A vulnerability has been identified in SCALANCE XM408-4C (All versions < V6.5), SCALANCE XM408-4C (L3 int.) (All versions < V6.5), SCALANCE XM408-8C (All versions < V6.5), SCALANCE XM408-8C (L3 int.) (All versions < V6.5), SCALANCE XM416-4C (All versions < V6.5), SCALANCE XM416-4C (L3 int.) (All versions < V6.5), SCALANCE XR524-8C, 1x230V (All versions < V6.5), SCALANCE XR524-8C, 1x230V (L3 int.) (All versions < V6.5), SCALANCE XR524-8C, 24V (All versions < V6.5), SCALANCE XR524-8C, 24V (L3 int.) (All versions < V6.5), SCALANCE XR524-8C, 2x230V (All versions < V6.5), SCALANCE XR524-8C, 2x230V (L3 int.) (All versions < V6.5), SCALANCE XR526-8C, 1x230V (All versions < V6.5), SCALANCE XR526-8C, 1x230V (L3 int.) (All versions < V6.5), SCALANCE XR526-8C, 24V (All versions < V6.5), SCALANCE XR526-8C, 24V (L3 int.) (All versions < V6.5), SCALANCE XR526-8C, 2x230V (All versions < V6.5), SCALANCE XR526-8C, 2x230V (L3 int.) (All versions < V6.5), SCALANCE XR528-6M (All versions < V6.5), SCALANCE XR528-6M (2HR2) (All versions < V6.5), SCALANCE XR528-6M (2HR2, L3 int.) (All versions < V6.5), SCALANCE XR528-6M (L3 int.) (All versions < V6.5), SCALANCE XR552-12M (All versions < V6.5), SCALANCE XR552-12M (2HR2) (All versions < V6.5), SCALANCE XR552-12M (2HR2) (All versions < V6.5), SCALANCE XR552-12M (2HR2, L3 int.) (All versions < V6.5). The OSPF protocol implementation in affected devices fails to verify the checksum and length fields in the OSPF LS Update messages. An unauthenticated remote attacker could exploit this vulnerability to cause interruptions in the network by sending specially crafted OSPF packets. Successful exploitation requires OSPF to be enabled on an affected device.

Project Subscriptions

Vendors Products
Siemens Subscribe
Scalance Xm408-4c Subscribe
Scalance Xm408-4c Firmware Subscribe
Scalance Xm408-4c L3 Subscribe
Scalance Xm408-4c L3 Firmware Subscribe
Scalance Xm408-8c Subscribe
Scalance Xm408-8c Firmware Subscribe
Scalance Xm408-8c L3 Subscribe
Scalance Xm408-8c L3 Firmware Subscribe
Scalance Xm416-4c Subscribe
Scalance Xm416-4c Firmware Subscribe
Scalance Xm416-4c L3 Subscribe
Scalance Xm416-4c L3 Firmware Subscribe
Scalance Xr524-8c Subscribe
Scalance Xr524-8c Firmware Subscribe
Scalance Xr524-8c L3 Subscribe
Scalance Xr524-8c L3 Firmware Subscribe
Scalance Xr526-8c Subscribe
Scalance Xr526-8c Firmware Subscribe
Scalance Xr526-8c L3 Subscribe
Scalance Xr526-8c L3 Firmware Subscribe
Scalance Xr528-6m Subscribe
Scalance Xr528-6m 2hr2 Subscribe
Scalance Xr528-6m 2hr2 Firmware Subscribe
Scalance Xr528-6m 2hr2 L3 Subscribe
Scalance Xr528-6m 2hr2 L3 Firmware Subscribe
Scalance Xr528-6m Firmware Subscribe
Scalance Xr528-6m L3 Subscribe
Scalance Xr528-6m L3 Firmware Subscribe
Scalance Xr552-12m Subscribe
Scalance Xr552-12m 2hr2 Subscribe
Scalance Xr552-12m 2hr2 Firmware Subscribe
Scalance Xr552-12m 2hr2 L3 Subscribe
Scalance Xr552-12m 2hr2 L3 Firmware Subscribe
Scalance Xr552-12m Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-23756 A vulnerability has been identified in SCALANCE XM408-4C (All versions < V6.5), SCALANCE XM408-4C (L3 int.) (All versions < V6.5), SCALANCE XM408-8C (All versions < V6.5), SCALANCE XM408-8C (L3 int.) (All versions < V6.5), SCALANCE XM416-4C (All versions < V6.5), SCALANCE XM416-4C (L3 int.) (All versions < V6.5), SCALANCE XR524-8C, 1x230V (All versions < V6.5), SCALANCE XR524-8C, 1x230V (L3 int.) (All versions < V6.5), SCALANCE XR524-8C, 24V (All versions < V6.5), SCALANCE XR524-8C, 24V (L3 int.) (All versions < V6.5), SCALANCE XR524-8C, 2x230V (All versions < V6.5), SCALANCE XR524-8C, 2x230V (L3 int.) (All versions < V6.5), SCALANCE XR526-8C, 1x230V (All versions < V6.5), SCALANCE XR526-8C, 1x230V (L3 int.) (All versions < V6.5), SCALANCE XR526-8C, 24V (All versions < V6.5), SCALANCE XR526-8C, 24V (L3 int.) (All versions < V6.5), SCALANCE XR526-8C, 2x230V (All versions < V6.5), SCALANCE XR526-8C, 2x230V (L3 int.) (All versions < V6.5), SCALANCE XR528-6M (All versions < V6.5), SCALANCE XR528-6M (2HR2) (All versions < V6.5), SCALANCE XR528-6M (2HR2, L3 int.) (All versions < V6.5), SCALANCE XR528-6M (L3 int.) (All versions < V6.5), SCALANCE XR552-12M (All versions < V6.5), SCALANCE XR552-12M (2HR2) (All versions < V6.5), SCALANCE XR552-12M (2HR2) (All versions < V6.5), SCALANCE XR552-12M (2HR2, L3 int.) (All versions < V6.5). The OSPF protocol implementation in affected devices fails to verify the checksum and length fields in the OSPF LS Update messages. An unauthenticated remote attacker could exploit this vulnerability to cause interruptions in the network by sending specially crafted OSPF packets. Successful exploitation requires OSPF to be enabled on an affected device.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2024-08-04T01:16:03.731Z

Reserved: 2021-07-21T00:00:00

Link: CVE-2021-37182

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-06-14T10:15:17.747

Modified: 2024-11-21T06:14:48.583

Link: CVE-2021-37182

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses