A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.16.0), RUGGEDCOM ROX MX5000RE (All versions < V2.16.0), RUGGEDCOM ROX RX1400 (All versions < V2.16.0), RUGGEDCOM ROX RX1500 (All versions < V2.16.0), RUGGEDCOM ROX RX1501 (All versions < V2.16.0), RUGGEDCOM ROX RX1510 (All versions < V2.16.0), RUGGEDCOM ROX RX1511 (All versions < V2.16.0), RUGGEDCOM ROX RX1512 (All versions < V2.16.0), RUGGEDCOM ROX RX1524 (All versions < V2.16.0), RUGGEDCOM ROX RX1536 (All versions < V2.16.0), RUGGEDCOM ROX RX5000 (All versions < V2.16.0). The software-upgrade Url parameter in the web interface of affected devices is vulnerable to command injection due to missing server side input sanitation. This could allow an authenticated privileged remote attacker to execute arbitrary code with root privileges.

Project Subscriptions

Vendors Products
Siemens Subscribe
Ruggedcom Rox Mx5000 Subscribe
Ruggedcom Rox Mx5000 Firmware Subscribe
Ruggedcom Rox Mx5000re Subscribe
Ruggedcom Rox Mx5000re Firmware Subscribe
Ruggedcom Rox Rx1400 Subscribe
Ruggedcom Rox Rx1400 Firmware Subscribe
Ruggedcom Rox Rx1500 Subscribe
Ruggedcom Rox Rx1500 Firmware Subscribe
Ruggedcom Rox Rx1501 Subscribe
Ruggedcom Rox Rx1501 Firmware Subscribe
Ruggedcom Rox Rx1510 Subscribe
Ruggedcom Rox Rx1510 Firmware Subscribe
Ruggedcom Rox Rx1511 Subscribe
Ruggedcom Rox Rx1511 Firmware Subscribe
Ruggedcom Rox Rx1512 Subscribe
Ruggedcom Rox Rx1512 Firmware Subscribe
Ruggedcom Rox Rx1524 Subscribe
Ruggedcom Rox Rx1524 Firmware Subscribe
Ruggedcom Rox Rx1536 Subscribe
Ruggedcom Rox Rx1536 Firmware Subscribe
Ruggedcom Rox Rx5000 Subscribe
Ruggedcom Rox Rx5000 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-40693 A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.16.0), RUGGEDCOM ROX MX5000RE (All versions < V2.16.0), RUGGEDCOM ROX RX1400 (All versions < V2.16.0), RUGGEDCOM ROX RX1500 (All versions < V2.16.0), RUGGEDCOM ROX RX1501 (All versions < V2.16.0), RUGGEDCOM ROX RX1510 (All versions < V2.16.0), RUGGEDCOM ROX RX1511 (All versions < V2.16.0), RUGGEDCOM ROX RX1512 (All versions < V2.16.0), RUGGEDCOM ROX RX1524 (All versions < V2.16.0), RUGGEDCOM ROX RX1536 (All versions < V2.16.0), RUGGEDCOM ROX RX5000 (All versions < V2.16.0). The software-upgrade Url parameter in the web interface of affected devices is vulnerable to command injection due to missing server side input sanitation. This could allow an authenticated privileged remote attacker to execute arbitrary code with root privileges.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 26 Nov 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2024-11-26T18:40:24.816Z

Reserved: 2023-06-27T11:37:08.703Z

Link: CVE-2023-36750

cve-icon Vulnrichment

Updated: 2024-08-02T16:52:54.252Z

cve-icon NVD

Status : Modified

Published: 2023-07-11T10:15:11.170

Modified: 2024-11-21T08:10:30.900

Link: CVE-2023-36750

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses