmware, Scalance_xf204\-2ba_dna_firmware, Scalance_xf204\-2ba_irt_firmware, Scalance_xf\-200ba_firmware, Scalance_xm400_firmware, Scalance_xm408\-4c_firmware, Scalance_xm408\-4c_l3_firmware, Scalance_xm408\-8c_firmware, Scalance_xm408\-8c_l3_firmware, Scalance_xm416\-4c_firmware, Scalance_xm416\-4c_l3_firmware, Scalance_xp208_\(Eip\)_firmware, Scalance_xp208_firmware, Scalance_xp208eec_firmware, Scalance_xp208poe_eec_firmware, Scalance_xp216_\(Eip\)_firmware, Scalance_xp216_firmware, Scalance_xp216eec_firmware, Scalance_xp216poe_eec_firmware, Scalance_xp\-200_firmware, Scalance_xr324\-12m_firmware, Scalance_xr324\-12m_ts_firmware, Scalance_xr324\-4m_eec_firmware, Scalance_xr324\-4m_poe_firmware, Scalance_xr324\-4m_poe_ts_firmware, Scalance_xr324wg_firmware, Scalance_xr326\-2c_poe_wg_firmware, Scalance_xr328\-4c_wg_firmware, Scalance_xr500_firmware, Scalance_xr524\-8c_firmware, Scalance_xr524\-8c_l3_firmware, Scalance_xr524_firmware, Scalance_xr526\-8c_firmware, Scalance_xr526\-8c_l3_firmware, Scalance_xr526_firmware, Scalance_xr528\-6m_2hr2_firmware, Scalance_xr528\-6m_2hr2_l3_firmware, Scalance_xr528\-6m_firmware, Scalance_xr528\-6m_l3_firmware, Scalance_xr528_firmware, Scalance_xr552\-12_firmware, Scalance_xr552\-12m_2hr2_firmware, Scalance_xr552\-12m_2hr2_l3_firmware, Scalance_xr552\-12m_firmware, Scalance_xr552_firmware, Scalance_xr\-300_firmware, Scalance_xr\-300eec_firmware, Scalance_xr\-300poe_firmware, Scalance_xr\-300wg_firmware 4.8
2022-08-10 CVE-2022-36323 Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. Scalance_m\-800_firmware, Scalance_s615_firmware, Scalance_sc622\-2c_firmware, Scalance_sc632\-2c_firmware, Scalance_sc636\-2c_firmware, Scalance_sc642\-2c_firmware, Scalance_sc646\-2c_firmware, Scalance_sc\-600_firmware, Scalance_w700_ieee_802\.11ac_firmware, Scalance_w700_ieee_802\.11ax_firmware, Scalance_w700_ieee_802\.11n_firmware, Scalance_xb205\-3_firmware, Scalance_xb205\-3ld_firmware, Scalance_xb208_firmware, Scalance_xb213\-3_firmware, Scalance_xb213\-3ld_firmware, Scalance_xb216_firmware, Scalance_xb\-200_firmware, Scalance_xc206\-2_firmware, Scalance_xc206\-2g_poe__firmware, Scalance_xc206\-2g_poe_eec_firmware, Scalance_xc206\-2sfp_eec_firmware, Scalance_xc206\-2sfp_g_\(E\/ip\)_firmware, Scalance_xc206\-2sfp_g_eec_firmware, Scalance_xc206\-2sfp_g_firmware, Scalance_xc208_firmware, Scalance_xc208eec_firmware, Scalance_xc208g_\(E\/ip\)_firmware, Scalance_xc208g_eec_firmware, Scalance_xc208g_firmware, Scalance_xc208g_poe_firmware, Scalance_xc216\-4c_firmware, Scalance_xc216\-4c_g_\(E\/ip\)_firmware, Scalance_xc216\-4c_g_eec_firmware, Scalance_xc216\-4c_g_firmware, Scalance_xc216_firmware, Scalance_xc216eec_firmware, Scalance_xc224\-4c_g_\(E\/ip\)_firmware, Scalance_xc224\-4c_g__firmware, Scalance_xc224\-4c_g_eec_firmware, Scalance_xc224__firmware, Scalance_xc\-200_firmware, Scalance_xf204\-2ba_dna_firmware, Scalance_xf204\-2ba_irt_firmware, Scalance_xf\-200ba_firmware, Scalance_xm400_firmware, Scalance_xm408\-4c_firmware, Scalance_xm408\-4c_l3_firmware, Scalance_xm408\-8c_firmware, Scalance_xm408\-8c_l3_firmware, Scalance_xm416\-4c_firmware, Scalance_xm416\-4c_l3_firmware, Scalance_xp208_\(Eip\)_firmware, Scalance_xp208_firmware, Scalance_xp208eec_firmware, Scalance_xp208poe_eec_firmware, Scalance_xp216_\(Eip\)_firmware, Scalance_xp216_firmware, Scalance_xp216eec_firmware, Scalance_xp216poe_eec_firmware, Scalance_xp\-200_firmware, Scalance_xr324\-12m_firmware, Scalance_xr324\-12m_ts_firmware, Scalance_xr324\-4m_eec_firmware, Scalance_xr324\-4m_poe_firmware, Scalance_xr324\-4m_poe_ts_firmware, Scalance_xr324wg_firmware, Scalance_xr326\-2c_poe_wg_firmware, Scalance_xr328\-4c_wg_firmware, Scalance_xr500_firmware, Scalance_xr524\-8c_firmware, Scalance_xr524\-8c_l3_firmware, Scalance_xr524_firmware, Scalance_xr526\-8c_firmware, Scalance_xr526\-8c_l3_firmware, Scalance_xr526_firmware, Scalance_xr528\-6m_2hr2_firmware, Scalance_xr528\-6m_2hr2_l3_firmware, Scalance_xr528\-6m_firmware, Scalance_xr528\-6m_l3_firmware, Scalance_xr528_firmware, Scalance_xr552\-12_firmware, Scalance_xr552\-12m_2hr2_firmware, Scalance_xr552\-12m_2hr2_l3_firmware, Scalance_xr552\-12m_firmware, Scalance_xr552_firmware, Scalance_xr\-300_firmware, Scalance_xr\-300eec_firmware, Scalance_xr\-300poe_firmware, Scalance_xr\-300wg_firmware 9.1
2022-12-13 CVE-2022-46140 Affected devices use a weak encryption scheme to encrypt the debug zip file. This could allow an authenticated attacker to decrypt the contents of the file and retrieve debug information about the system. Ruggedcom_rm1224_lte\(4g\)_eu_firmware, Ruggedcom_rm1224_lte\(4g\)_nam_firmware, Scalance_m804pb_firmware, Scalance_m812\-1_adsl\-Router_firmware, Scalance_m816\-1_adsl\-Router_firmware, Scalance_m826\-2_shdsl\-Router_firmware, Scalance_m874\-2_firmware, Scalance_m874\-3_firmware, Scalance_m876\-3_firmware, Scalance_m876\-4_firmware, Scalance_mum853\-1_firmware, Scalance_mum856\-1_firmware, Scalance_s615_eec_firmware, Scalance_s615_firmware, Scalance_sc622\-2c_firmware, Scalance_sc626\-2c_firmware, Scalance_sc632\-2c_firmware, Scalance_sc636\-2c_firmware, Scalance_sc642\-2c_firmware, Scalance_sc646\-2c_firmware, Scalance_w1748\-1_m12_firmware, Scalance_w1788\-1_m12_firmware, Scalance_w1788\-2_eec_m12_firmware, Scalance_w1788\-2_m12_firmware, Scalance_w1788\-2ia_m12_firmware, Scalance_w721\-1_rj45_firmware, Scalance_w722\-1_rj45_firmware, Scalance_w734\-1_rj45_firmware, Scalance_w738\-1_m12_firmware, Scalance_w748\-1_m12_firmware, Scalance_w761\-1_rj45_firmware, Scalance_w774\-1_m12_eec_firmware, Scalance_w774\-1_m12_rj45_firmware, Scalance_w774\-1_rj45_firmware, Scalance_w778\-1_m12_eec_firmware, Scalance_w778\-1_m12_firmware, Scalance_w786\-1_rj45_firmware, Scalance_w786\-2_rj45_firmware, Scalance_w786\-2_sfp_firmware, Scalance_w786\-2ia_rj45_firmware, Scalance_w788\-1_m12_firmware, Scalance_w788\-1_rj45_firmware, Scalance_w788\-2_m12_eec_firmware, Scalance_w788\-2_m12_firmware, Scalance_wam763\-1_firmware, Scalance_wam766\-1_6ghz_firmware, Scalance_wam766\-1_ecc_firmware, Scalance_wam766\-1_firmware, Scalance_wum763\-1_firmware, Scalance_wum766\-1_6ghz_firmware, Scalance_wum766\-1_firmware, Scalance_xb205\-3_firmware, Scalance_xb205\-3ld_firmware, Scalance_xb208_firmware, Scalance_xb213\-3_firmware, Scalance_xb213\-3ld_firmware, Scalance_xb216_firmware, Scalance_xc206\-2_firmware, Scalance_xc206\-2g_poe_eec_firmware, Scalance_xc206\-2g_poe_firmware, Scalance_xc206\-2sfp_eec_firmware, Scalance_xc206\-2sfp_firmware, Scalance_xc206\-2sfp_g_eec_firmware, Scalance_xc206\-2sfp_g_firmware, Scalance_xc208_eec_firmware, Scalance_xc208_firmware, Scalance_xc208_poe_firmware, Scalance_xc216\-3g_poe_firmware, Scalance_xc216\-4c_firmware, Scalance_xc216\-4c_g_eec_firmware, Scalance_xc216\-4c_g_firmware, Scalance_xc216_firmware, Scalance_xc216eec_firmware, Scalance_xc224\-4c_g_eec_firmware, Scalance_xc224\-4c_g_firmware, Scalance_xc224_firmware, Scalance_xf204\-2ba_firmware, Scalance_xf204\-2bca_dna_firmware, Scalance_xf204_dna_firmware, Scalance_xf204_firmware, Scalance_xm408\-4c_firmware, Scalance_xm408\-8c_firmware, Scalance_xm416\-4c_firmware, Scalance_xp208_firmware, Scalance_xp208eec_firmware, Scalance_xp208poe_eec_firmware, Scalance_xp216_firmware, Scalance_xp216eec_firmware, Scalance_xp216poe_eec_firmware, Scalance_xr324wg_firmware, Scalance_xr326\-2c_firmware, Scalance_xr326\-2c_poe_firmware, Scalance_xr328\-4c_wg_firmware, Scalance_xr524\-8c_firmware, Scalance_xr526\-8c_firmware, Scalance_xr528\-6m_firmware, Scalance_xr552\-12m_firmware, Siplus_net_scalance_xc206\-2_firmware, Siplus_net_scalance_xc206\-2sfp_firmware, Siplus_net_scalance_xc208_firmware, Siplus_net_scalance_xc216\-4c_firmware 6.5
2022-12-13 CVE-2022-46142 Affected devices store the CLI user passwords encrypted in flash memory. Attackers with physical access to the device could retrieve the file and decrypt the CLI user passwords. Ruggedcom_rm1224_lte\(4g\)_eu_firmware, Ruggedcom_rm1224_lte\(4g\)_nam_firmware, Scalance_m804pb_firmware, Scalance_m812\-1_adsl\-Router_firmware, Scalance_m816\-1_adsl\-Router_firmware, Scalance_m826\-2_shdsl\-Router_firmware, Scalance_m874\-2_firmware, Scalance_m874\-3_firmware, Scalance_m876\-3_firmware, Scalance_m876\-4_firmware, Scalance_mum853\-1_firmware, Scalance_mum856\-1_firmware, Scalance_s615_eec_firmware, Scalance_s615_firmware, Scalance_sc622\-2c_firmware, Scalance_sc626\-2c_firmware, Scalance_sc632\-2c_firmware, Scalance_sc636\-2c_firmware, Scalance_sc642\-2c_firmware, Scalance_sc646\-2c_firmware, Scalance_w1748\-1_m12_firmware, Scalance_w1788\-1_m12_firmware, Scalance_w1788\-2_eec_m12_firmware, Scalance_w1788\-2_m12_firmware, Scalance_w1788\-2ia_m12_firmware, Scalance_w721\-1_rj45_firmware, Scalance_w722\-1_rj45_firmware, Scalance_w734\-1_rj45_firmware, Scalance_w738\-1_m12_firmware, Scalance_w748\-1_m12_firmware, Scalance_w761\-1_rj45_firmware, Scalance_w774\-1_m12_eec_firmware, Scalance_w774\-1_m12_rj45_firmware, Scalance_w774\-1_rj45_firmware, Scalance_w778\-1_m12_eec_firmware, Scalance_w778\-1_m12_firmware, Scalance_w786\-1_rj45_firmware, Scalance_w786\-2_rj45_firmware, Scalance_w786\-2_sfp_firmware, Scalance_w786\-2ia_rj45_firmware, Scalance_w788\-1_m12_firmware, Scalance_w788\-1_rj45_firmware, Scalance_w788\-2_m12_eec_firmware, Scalance_w788\-2_m12_firmware, Scalance_wam763\-1_firmware, Scalance_wam766\-1_6ghz_firmware, Scalance_wam766\-1_ecc_firmware, Scalance_wam766\-1_firmware, Scalance_wum763\-1_firmware, Scalance_wum766\-1_6ghz_firmware, Scalance_wum766\-1_firmware, Scalance_xb205\-3_firmware, Scalance_xb205\-3ld_firmware, Scalance_xb208_firmware, Scalance_xb213\-3_firmware, Scalance_xb213\-3ld_firmware, Scalance_xb216_firmware, Scalance_xc206\-2_firmware, Scalance_xc206\-2g_poe_eec_firmware, Scalance_xc206\-2g_poe_firmware, Scalance_xc206\-2sfp_eec_firmware, Scalance_xc206\-2sfp_firmware, Scalance_xc206\-2sfp_g_eec_firmware, Scalance_xc206\-2sfp_g_firmware, Scalance_xc208_eec_firmware, Scalance_xc208_firmware, Scalance_xc208_poe_firmware, Scalance_xc216\-3g_poe_firmware, Scalance_xc216\-4c_firmware, Scalance_xc216\-4c_g_eec_firmware, Scalance_xc216\-4c_g_firmware, Scalance_xc216_firmware, Scalance_xc216eec_firmware, Scalance_xc224\-4c_g_eec_firmware, Scalance_xc224\-4c_g_firmware, Scalance_xc224_firmware, Scalance_xf204\-2ba_firmware, Scalance_xf204\-2bca_dna_firmware, Scalance_xf204_dna_firmware, Scalance_xf204_firmware, Scalance_xm408\-4c_firmware, Scalance_xm408\-8c_firmware, Scalance_xm416\-4c_firmware, Scalance_xp208_firmware, Scalance_xp208eec_firmware, Scalance_xp208poe_eec_firmware, Scalance_xp216_firmware, Scalance_xp216eec_firmware, Scalance_xp216poe_eec_firmware, Scalance_xr324wg_firmware, Scalance_xr326\-2c_firmware, Scalance_xr326\-2c_poe_firmware, Scalance_xr328\-4c_wg_firmware, Scalance_xr524\-8c_firmware, Scalance_xr526\-8c_firmware, Scalance_xr528\-6m_firmware, Scalance_xr552\-12m_firmware, Siplus_net_scalance_xc206\-2_firmware, Siplus_net_scalance_xc206\-2sfp_firmware, Siplus_net_scalance_xc208_firmware, Siplus_net_scalance_xc216\-4c_firmware 5.7
2022-08-10 CVE-2022-36324 Affected devices do not properly handle the renegotiation of SSL/TLS parameters. This could allow an unauthenticated remote attacker to bypass the TCP brute force prevention and lead to a denial of service condition for the duration of the attack. Scalance_m\-800_firmware, Scalance_s615_firmware, Scalance_w700_ieee_802\.11ac_firmware, Scalance_w700_ieee_802\.11ax_firmware, Scalance_w700_ieee_802\.11n_firmware, Scalance_xb205\-3_firmware, Scalance_xb205\-3ld_firmware, Scalance_xb208_firmware, Scalance_xb213\-3_firmware, Scalance_xb213\-3ld_firmware, Scalance_xb216_firmware, Scalance_xb\-200_firmware, Scalance_xc206\-2_firmware, Scalance_xc206\-2g_poe__firmware, Scalance_xc206\-2g_poe_eec_firmware, Scalance_xc206\-2sfp_eec_firmware, Scalance_xc206\-2sfp_g_\(E\/ip\)_firmware, Scalance_xc206\-2sfp_g_eec_firmware, Scalance_xc206\-2sfp_g_firmware, Scalance_xc208_firmware, Scalance_xc208eec_firmware, Scalance_xc208g_\(E\/ip\)_firmware, Scalance_xc208g_eec_firmware, Scalance_xc208g_firmware, Scalance_xc208g_poe_firmware, Scalance_xc216\-4c_firmware, Scalance_xc216\-4c_g_\(E\/ip\)_firmware, Scalance_xc216\-4c_g_eec_firmware, Scalance_xc216\-4c_g_firmware, Scalance_xc216_firmware, Scalance_xc216eec_firmware, Scalance_xc224\-4c_g_\(E\/ip\)_firmware, Scalance_xc224\-4c_g__firmware, Scalance_xc224\-4c_g_eec_firmware, Scalance_xc224__firmware, Scalance_xc\-200_firmware, Scalance_xf204\-2ba_dna_firmware, Scalance_xf204\-2ba_irt_firmware, Scalance_xf\-200ba_firmware, Scalance_xm400_firmware, Scalance_xm408\-4c_firmware, Scalance_xm408\-4c_l3_firmware, Scalance_xm408\-8c_firmware, Scalance_xm408\-8c_l3_firmware, Scalance_xm416\-4c_firmware, Scalance_xm416\-4c_l3_firmware, Scalance_xp208_\(Eip\)_firmware, Scalance_xp208_firmware, Scalance_xp208eec_firmware, Scalance_xp208poe_eec_firmware, Scalance_xp216_\(Eip\)_firmware, Scalance_xp216_firmware, Scalance_xp216eec_firmware, Scalance_xp216poe_eec_firmware, Scalance_xp\-200_firmware, Scalance_xr324\-12m_firmware, Scalance_xr324\-12m_ts_firmware, Scalance_xr324\-4m_eec_firmware, Scalance_xr324\-4m_poe_firmware, Scalance_xr324\-4m_poe_ts_firmware, Scalance_xr324wg_firmware, Scalance_xr326\-2c_poe_wg_firmware, Scalance_xr328\-4c_wg_firmware, Scalance_xr500_firmware, Scalance_xr524\-8c_firmware, Scalance_xr524\-8c_l3_firmware, Scalance_xr524_firmware, Scalance_xr526\-8c_firmware, Scalance_xr526\-8c_l3_firmware, Scalance_xr526_firmware, Scalance_xr528\-6m_2hr2_firmware, Scalance_xr528\-6m_2hr2_l3_firmware, Scalance_xr528\-6m_firmware, Scalance_xr528\-6m_l3_firmware, Scalance_xr528_firmware, Scalance_xr552\-12_firmware, Scalance_xr552\-12m_2hr2_firmware, Scalance_xr552\-12m_2hr2_l3_firmware, Scalance_xr552\-12m_firmware, Scalance_xr552_firmware, Scalance_xr\-300_firmware, Scalance_xr\-300eec_firmware, Scalance_xr\-300poe_firmware, Scalance_xr\-300wg_firmware 7.5
2021-03-15 CVE-2021-25667 A vulnerability has been identified in RUGGEDCOM RM1224 (All versions >= V4.3 and < V6.4), SCALANCE M-800 (All versions >= V4.3 and < V6.4), SCALANCE S615 (All versions >= V4.3 and < V6.4), SCALANCE SC-600 Family (All versions >= V2.0 and < V2.1.3), SCALANCE XB-200 (All versions < V4.1), SCALANCE XC-200 (All versions < V4.1), SCALANCE XF-200BA (All versions < V4.1), SCALANCE XM400 (All versions < V6.2), SCALANCE XP-200 (All versions < V4.1), SCALANCE XR-300WG (All versions < V4.1), SCALANCE... Ruggedcom_rm1224_firmware, Scalance_m\-800_firmware, Scalance_s615_firmware, Scalance_sc622\-2c_firmware, Scalance_sc632\-2c_firmware, Scalance_sc636\-2c_firmware, Scalance_sc642\-2c_firmware, Scalance_sc646\-2c_firmware, Scalance_x300wg_firmware, Scalance_xb\-200_firmware, Scalance_xc\-200_firmware, Scalance_xf\-200ba_firmware, Scalance_xm400_firmware, Scalance_xp\-200_firmware, Scalance_xr500_firmware 8.8
2021-03-15 CVE-2021-25676 A vulnerability has been identified in RUGGEDCOM RM1224 (V6.3), SCALANCE M-800 (V6.3), SCALANCE S615 (V6.3), SCALANCE SC-600 (All Versions >= V2.1 and < V2.1.3). Multiple failed SSH authentication attempts could trigger a temporary Denial-of-Service under certain conditions. When triggered, the device will reboot automatically. Ruggedcom_rm1224_firmware, Scalance_m\-800_firmware, Scalance_s615_firmware, Scalance_sc\-600_firmware 7.5
2016-09-29 CVE-2016-7090 The integrated web server on Siemens SCALANCE M-800 and S615 modules with firmware before 4.02 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. Scalance_m\-800_firmware, Scalance_s615_firmware 4.0