CVE-2024-39675

Description

A vulnerability has been identified in RUGGEDCOM RMC30 (All versions < V4.3.10), RUGGEDCOM RMC30NC (All versions < V4.3.10), RUGGEDCOM RP110 (All versions < V4.3.10), RUGGEDCOM RP110NC (All versions < V4.3.10), RUGGEDCOM RS400 (All versions < V4.3.10), RUGGEDCOM RS400NC (All versions < V4.3.10), RUGGEDCOM RS401 (All versions < V4.3.10), RUGGEDCOM RS401NC (All versions < V4.3.10), RUGGEDCOM RS416 (All versions < V4.3.10), RUGGEDCOM RS416NC (All versions < V4.3.10), RUGGEDCOM RS416NCv2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416NCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416P (All versions < V4.3.10), RUGGEDCOM RS416PNC (All versions < V4.3.10), RUGGEDCOM RS416PNCv2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416PNCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416Pv2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416v2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416v2 V5.X (All versions < V5.9.0), RUGGEDCOM RS910 (All versions < V4.3.10), RUGGEDCOM RS910L (All versions), RUGGEDCOM RS910LNC (All versions), RUGGEDCOM RS910NC (All versions < V4.3.10), RUGGEDCOM RS910W (All versions < V4.3.10), RUGGEDCOM RS920L (All versions), RUGGEDCOM RS920LNC (All versions), RUGGEDCOM RS920W (All versions). In some configurations the affected products wrongly enable the Modbus service in non-managed VLANS. Only serial devices are affected by this vulnerability.

Category

8.7
CVSS
Severity: High
CVSS 4.0 •
CVSS 3.1 •
EPSS 0.07%
Affected: Siemens RUGGEDCOM RMC30
Affected: Siemens RUGGEDCOM RMC30NC
Affected: Siemens RUGGEDCOM RP110
Affected: Siemens RUGGEDCOM RP110NC
Affected: Siemens RUGGEDCOM RS400
Affected: Siemens RUGGEDCOM RS400NC
Affected: Siemens RUGGEDCOM RS401
Affected: Siemens RUGGEDCOM RS401NC
Affected: Siemens RUGGEDCOM RS416
Affected: Siemens RUGGEDCOM RS416NC
Affected: Siemens RUGGEDCOM RS416NCv2 V4.X
Affected: Siemens RUGGEDCOM RS416NCv2 V5.X
Affected: Siemens RUGGEDCOM RS416P
Affected: Siemens RUGGEDCOM RS416PNC
Affected: Siemens RUGGEDCOM RS416PNCv2 V4.X
Affected: Siemens RUGGEDCOM RS416PNCv2 V5.X
Affected: Siemens RUGGEDCOM RS416Pv2 V4.X
Affected: Siemens RUGGEDCOM RS416Pv2 V5.X
Affected: Siemens RUGGEDCOM RS416v2 V4.X
Affected: Siemens RUGGEDCOM RS416v2 V5.X
Affected: Siemens RUGGEDCOM RS910
Affected: Siemens RUGGEDCOM RS910L
Affected: Siemens RUGGEDCOM RS910LNC
Affected: Siemens RUGGEDCOM RS910NC
Affected: Siemens RUGGEDCOM RS910W
Affected: Siemens RUGGEDCOM RS920L
Affected: Siemens RUGGEDCOM RS920LNC
Affected: Siemens RUGGEDCOM RS920W
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-39675?
CVE-2024-39675 has been scored as a high severity vulnerability.
How to fix CVE-2024-39675?
To fix CVE-2024-39675, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2024-39675 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-39675 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-39675?
CVE-2024-39675 affects Siemens RUGGEDCOM RMC30, Siemens RUGGEDCOM RMC30NC, Siemens RUGGEDCOM RP110, Siemens RUGGEDCOM RP110NC, Siemens RUGGEDCOM RS400, Siemens RUGGEDCOM RS400NC, Siemens RUGGEDCOM RS401, Siemens RUGGEDCOM RS401NC, Siemens RUGGEDCOM RS416, Siemens RUGGEDCOM RS416NC, Siemens RUGGEDCOM RS416NCv2 V4.X, Siemens RUGGEDCOM RS416NCv2 V5.X, Siemens RUGGEDCOM RS416P, Siemens RUGGEDCOM RS416PNC, Siemens RUGGEDCOM RS416PNCv2 V4.X, Siemens RUGGEDCOM RS416PNCv2 V5.X, Siemens RUGGEDCOM RS416Pv2 V4.X, Siemens RUGGEDCOM RS416Pv2 V5.X, Siemens RUGGEDCOM RS416v2 V4.X, Siemens RUGGEDCOM RS416v2 V5.X, Siemens RUGGEDCOM RS910, Siemens RUGGEDCOM RS910L, Siemens RUGGEDCOM RS910LNC, Siemens RUGGEDCOM RS910NC, Siemens RUGGEDCOM RS910W, Siemens RUGGEDCOM RS920L, Siemens RUGGEDCOM RS920LNC, Siemens RUGGEDCOM RS920W.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.