A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.0), SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) (All versions < V3.0.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions < V3.0.0), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions < V3.0.0), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (All versions < V3.0.0), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions < V3.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions < V3.0.0), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) (All versions < V3.0.0), SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions < V3.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (All versions < V3.0.0), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions < V3.0.0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) (All versions < V3.0.0). Affected devices can be configured to send emails when certain events occur on the device. When presented with an invalid response from the SMTP server, the device triggers an error that disrupts email sending. An attacker with access to the network can use this to do disable notification of users when certain events occur.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Siemens
Subscribe
|
6ag1206-2bb00-7ac2
Subscribe
6ag1206-2bb00-7ac2 Firmware
Subscribe
6ag1206-2bs00-7ac2
Subscribe
6ag1206-2bs00-7ac2 Firmware
Subscribe
6ag1208-0ba00-7ac2
Subscribe
6ag1208-0ba00-7ac2 Firmware
Subscribe
6ag1216-4bs00-7ac2
Subscribe
6ag1216-4bs00-7ac2 Firmware
Subscribe
6gk5204-0ba00-2gf2
Subscribe
6gk5204-0ba00-2gf2 Firmware
Subscribe
6gk5204-0ba00-2yf2
Subscribe
6gk5204-0ba00-2yf2 Firmware
Subscribe
6gk5204-2aa00-2gf2
Subscribe
6gk5204-2aa00-2gf2 Firmware
Subscribe
6gk5204-2aa00-2yf2
Subscribe
6gk5204-2aa00-2yf2 Firmware
Subscribe
6gk5205-3bb00-2ab2
Subscribe
6gk5205-3bb00-2ab2 Firmware
Subscribe
6gk5205-3bb00-2tb2
Subscribe
6gk5205-3bb00-2tb2 Firmware
Subscribe
6gk5205-3bd00-2ab2
Subscribe
6gk5205-3bd00-2ab2 Firmware
Subscribe
6gk5205-3bd00-2tb2
Subscribe
6gk5205-3bd00-2tb2 Firmware
Subscribe
6gk5205-3bf00-2ab2
Subscribe
6gk5205-3bf00-2ab2 Firmware
Subscribe
6gk5205-3bf00-2tb2
Subscribe
6gk5205-3bf00-2tb2 Firmware
Subscribe
6gk5206-2bb00-2ac2
Subscribe
6gk5206-2bb00-2ac2 Firmware
Subscribe
6gk5206-2bd00-2ac2
Subscribe
6gk5206-2bd00-2ac2 Firmware
Subscribe
6gk5206-2bs00-2ac2
Subscribe
6gk5206-2bs00-2ac2 Firmware
Subscribe
6gk5206-2bs00-2fc2
Subscribe
6gk5206-2bs00-2fc2 Firmware
Subscribe
6gk5206-2gs00-2ac2
Subscribe
6gk5206-2gs00-2ac2 Firmware
Subscribe
6gk5206-2gs00-2fc2
Subscribe
6gk5206-2gs00-2fc2 Firmware
Subscribe
6gk5206-2gs00-2tc2
Subscribe
6gk5206-2gs00-2tc2 Firmware
Subscribe
6gk5206-2rs00-2ac2
Subscribe
6gk5206-2rs00-2ac2 Firmware
Subscribe
6gk5206-2rs00-5ac2
Subscribe
6gk5206-2rs00-5ac2 Firmware
Subscribe
6gk5206-2rs00-5fc2
Subscribe
6gk5206-2rs00-5fc2 Firmware
Subscribe
6gk5208-0ba00-2ab2
Subscribe
6gk5208-0ba00-2ab2 Firmware
Subscribe
6gk5208-0ba00-2ac2
Subscribe
6gk5208-0ba00-2ac2 Firmware
Subscribe
6gk5208-0ba00-2fc2
Subscribe
6gk5208-0ba00-2fc2 Firmware
Subscribe
6gk5208-0ba00-2tb2
Subscribe
6gk5208-0ba00-2tb2 Firmware
Subscribe
6gk5208-0ga00-2ac2
Subscribe
6gk5208-0ga00-2ac2 Firmware
Subscribe
6gk5208-0ga00-2fc2
Subscribe
6gk5208-0ga00-2fc2 Firmware
Subscribe
6gk5208-0ga00-2tc2
Subscribe
6gk5208-0ga00-2tc2 Firmware
Subscribe
6gk5208-0ha00-2as6
Subscribe
6gk5208-0ha00-2as6 Firmware
Subscribe
6gk5208-0ha00-2es6
Subscribe
6gk5208-0ha00-2es6 Firmware
Subscribe
6gk5208-0ha00-2ts6
Subscribe
6gk5208-0ha00-2ts6 Firmware
Subscribe
6gk5208-0ra00-2ac2
Subscribe
6gk5208-0ra00-2ac2 Firmware
Subscribe
6gk5208-0ra00-5ac2
Subscribe
6gk5208-0ra00-5ac2 Firmware
Subscribe
6gk5208-0ua00-5es6
Subscribe
6gk5208-0ua00-5es6 Firmware
Subscribe
6gk5213-3bb00-2ab2
Subscribe
6gk5213-3bb00-2ab2 Firmware
Subscribe
6gk5213-3bb00-2tb2
Subscribe
6gk5213-3bb00-2tb2 Firmware
Subscribe
6gk5213-3bd00-2ab2
Subscribe
6gk5213-3bd00-2ab2 Firmware
Subscribe
6gk5213-3bd00-2tb2
Subscribe
6gk5213-3bd00-2tb2 Firmware
Subscribe
6gk5213-3bf00-2ab2
Subscribe
6gk5213-3bf00-2ab2 Firmware
Subscribe
6gk5213-3bf00-2tb2
Subscribe
6gk5213-3bf00-2tb2 Firmware
Subscribe
6gk5216-0ba00-2ab2
Subscribe
6gk5216-0ba00-2ab2 Firmware
Subscribe
6gk5216-0ba00-2ac2
Subscribe
6gk5216-0ba00-2ac2 Firmware
Subscribe
6gk5216-0ba00-2fc2
Subscribe
6gk5216-0ba00-2fc2 Firmware
Subscribe
6gk5216-0ba00-2tb2
Subscribe
6gk5216-0ba00-2tb2 Firmware
Subscribe
6gk5216-0ha00-2as6
Subscribe
6gk5216-0ha00-2as6 Firmware
Subscribe
6gk5216-0ha00-2es6
Subscribe
6gk5216-0ha00-2es6 Firmware
Subscribe
6gk5216-0ha00-2ts6
Subscribe
6gk5216-0ha00-2ts6 Firmware
Subscribe
6gk5216-0ua00-5es6
Subscribe
6gk5216-0ua00-5es6 Firmware
Subscribe
6gk5216-3rs00-2ac2
Subscribe
6gk5216-3rs00-2ac2 Firmware
Subscribe
6gk5216-3rs00-5ac2
Subscribe
6gk5216-3rs00-5ac2 Firmware
Subscribe
6gk5216-4bs00-2ac2
Subscribe
6gk5216-4bs00-2ac2 Firmware
Subscribe
6gk5216-4gs00-2ac2
Subscribe
6gk5216-4gs00-2ac2 Firmware
Subscribe
6gk5216-4gs00-2fc2
Subscribe
6gk5216-4gs00-2fc2 Firmware
Subscribe
6gk5216-4gs00-2tc2
Subscribe
6gk5216-4gs00-2tc2 Firmware
Subscribe
6gk5224-0ba00-2ac2
Subscribe
6gk5224-0ba00-2ac2 Firmware
Subscribe
6gk5224-4gs00-2ac2
Subscribe
6gk5224-4gs00-2ac2 Firmware
Subscribe
6gk5224-4gs00-2fc2
Subscribe
6gk5224-4gs00-2fc2 Firmware
Subscribe
6gk5224-4gs00-2tc2
Subscribe
6gk5224-4gs00-2tc2 Firmware
Subscribe
6gk5324-0ba00-2ar3
Subscribe
6gk5324-0ba00-2ar3 Firmware
Subscribe
6gk5324-0ba00-3ar3
Subscribe
6gk5324-0ba00-3ar3 Firmware
Subscribe
6gk5326-2qs00-3ar3
Subscribe
6gk5326-2qs00-3ar3 Firmware
Subscribe
6gk5326-2qs00-3rr3
Subscribe
6gk5326-2qs00-3rr3 Firmware
Subscribe
6gk5328-4fs00-2ar3
Subscribe
6gk5328-4fs00-2ar3 Firmware
Subscribe
6gk5328-4fs00-2rr3
Subscribe
6gk5328-4fs00-2rr3 Firmware
Subscribe
6gk5328-4fs00-3ar3
Subscribe
6gk5328-4fs00-3ar3 Firmware
Subscribe
6gk5328-4fs00-3rr3
Subscribe
6gk5328-4fs00-3rr3 Firmware
Subscribe
6gk5328-4ss00-2ar3
Subscribe
6gk5328-4ss00-2ar3 Firmware
Subscribe
6gk5328-4ss00-3ar3
Subscribe
6gk5328-4ss00-3ar3 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-48676 | A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.0), SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) (All versions < V3.0.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions < V3.0.0), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions < V3.0.0), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (All versions < V3.0.0), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions < V3.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions < V3.0.0), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) (All versions < V3.0.0), SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions < V3.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (All versions < V3.0.0), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions < V3.0.0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) (All versions < V3.0.0). Affected devices can be configured to send emails when certain events occur on the device. When presented with an invalid response from the SMTP server, the device triggers an error that disrupts email sending. An attacker with access to the network can use this to do disable notification of users when certain events occur. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 11 Feb 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.0). Affected devices can be configured to send emails when certain events occur on the device. When presented with an invalid response from the SMTP server, the device triggers an error that disrupts email sending. An attacker with access to the network can use this to do disable notification of users when certain events occur. | A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.0), SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) (All versions < V3.0.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions < V3.0.0), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions < V3.0.0), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (All versions < V3.0.0), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions < V3.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions < V3.0.0), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) (All versions < V3.0.0), SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions < V3.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (All versions < V3.0.0), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions < V3.0.0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) (All versions < V3.0.0). Affected devices can be configured to send emails when certain events occur on the device. When presented with an invalid response from the SMTP server, the device triggers an error that disrupts email sending. An attacker with access to the network can use this to do disable notification of users when certain events occur. |
| References |
|
Tue, 13 Aug 2024 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Affected devices can be configured to send emails when certain events occur on the device. When presented with an invalid response from the SMTP server, the device triggers an error that disrupts email sending. An attacker with access to the network can use this to do disable notification of users when certain events occur. | A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.0). Affected devices can be configured to send emails when certain events occur on the device. When presented with an invalid response from the SMTP server, the device triggers an error that disrupts email sending. An attacker with access to the network can use this to do disable notification of users when certain events occur. |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2025-02-11T10:28:31.825Z
Reserved: 2023-09-28T16:24:50.190Z
Link: CVE-2023-44322
No data.
Status : Modified
Published: 2023-11-14T11:15:13.187
Modified: 2025-02-11T11:15:12.010
Link: CVE-2023-44322
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD