nist-gov/nvd.nist.gov/vuln/detail/CVE-2022-39158
2025-03-07 17:19:30 +00:00

1747 lines
94 KiB
Text
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<!DOCTYPE html>
<html lang="en">
<head>
<title>NVD - CVE-2022-39158</title>
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
<meta http-equiv="content-style-type" content="text/css" />
<meta http-equiv="content-script-type" content="text/javascript" />
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
<link href="/site-scripts/font-awesome/css/font-awesome.min.css"
type="text/css" rel="stylesheet" />
<link href="/site-media/bootstrap/css/bootstrap.min.css"
type="text/css" rel="stylesheet" />
<link href="/site-media/bootstrap/css/bootstrap-theme.min.css"
type="text/css" rel="stylesheet" />
<link
href="/site-scripts/eonasdan-bootstrap-datetimepicker/build/css/bootstrap-datetimepicker.min.css"
type="text/css" rel="stylesheet" />
<link href="/site-media/css/nist-fonts.css" type="text/css"
rel="stylesheet" />
<link href="/site-media/css/base-style.css" type="text/css"
rel="stylesheet" />
<link href="/site-media/css/media-resize.css" type="text/css"
rel="stylesheet" />
<meta name="theme-color" content="#000000">
<script src="/site-scripts/jquery/dist/jquery.min.js"
type="text/javascript"></script>
<script src="/site-scripts/jquery-visible/jquery.visible.min.js"
type="text/javascript"></script>
<script src="/site-scripts/underscore/underscore-min.js"
type="text/javascript"></script>
<script src="/site-media/bootstrap/js/bootstrap.js"
type="text/javascript"></script>
<script src="/site-scripts/moment/min/moment.min.js"
type="text/javascript"></script>
<script
src="/site-scripts/eonasdan-bootstrap-datetimepicker/build/js/bootstrap-datetimepicker.min.js"
type="text/javascript"></script>
<script src="/site-media/js/megamenu.js" type="text/javascript"></script>
<script src="/site-media/js/nist-exit-script.js"
type="text/javascript"></script>
<script src="/site-media/js/forms.js" type="text/javascript"></script>
<script
src="/site-media/js/federated-analytics.all.min.js?agency=NIST&amp;subagency=nvd&amp;pua=UA-37115410-41&amp;yt=true"
type="text/javascript" id="_fed_an_js_tag"></script>
<!-- Google tag (gtag.js) -->
<script async src="https://www.googletagmanager.com/gtag/js?id=G-4KKFZP12LQ"></script>
<script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-4KKFZP12LQ'); </script>
<style id="antiClickjack">
body>* {
display: none !important;
}
#antiClickjack {
display: block !important;
}
</style>
<noscript>
<style id="antiClickjackNoScript">
body>* {
display: block !important;
}
#antiClickjack {
display: none !important;
}
</style>
</noscript>
<script type="text/javascript" id="antiClickjackScript">
if (self === top) {
// no clickjacking
var antiClickjack = document.getElementById("antiClickjack");
antiClickjack.parentNode.removeChild(antiClickjack);
} else {
setTimeout(tryForward(), 5000);
}
function tryForward() {
top.location = self.location;
}
</script>
<meta charset="UTF-8">
<link href="/site-media/css/nvd-style.css" type="text/css"
rel="stylesheet" />
<link href="/site-media/images/favicons/apple-touch-icon.png"
rel="apple-touch-icon" type="image/png" sizes="180x180" />
<link href="/site-media/images/favicons/favicon-32x32.png"
rel="icon" type="image/png" sizes="32x32" />
<link href="/site-media/images/favicons/favicon-16x16.png"
rel="icon" type="image/png" sizes="16x16" />
<link href="/site-media/images/favicons/manifest.json"
rel="manifest" />
<link href="/site-media/images/favicons/safari-pinned-tab.svg"
rel="mask-icon" color="#000000" />
<link href="/site-media/images/favicons/favicon.ico"
rel="shortcut icon" />
<meta name="msapplication-config" content="/site-media/images/favicons/browserconfig.xml" />
<link href="/site-media/images/favicons/favicon.ico"
rel="shortcut icon" type="image/x-icon" />
<link href="/site-media/images/favicons/favicon.ico" rel="icon"
type="image/x-icon" />
<meta charset="UTF-8">
<script src="/site-media/js/vulnerability/vulnDetail.js"
type="text/javascript"></script>
<script src="/site-media/js/vulnerability/cvssVulnDetail.js"
type="text/javascript"></script>
</head>
<body>
<header role="banner" title="Site Banner">
<div id="antiClickjack" style="display: none">
<h1>You are viewing this page in an unauthorized frame window.</h1>
<p>
This is a potential security issue, you are being redirected to
<a href="https://nvd.nist.gov">https://nvd.nist.gov</a>
</p>
</div>
<div>
<section class="usa-banner" aria-label="Official government website">
<div class="usa-accordion container">
<header class="usa-banner__header">
<noscript>
<p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p>
</noscript>
<img class="usa-banner__header-flag"
src="/site-media/images/usbanner/us_flag_small.png" alt="U.S. flag">
&nbsp;
<span class="usa-banner__header-text">An official website of the United States government</span>
<button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="false" aria-controls="gov-banner">
<span class="usa-banner__button-text">Here's how you know</span>
</button>
</header>
<div class="usa-banner__content usa-accordion__content collapse" role="tabpanel" id="gov-banner" aria-expanded="true">
<div class="row">
<div class="col-md-5 col-sm-12">
<div class="row">
<div class="col-sm-2 col-xs-3">
<img class="usa-banner__icon usa-media-block__img"
src="/site-media/images/usbanner/icon-dot-gov.svg" alt="Dot gov">
</div>
<div class="col-sm-10 col-xs-9">
<p>
<strong>Official websites use .gov</strong>
<br>
A <strong>.gov</strong> website belongs to an official government organization in the United States.
</p>
</div>
</div>
</div>
<div class="col-md-5 col-sm-12">
<div class="row">
<div class="col-sm-2 col-xs-3">
<img class="usa-banner__icon usa-media-block__img"
src="/site-media/images/usbanner/icon-https.svg" alt="Https">
</div>
<div class="col-sm-10 col-xs-9">
<p>
<strong>Secure .gov websites use HTTPS</strong>
<br>
A <strong>lock</strong> (<img class="usa-banner__lock"
src="/site-media/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.
</p>
</div>
</div>
</div>
</div>
</div>
</div>
</section>
</div>
<div>
<div>
<nav id="navbar" class="navbar">
<div id="nist-menu-container" class="container">
<div class="row">
<!-- Brand -->
<div class="col-xs-6 col-md-4 navbar-header"
style="height:104px">
<a class="navbar-brand"
href="https://www.nist.gov"
target="_blank" rel="noopener noreferrer"
id="navbar-brand-image"
style="padding-top: 36px">
<img alt="National Institute of Standards and Technology"
src="/site-media/images/nist/nist-logo.svg"
width="110" height="30">
</a>
</div>
<div class="col-xs-6 col-md-8 navbar-nist-logo">
<span id="nvd-menu-button" class="pull-right" style="margin-top: 26px"> <a href="#">
<span class="fa fa-bars"></span> <span id="nvd-menu-full-text"><span
class="hidden-xxs">NVD </span>MENU</span>
</a>
</span>
</div>
</div>
</div>
<div class="main-menu-row container">
<!-- Collect the nav links, forms, and other content for toggling -->
<div id="main-menu-drop" class="col-lg-12" style="display: none;">
<ul>
<li><a href="/general"> General <span
class="expander fa fa-plus" id="nvd-header-menu-general"
data-expander-name="general" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="general">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/general/nvd-dashboard">NVD Dashboard</a>
</p>
<p>
<a href="https://www.nist.gov/itl/nvd">News and Status Updates</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/general/faq">FAQ</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/general/visualizations">Visualizations</a>
</p>
<p>
<a href="/general/legal-disclaimer">Legal Disclaimer</a>
</p>
</div>
</div>
</div></li>
<li><a href="/vuln"> Vulnerabilities <span
class="expander fa fa-plus"
id="nvd-header-menu-vulnerabilities"
data-expander-name="vulnerabilities" data-expanded="false">
<span class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="vulnerabilities">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/vuln/search">Search &amp; Statistics</a>
</p>
<p>
<a href="/vuln/categories">Weakness Types</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/vuln/data-feeds">Legacy Data Feeds</a>
</p>
<p>
<a href="/vuln/vendor-comments">Vendor Comments</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/vuln/cvmap">CVMAP</a>
</p>
</div>
</div>
</div></li>
<li><a href="/vuln-metrics/cvss#"> Vulnerability Metrics <span
class="expander fa fa-plus" id="nvd-header-menu-metrics"
data-expander-name="metrics" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="metrics">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/vuln-metrics/cvss/v4-calculator">CVSS v4.0
Calculators</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/vuln-metrics/cvss/v3-calculator">CVSS v3.x
Calculators</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/vuln-metrics/cvss/v2-calculator">CVSS v2.0
Calculator</a>
</p>
</div>
</div>
</div></li>
<li><a href="/products"> Products <span
class="expander fa fa-plus" id="nvd-header-menu-products"
data-expander-name="products" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="products">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/products/cpe">CPE Dictionary</a>
</p>
<p>
<a href="/products/cpe/search">CPE Search</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/products/cpe/statistics">CPE Statistics</a>
</p>
<p>
<a href="/products/swid">SWID</a>
</p>
</div>
<div class="col-lg-4"></div>
</div>
</div></li>
<li>
<a href="/developers">Developers<span
class="expander fa fa-plus" id="nvd-header-menu-developers"
data-expander-name="developers" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="developers">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/developers/start-here">Start Here</a>
</p>
<p>
<a href="/developers/request-an-api-key">Request an API Key</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/developers/vulnerabilities">Vulnerabilities</a>
</p>
<p>
<a href="/developers/products">Products</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/developers/data-sources">Data Sources</a>
</p>
<p>
<a href="/developers/terms-of-use">Terms of Use</a>
</p>
</div>
</div>
</div>
</li>
<li><a href="/contact"> Contact NVD </a></li>
<li><a href="/other"> Other Sites <span
class="expander fa fa-plus" id="nvd-header-menu-othersites"
data-expander-name="otherSites" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="otherSites">
<div class="row">
<div class="col-lg-4">
<p>
<a href="https://ncp.nist.gov">Checklist (NCP) Repository</a>
</p>
<p>
<a href="https://ncp.nist.gov/cce">Configurations (CCE)</a>
</p>
<p>
<a href="https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search">800-53 Controls</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a
href="https://csrc.nist.gov/projects/scap-validation-program">SCAP
Validated Tools</a>
</p>
<p>
<a
href="https://csrc.nist.gov/projects/security-content-automation-protocol">SCAP</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a
href="https://csrc.nist.gov/projects/united-states-government-configuration-baseline">USGCB</a>
</p>
</div>
</div>
</div></li>
<li><a href="/search"> Search <span
class="expander fa fa-plus" id="nvd-header-menu-search"
data-expander-name="search" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="search">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/vuln/search">Vulnerability Search</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/products/cpe/search">CPE Search</a>
</p>
</div>
</div>
</div></li>
</ul>
</div>
<!-- /#mobile-nav-container -->
</div>
</nav>
<section id="itl-header" class="has-menu">
<div class="container">
<div class="row">
<div class="col-sm-12 col-md-8">
<h2 class="hidden-xs hidden-sm">
<a href="https://www.nist.gov/itl" target="_blank" rel="noopener noreferrer">Information Technology Laboratory</a>
</h2>
<h1 class="hidden-xs hidden-sm">
<a id="nvd-header-link"
href="/">National Vulnerability Database</a>
</h1>
<h1 class="hidden-xs text-center hidden-md hidden-lg"
>National Vulnerability Database</h1>
<h1 class="hidden-sm hidden-md hidden-lg text-center"
>NVD</h1>
</div>
<div class="col-sm-12 col-md-4">
<a style="width: 100%; text-align: center; display: block;padding-top: 14px">
<img id="img-logo-nvd-lg"
alt="National Vulnerability Database"
src="/site-media/images/F_NIST-Logo-NVD-white.svg"
width="500" height="100">
</a>
</div>
</div>
</div>
</section>
</div>
</div>
</header>
<main>
<div>
<div id="body-section" class="container">
<div class="row">
<ol class="breadcrumb">
<li><a href="/vuln" class="CMSBreadCrumbsLink">Vulnerabilities</a></li>
</ol>
</div>
<div>
<style>
/* wrap the words for CVSS v4 */
#nistv4Metric {
word-wrap: break-word;
}
</style>
<script>
/*<![CDATA[*/
var vuln = {
nistV4Present: false,
cnaV4Present: false,
nistV3Present: true,
cnaV3Present: true,
nistV2Present: false,
cnaV2Present: false
};
/*]]>*/
</script>
<div>
</div>
<div id="vulnDetailPanel">
<table id="vulnDetailTableView" style="border-collapse: collapse;">
<tr>
<td colspan="2">
<h2 data-testid="page-header">
<i class="fa fa-bug fa-flip-vertical"></i><span
data-testid="page-header-vuln-id">CVE-2022-39158</span>
Detail
</h2>
<div class="row">
<div class="col-lg-9 col-md-7 col-sm-12">
<div id="vulnShowWarningDiv"
data-testid="vuln-warning-container">
<div
role="alert" data-testid="vuln-warning-alert-container" class="bs-callout bs-callout-info">
<strong class="h4Size"><span
data-testid="vuln-warning-status-name">Modified</span></strong>
<hr/>
<p data-testid="vuln-warning-banner-content">This CVE record has been updated after NVD enrichment efforts were completed. Enrichment data supplied by the NVD may require amendment due to these changes.</p>
</div>
</div>
<h3 id="vulnDescriptionTitle"
data-testid="vuln-description-title">Current Description </h3>
<p data-testid="vuln-description">Affected devices improperly handle partial HTTP requests which makes them vulnerable to slowloris attacks.
This could allow a remote attacker to create a denial of service condition that persists until the attack ends.</p><br/>
<p>
<a href="#vulnCurrentDescriptionTitle"
style="text-decoration: underline" id="showVulnAnalysis"><i
class="fa fa-plus"></i>View Analysis Description</a>
</p>
<div id="vulnAnalysisDescription" style="display: none;">
<h3 data-testid="vuln-analysis-description-title">Analysis
Description</h3>
<p data-testid="vuln-analysis-description">A vulnerability has been identified in RUGGEDCOM ROS RMC8388 (All versions &lt; V5.6.0), RUGGEDCOM ROS RS416Pv2 (All versions &lt; V5.6.0), RUGGEDCOM ROS RS416v2 (All versions &lt; V5.6.0), RUGGEDCOM ROS RS900 (32M) (All versions &lt; V5.6.0), RUGGEDCOM ROS RS900G (32M) (All versions &lt; V5.6.0), RUGGEDCOM ROS RSG2100 (32M) (All versions &lt; V5.6.0), RUGGEDCOM ROS RSG2288 (All versions &lt; V5.6.0), RUGGEDCOM ROS RSG2300 (All versions &lt; V5.6.0), RUGGEDCOM ROS RSG2300P (All versions &lt; V5.6.0), RUGGEDCOM ROS RSG2488 (All versions &lt; V5.6.0), RUGGEDCOM ROS RSG907R (All versions &lt; V5.6.0), RUGGEDCOM ROS RSG908C (All versions &lt; V5.6.0), RUGGEDCOM ROS RSG909R (All versions &lt; V5.6.0), RUGGEDCOM ROS RSG910C (All versions &lt; V5.6.0), RUGGEDCOM ROS RSG920P (All versions &lt; V5.6.0), RUGGEDCOM ROS RSL910 (All versions &lt; v5.6.0), RUGGEDCOM ROS RST2228 (All versions &lt; v5.6.0), RUGGEDCOM ROS RST2228P (All versions &lt; V5.6.0), RUGGEDCOM ROS RST916C (All versions &lt; v5.6.0), RUGGEDCOM ROS RST916P (All versions &lt; v5.6.0). Affected devices improperly handle partial HTTP requests which makes them vulnerable to slowloris attacks. This could allow a remote attacker to create a denial of service condition that persists until the attack ends.</p>
</div>
<!-- CVSS Severity and Vector Strings -->
<div id="vulnCvssPanel" data-testid="vuln-cvss-container"
class="row bs-callout bs-callout-success cvssVulnDetail">
<h3 style="display: inline" title="CVSS is not a measure of risk">Metrics</h3>
&ensp;
<div id="cvssVulnDetailBtn" class="btn-group">
<button id="btn-cvss4" type="button" title="Click here to view CVSS 4.0 data"
class="btn default btn-lg cvssBtn">CVSS Version 4.0
</button>
<button id="btn-cvss3" type="button" title="Click here to view CVSS 3.x data"
class="btn default btn-lg cvssBtn">CVSS Version 3.x
</button>
<button id="btn-cvss2" type="button" title="Click here to view CVSS 2.0 data"
class="btn default btn-lg cvssBtn">CVSS Version 2.0
</button>
</div>
<div id="cvssEnrichmentNotes">
<i>
<small>
NVD enrichment efforts reference publicly available information to associate
vector strings. CVSS information contributed by other sources is also
displayed.
</small>
</i>
</div>
<!-- CVSS v4.0 -->
<div class="container-fluid" id="Vuln4CvssPanel" data-testid="vuln-cvss4-panel">
<strong>CVSS 4.0 Severity and Vector Strings:</strong>
<!-- NIST -->
<div class="row no-gutters">
<br/>
<div class="col-lg-3 col-sm-6">
<div class="row">
<div class="col-lg-3 col-sm-6">
<img
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
class="cvssNvdIcon" alt="NIST CVSS score">
</div>
<div class="col-lg-9 col-sm-6">
<strong>NIST:</strong>&nbsp;<span class="wrapData"
data-testid="vuln-cvss4-source-nvd">NVD</span>
</div>
</div>
</div>
<div class="col-lg-3 col-sm-6">
<span><strong> </strong><span
class="severityDetail"> <a
id="Cvss4NistCalculatorAnchorNA"
class="label label-default"
data-testid="vuln-cvss4-panel-score-na">N/A</a></span></span>
</div>
<div class="col-lg-6 col-sm-12">
<span> <span
data-testid="vuln-cvss4-nist-vector-na">NVD assessment
not yet provided.</span></span> <input type="hidden"
id="nistV4MetricHidden"
value=""/>
</div>
</div>
<!-- CNA -->
<!-- ADP -->
</div>
<!-- CVSS V3.x -->
<div class="container-fluid" id="Vuln3CvssPanel" data-testid="vuln-cvss3-panel"
style="display: none;">
<strong>CVSS 3.x Severity and Vector Strings:</strong>
<!-- NIST -->
<div class="row no-gutters">
<br/>
<div class="col-lg-3 col-sm-6">
<div class="row">
<div class="col-lg-3 col-sm-6">
<img
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
class="cvssNvdIcon" alt="NIST CVSS score">
</div>
<div class="col-lg-9 col-sm-6">
<strong>NIST:</strong>&nbsp;<span class="wrapData"
data-testid="vuln-cvss3-source-nvd">NVD</span>
</div>
</div>
</div>
<div class="col-lg-3 col-sm-6">
<span><strong>Base
Score:</strong>&nbsp;<span class="severityDetail"> <a
id="Cvss3NistCalculatorAnchor"
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-39158&amp;vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&amp;version=3.1&amp;source=NIST"
data-testid="vuln-cvss3-panel-score"
class="label label-danger">7.5 HIGH</a>
</span></span>
</div>
<div class="col-lg-6 col-sm-12">
<span><strong>Vector:</strong>&nbsp;
<span data-testid="vuln-cvss3-nist-vector"
class="tooltipCvss3NistMetrics">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span></span>
<input type="hidden"
id="nistV3MetricHidden"
value="&lt;span id = &#39;nistV3Metric&#39; style = &#39;display:none&#39; &gt; &lt;strong style =&#39;font-size:1.2em&#39; &gt; CVSS v3.1 Severity and Metrics:&lt;/strong&gt; &lt;p data-testid=&#39;vuln-cvssv3-score-container&#39;&gt; &lt;strong&gt;Base Score: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-base-score&#39;&gt;7.5 &lt;/span&gt;&lt;span data-testid=&#39;vuln-cvssv3-base-score-severity&#39;&gt;HIGH&lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Vector: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-vector&#39;&gt; AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Impact Score: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-impact-score&#39;&gt; 3.6 &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Exploitability Score: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-exploitability-score&#39;&gt; 3.9 &lt;/span&gt; &lt;/p&gt; &lt;hr /&gt; &lt;p data-testid=&#39;vuln-cvssv3-metrics-container&#39;&gt; &lt;strong&gt;Attack Vector (AV): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-av&#39;&gt; Network &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Attack Complexity (AC): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-ac&#39;&gt; Low &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Privileges Required (PR): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-pr&#39;&gt; None &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;User Interaction (UI): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-ui&#39;&gt; None &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Scope (S): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-s&#39;&gt; Unchanged &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Confidentiality (C): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-c&#39;&gt; None &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Integrity (I): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-i&#39;&gt; None &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Availability (A): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-a&#39;&gt; High &lt;/span&gt; &lt;/p&gt; &lt;/span&gt; "/>
</div>
</div>
<!-- CNA -->
<div class="row no-gutters">
<br/>
<div class="col-lg-3 col-sm-6">
<div class="row">
<div class="col-lg-3 col-sm-6">
<div id="v3CnaIconContributor">
<img src="/site-media/images/NVD_Contributor_Stack_Plain.svg"
class="cvssNvdIcon"
alt="Nist CVSS score does not match with CNA score">
</div>
</div>
<div class="col-lg-9 col-sm-6">
<strong>CNA:</strong>&nbsp; <span class="wrapData"
data-testid="vuln-cvss3-source-cna">Siemens AG</span>
</div>
</div>
</div>
<div class="col-lg-3 col-sm-6">
<span><strong>Base
Score:</strong>&nbsp;<span class="severityDetail"> <a
id="Cvss3CnaCalculatorAnchor"
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-39158&amp;vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&amp;version=3.1&amp;source=Siemens%20AG"
data-testid="vuln-cvss3-cna-panel-score"
class="label label-warning">5.3 MEDIUM</a></span></span>
</div>
<div class="col-lg-6 col-sm-12">
<span><strong>Vector:</strong>&nbsp; <span
data-testid="vuln-cvss3-cna-vector"
class="tooltipCvss3CnaMetrics">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span></span>
<input type="hidden" id="cnaV3MetricHidden"
value="&lt;span id = &#39;nistV3Metric&#39; style = &#39;display:none&#39; &gt; &lt;strong style =&#39;font-size:1.2em&#39; &gt; CVSS v3.1 Severity and Metrics:&lt;/strong&gt; &lt;p data-testid=&#39;vuln-cvssv3-score-container&#39;&gt; &lt;strong&gt;Base Score: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-base-score&#39;&gt;5.3 &lt;/span&gt;&lt;span data-testid=&#39;vuln-cvssv3-base-score-severity&#39;&gt;MEDIUM&lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Vector: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-vector&#39;&gt; AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Impact Score: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-impact-score&#39;&gt; 1.4 &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Exploitability Score: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-exploitability-score&#39;&gt; 3.9 &lt;/span&gt; &lt;/p&gt; &lt;hr /&gt; &lt;p data-testid=&#39;vuln-cvssv3-metrics-container&#39;&gt; &lt;strong&gt;Attack Vector (AV): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-av&#39;&gt; Network &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Attack Complexity (AC): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-ac&#39;&gt; Low &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Privileges Required (PR): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-pr&#39;&gt; None &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;User Interaction (UI): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-ui&#39;&gt; None &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Scope (S): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-s&#39;&gt; Unchanged &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Confidentiality (C): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-c&#39;&gt; None &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Integrity (I): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-i&#39;&gt; None &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Availability (A): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-a&#39;&gt; Low &lt;/span&gt; &lt;/p&gt; &lt;/span&gt; "/>
</div>
</div>
<!-- ADP -->
<!-- <div id="cvss3FootNote" class="cvssFootNote" >-->
<!-- <br/><br/>-->
<!-- <span id = "cvss3FootNoteSection" th:utext="${cvssData.cvss3FootNoteHtml}"></span>-->
<!-- </div>-->
</div>
<!-- CVSS V2.0 -->
<div class="container-fluid" id="Vuln2CvssPanel" data-testid="vuln-cvss2-panel"
style="display: none;">
<strong>CVSS 2.0 Severity and Vector Strings:</strong> <br/> <br/>
<!-- NIST -->
<div class="row no-gutters">
<div class="col-lg-3 col-sm-6">
<div class="row">
<div class="col-lg-3 col-sm-6">
<img
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
class="cvssNvdIcon"
alt="National Institute of Standards and Technology">
</div>
<div class="col-lg-9 col-sm-6">
<strong>NIST:</strong>&nbsp;<span
data-testid="vuln-cvss2-source-nvd">NVD</span>
</div>
</div>
</div>
<div class="col-lg-3 col-sm-6">
<span><strong>Base
Score:</strong>&nbsp;<span class="severityDetail"><a
id="Cvss2CalculatorAnchorNA" class="label label-default"
data-testid="vuln-cvss2-panel-score-na"
href=''>N/A</a></span></span>
</div>
<div class="col-lg-6 col-sm-12">
<span><span
data-testid="vuln-cvss2-panel-vector-na">NVD assessment
not yet provided.</span></span> <input type="hidden"
id="nistV2MetricHidden"
value=""/>
</div>
</div>
<!-- CNA -->
<!-- ADP -->
<!-- <div id = "cvss2FootNote" class="cvssFootNote" >-->
<!-- <br/><br/>-->
<!-- <span id = "cvss2FootNoteSection" th:utext="${cvssData.cvss2FootNoteHtml}"></span>-->
<!-- </div>-->
</div>
</div>
<div class="row col-sm-12">
<div id="vulnHyperlinksPanel">
<h3>References to Advisories, Solutions, and Tools</h3>
<p>
By selecting these links, you will be leaving NIST webspace.
We have provided these links to other web sites because they
may have information that would be of interest to you. No
inferences should be drawn on account of other sites being
referenced, or not, from this page. There may be other web
sites that are more appropriate for your purpose. NIST does
not necessarily endorse the views expressed, or concur with
the facts presented on these sites. Further, NIST does not
endorse any commercial products that may be mentioned on
these sites. Please address comments about this page to <a
href="mailto:nvd@nist.gov">nvd@nist.gov</a>.
</p>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-hyperlinks-table">
<thead>
<tr>
<th>Hyperlink</th>
<th>Resource</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-hyperlinks-row-0">
<td data-testid="vuln-hyperlinks-link-0">
<a
href="https://cert-portal.siemens.com/productcert/pdf/ssa-459643.pdf"
target="_blank" rel="noopener noreferrer">https://cert-portal.siemens.com/productcert/pdf/ssa-459643.pdf</a></td>
<td data-testid="vuln-hyperlinks-resType-0">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-1">
<td data-testid="vuln-hyperlinks-link-1">
<a
href="https://cert-portal.siemens.com/productcert/pdf/ssa-459643.pdf"
target="_blank" rel="noopener noreferrer">https://cert-portal.siemens.com/productcert/pdf/ssa-459643.pdf</a></td>
<td data-testid="vuln-hyperlinks-resType-1">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-2">
<td data-testid="vuln-hyperlinks-link-2">
<a
href="https://cert-portal.siemens.com/productcert/pdf/ssa-787941.pdf"
target="_blank" rel="noopener noreferrer">https://cert-portal.siemens.com/productcert/pdf/ssa-787941.pdf</a></td>
<td data-testid="vuln-hyperlinks-resType-2">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-3">
<td data-testid="vuln-hyperlinks-link-3">
<a
href="https://cert-portal.siemens.com/productcert/pdf/ssa-787941.pdf"
target="_blank" rel="noopener noreferrer">https://cert-portal.siemens.com/productcert/pdf/ssa-787941.pdf</a></td>
<td data-testid="vuln-hyperlinks-resType-3">
</td>
</tr>
</tbody>
</table>
</div>
<div id="vulnTechnicalDetailsDiv" class="technicalDetails"
data-testid="vuln-technical-details-container">
<h3>Weakness Enumeration</h3>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-CWEs-table">
<thead>
<tr>
<th>CWE-ID</th>
<th>CWE Name</th>
<th>Source</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-CWEs-row-0">
<td data-testid="vuln-CWEs-link-0">
<a href="http://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noopener noreferrer">CWE-400</a>
</td>
<td
data-testid="vuln-CWEs-link-0">Uncontrolled Resource Consumption</td>
<td data-testid="vuln-cwes-assigner-0">
<span class="cweSource" data-testid="vuln-cwes-assigner-0-0"
>
<span>Siemens AG</span>
</span>
</td>
</tr>
</tbody>
</table>
</div>
<div>
<h3>
Known Affected Software Configurations <small> <a
id="toggleCpeVersion" href="#vulnConfigurationsArea">Switch
to CPE 2.2</a></small>
</h3>
<span id="vulnConfigurationsArea"></span>
<input type="hidden" id="cveIdHidden" value="CVE-2022-39158"/>
<div>
<div id="vulnCpeTreeLoading"><h3>CPEs loading, please wait.</h3></div>
<div id="vulnCpeTree" style="display: none;"></div>
<input type="hidden"
id="InputRestBasePath"
value="/rest/public">
<input type="hidden" id="cveTreeJsonDataHidden" value="[{&quot;id&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-config-1&quot;,&quot;totalCpeCount&quot;:21,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-1-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-1-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Asiemens%3Aruggedcom_ros%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:siemens:ruggedcom_ros:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:siemens:ruggedcom_ros&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-0-0&quot;,&quot;id&quot;:&quot;15661259&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 5.6.0 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;5.6.0&quot;,&quot;rangeId&quot;:&quot;479812&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-1-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Asiemens%3Aruggedcom_rmc8388%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:siemens:ruggedcom_rmc8388:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:siemens:ruggedcom_rmc8388:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-1-0&quot;,&quot;id&quot;:&quot;15661261&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Asiemens%3Aruggedcom_rs416pv2%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:siemens:ruggedcom_rs416pv2:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:siemens:ruggedcom_rs416pv2:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-1-1&quot;,&quot;id&quot;:&quot;15661279&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Asiemens%3Aruggedcom_rs416v2%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:siemens:ruggedcom_rs416v2:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:siemens:ruggedcom_rs416v2:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-1-2&quot;,&quot;id&quot;:&quot;15661262&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Asiemens%3Aruggedcom_rs900_%5C%2832m%5C%29%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:siemens:ruggedcom_rs900_\\(32m\\):-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:siemens:ruggedcom_rs900_%2832m%29:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-1-3&quot;,&quot;id&quot;:&quot;15661276&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Asiemens%3Aruggedcom_rs900g_%5C%2832m%5C%29%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:siemens:ruggedcom_rs900g_\\(32m\\):-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:siemens:ruggedcom_rs900g_%2832m%29:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-1-4&quot;,&quot;id&quot;:&quot;15661277&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Asiemens%3Aruggedcom_rsg2100_%5C%2832m%5C%29%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:siemens:ruggedcom_rsg2100_\\(32m\\):-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:siemens:ruggedcom_rsg2100_%2832m%29:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-1-5&quot;,&quot;id&quot;:&quot;15661278&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Asiemens%3Aruggedcom_rsg2288%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:siemens:ruggedcom_rsg2288:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:siemens:ruggedcom_rsg2288:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-1-6&quot;,&quot;id&quot;:&quot;15661264&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Asiemens%3Aruggedcom_rsg2300%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:siemens:ruggedcom_rsg2300:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:siemens:ruggedcom_rsg2300:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-1-7&quot;,&quot;id&quot;:&quot;15661265&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Asiemens%3Aruggedcom_rsg2300p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:siemens:ruggedcom_rsg2300p:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:siemens:ruggedcom_rsg2300p:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-1-8&quot;,&quot;id&quot;:&quot;15661266&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Asiemens%3Aruggedcom_rsg2488%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:siemens:ruggedcom_rsg2488:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:siemens:ruggedcom_rsg2488:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-1-9&quot;,&quot;id&quot;:&quot;15661267&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Asiemens%3Aruggedcom_rsg907r%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:siemens:ruggedcom_rsg907r:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:siemens:ruggedcom_rsg907r:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-1-10&quot;,&quot;id&quot;:&quot;15661275&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Asiemens%3Aruggedcom_rsg908c%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:siemens:ruggedcom_rsg908c:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:siemens:ruggedcom_rsg908c:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-1-11&quot;,&quot;id&quot;:&quot;15661271&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Asiemens%3Aruggedcom_rsg909r%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:siemens:ruggedcom_rsg909r:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:siemens:ruggedcom_rsg909r:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-1-12&quot;,&quot;id&quot;:&quot;15661272&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Asiemens%3Aruggedcom_rsg910c%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:siemens:ruggedcom_rsg910c:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:siemens:ruggedcom_rsg910c:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-1-13&quot;,&quot;id&quot;:&quot;15661273&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Asiemens%3Aruggedcom_rsg920p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:siemens:ruggedcom_rsg920p:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:siemens:ruggedcom_rsg920p:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-1-14&quot;,&quot;id&quot;:&quot;15661263&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Asiemens%3Aruggedcom_rsl910%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:siemens:ruggedcom_rsl910:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:siemens:ruggedcom_rsl910:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-1-15&quot;,&quot;id&quot;:&quot;15661260&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Asiemens%3Aruggedcom_rst2228%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:siemens:ruggedcom_rst2228:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:siemens:ruggedcom_rst2228:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-1-16&quot;,&quot;id&quot;:&quot;15661270&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Asiemens%3Aruggedcom_rst2228p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:siemens:ruggedcom_rst2228p:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:siemens:ruggedcom_rst2228p:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-1-17&quot;,&quot;id&quot;:&quot;15661274&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Asiemens%3Aruggedcom_rst916c%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:siemens:ruggedcom_rst916c:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:siemens:ruggedcom_rst916c:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-1-18&quot;,&quot;id&quot;:&quot;15661268&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Asiemens%3Aruggedcom_rst916p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:siemens:ruggedcom_rst916p:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:siemens:ruggedcom_rst916p:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-1-19&quot;,&quot;id&quot;:&quot;15661269&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]}]"/>
<p id="vulnCpeInfo" >
<small>
<i class="fa fa-bug fa-flip-vertical"></i> Denotes Vulnerable Software<br />
<a href="mailto:cpe_dictionary@nist.gov">Are we missing a CPE here? Please let us know</a>.<br />
</small>
</p>
<script src="/site-media/js/vulnerability/cpe-match.js"
type="text/javascript"></script>
<script src="/site-media/js/vulnerability/configurationListing.js"
type="text/javascript"></script>
</div>
</div>
<div id="vulnChangeHistoryDiv"
data-testid="vuln-change-history-container">
<h3 id="VulnChangeHistorySection">Change History</h3>
<small> 8 change records found <a href="#VulnChangeHistorySection"
style="text-decoration: underline" id="changeHistoryToggle">show
changes</a>
</small>
<div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-0">CVE Modified by CVE</span> <span
data-testid="vuln-change-history-date-0">11/21/2024 2:17:41 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-459643.pdf</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-787941.pdf</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-1">CVE Modified by Siemens AG</span> <span
data-testid="vuln-change-history-date-1">5/14/2024 7:19:12 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-2">CVE Modified by Siemens AG</span> <span
data-testid="vuln-change-history-date-2">11/14/2023 6:15:08 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Changed</td>
<td
data-testid="vuln-change-history-2-type">Description</td>
<td data-testid="vuln-change-history-2-old">
<strong data-testid="vuln-change-history-2-showing"
>Record truncated, showing 500 of 3641 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2022-39158/change-record?changeRecordedOn=11/14/2023T06:15:08.910-0500">View Entire Change Record</a><br/>
<pre>A vulnerability has been identified in RUGGEDCOM i800, RUGGEDCOM i800NC, RUGGEDCOM i801, RUGGEDCOM i801NC, RUGGEDCOM i802, RUGGEDCOM i802NC, RUGGEDCOM i803, RUGGEDCOM i803NC, RUGGEDCOM M2100, RUGGEDCOM M2100F, RUGGEDCOM M2100NC, RUGGEDCOM M2200, RUGGEDCOM M2200F, RUGGEDCOM M2200NC, RUGGEDCOM M969, RUGGEDCOM M969F, RUGGEDCOM M969NC, RUGGEDCOM RMC30, RUGGEDCOM RMC30NC, RUGGEDCOM RMC8388 V4.X, RUGGEDCOM RMC8388 V5.X, RUGGEDCOM RMC8388NC V4.X, RUGGEDCOM RMC8388NC V5.X, RUGGEDCOM RMC8388NC V5.X, RUGG</pre>
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">Affected devices improperly handle partial HTTP requests which makes them vulnerable to slowloris attacks.
This could allow a remote attacker to create a denial of service condition that persists until the attack ends.</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-3">CVE Modified by Siemens AG</span> <span
data-testid="vuln-change-history-date-3">9/12/2023 6:15:20 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-3">
<td
data-testid="vuln-change-history-3-action">Changed</td>
<td
data-testid="vuln-change-history-3-type">Description</td>
<td data-testid="vuln-change-history-3-old">
<strong data-testid="vuln-change-history-3-showing"
>Record truncated, showing 500 of 3329 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2022-39158/change-record?changeRecordedOn=09/12/2023T06:15:20.743-0400">View Entire Change Record</a><br/>
<pre>A vulnerability has been identified in RUGGEDCOM i800, RUGGEDCOM i800NC, RUGGEDCOM i801, RUGGEDCOM i801NC, RUGGEDCOM i802, RUGGEDCOM i802NC, RUGGEDCOM i803, RUGGEDCOM i803NC, RUGGEDCOM M2100, RUGGEDCOM M2100F, RUGGEDCOM M2100NC, RUGGEDCOM M2200, RUGGEDCOM M2200F, RUGGEDCOM M2200NC, RUGGEDCOM M969, RUGGEDCOM M969F, RUGGEDCOM M969NC, RUGGEDCOM RMC30, RUGGEDCOM RMC30NC, RUGGEDCOM RMC8388 V4.X, RUGGEDCOM RMC8388 V5.X, RUGGEDCOM RMC8388NC V4.X, RUGGEDCOM RMC8388NC V5.X, RUGGEDCOM RP110, RUGGEDCOM RP1</pre>
</td>
<td data-testid="vuln-change-history-3-new">
<strong data-testid="vuln-change-history-3-showing"
>Record truncated, showing 500 of 3641 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2022-39158/change-record?changeRecordedOn=09/12/2023T06:15:20.743-0400">View Entire Change Record</a><br />
<pre>A vulnerability has been identified in RUGGEDCOM i800, RUGGEDCOM i800NC, RUGGEDCOM i801, RUGGEDCOM i801NC, RUGGEDCOM i802, RUGGEDCOM i802NC, RUGGEDCOM i803, RUGGEDCOM i803NC, RUGGEDCOM M2100, RUGGEDCOM M2100F, RUGGEDCOM M2100NC, RUGGEDCOM M2200, RUGGEDCOM M2200F, RUGGEDCOM M2200NC, RUGGEDCOM M969, RUGGEDCOM M969F, RUGGEDCOM M969NC, RUGGEDCOM RMC30, RUGGEDCOM RMC30NC, RUGGEDCOM RMC8388 V4.X, RUGGEDCOM RMC8388 V5.X, RUGGEDCOM RMC8388NC V4.X, RUGGEDCOM RMC8388NC V5.X, RUGGEDCOM RMC8388NC V5.X, RUGG</pre>
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-4">CVE Modified by Siemens AG</span> <span
data-testid="vuln-change-history-date-4">4/11/2023 6:15:16 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Changed</td>
<td
data-testid="vuln-change-history-4-type">Description</td>
<td data-testid="vuln-change-history-4-old">
<strong data-testid="vuln-change-history-4-showing"
>Record truncated, showing 500 of 2762 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2022-39158/change-record?changeRecordedOn=04/11/2023T06:15:16.553-0400">View Entire Change Record</a><br/>
<pre>A vulnerability has been identified in RUGGEDCOM i800, RUGGEDCOM i800NC, RUGGEDCOM i801, RUGGEDCOM i801NC, RUGGEDCOM i802, RUGGEDCOM i802NC, RUGGEDCOM i803, RUGGEDCOM i803NC, RUGGEDCOM M2100, RUGGEDCOM M2100NC, RUGGEDCOM M2200, RUGGEDCOM M2200NC, RUGGEDCOM M969, RUGGEDCOM M969NC, RUGGEDCOM RMC30, RUGGEDCOM RMC30NC, RUGGEDCOM RMC8388 V4.X, RUGGEDCOM RMC8388 V5.X, RUGGEDCOM RMC8388NC V4.X, RUGGEDCOM RP110, RUGGEDCOM RP110NC, RUGGEDCOM RS1600, RUGGEDCOM RS1600F, RUGGEDCOM RS1600FNC, RUGGEDCOM RS160</pre>
</td>
<td data-testid="vuln-change-history-4-new">
<strong data-testid="vuln-change-history-4-showing"
>Record truncated, showing 500 of 3329 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2022-39158/change-record?changeRecordedOn=04/11/2023T06:15:16.553-0400">View Entire Change Record</a><br />
<pre>A vulnerability has been identified in RUGGEDCOM i800, RUGGEDCOM i800NC, RUGGEDCOM i801, RUGGEDCOM i801NC, RUGGEDCOM i802, RUGGEDCOM i802NC, RUGGEDCOM i803, RUGGEDCOM i803NC, RUGGEDCOM M2100, RUGGEDCOM M2100F, RUGGEDCOM M2100NC, RUGGEDCOM M2200, RUGGEDCOM M2200F, RUGGEDCOM M2200NC, RUGGEDCOM M969, RUGGEDCOM M969F, RUGGEDCOM M969NC, RUGGEDCOM RMC30, RUGGEDCOM RMC30NC, RUGGEDCOM RMC8388 V4.X, RUGGEDCOM RMC8388 V5.X, RUGGEDCOM RMC8388NC V4.X, RUGGEDCOM RMC8388NC V5.X, RUGGEDCOM RP110, RUGGEDCOM RP1</pre>
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-5">CVE Modified by Siemens AG</span> <span
data-testid="vuln-change-history-date-5">3/14/2023 6:15:21 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-5">
<td
data-testid="vuln-change-history-5-action">Changed</td>
<td
data-testid="vuln-change-history-5-type">Description</td>
<td data-testid="vuln-change-history-5-old">
<strong data-testid="vuln-change-history-5-showing"
>Record truncated, showing 500 of 3144 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2022-39158/change-record?changeRecordedOn=03/14/2023T06:15:21.930-0400">View Entire Change Record</a><br/>
<pre>A vulnerability has been identified in RUGGEDCOM ROS RMC30 V4.X (All versions), RUGGEDCOM ROS RMC8388 V4.X (All versions), RUGGEDCOM ROS RMC8388 V5.X (All versions &lt; V5.6.0), RUGGEDCOM ROS RP110 V4.X (All versions), RUGGEDCOM ROS RS1600 V4.X (All versions), RUGGEDCOM ROS RS1600F V4.X (All versions), RUGGEDCOM ROS RS1600T V4.X (All versions), RUGGEDCOM ROS RS400 V4.X (All versions), RUGGEDCOM ROS RS401 V4.X (All versions), RUGGEDCOM ROS RS416Pv2 V4.X (All versions), RUGGEDCOM ROS RS416Pv2 V5.X (A</pre>
</td>
<td data-testid="vuln-change-history-5-new">
<strong data-testid="vuln-change-history-5-showing"
>Record truncated, showing 500 of 2762 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2022-39158/change-record?changeRecordedOn=03/14/2023T06:15:21.930-0400">View Entire Change Record</a><br />
<pre>A vulnerability has been identified in RUGGEDCOM i800, RUGGEDCOM i800NC, RUGGEDCOM i801, RUGGEDCOM i801NC, RUGGEDCOM i802, RUGGEDCOM i802NC, RUGGEDCOM i803, RUGGEDCOM i803NC, RUGGEDCOM M2100, RUGGEDCOM M2100NC, RUGGEDCOM M2200, RUGGEDCOM M2200NC, RUGGEDCOM M969, RUGGEDCOM M969NC, RUGGEDCOM RMC30, RUGGEDCOM RMC30NC, RUGGEDCOM RMC8388 V4.X, RUGGEDCOM RMC8388 V5.X, RUGGEDCOM RMC8388NC V4.X, RUGGEDCOM RP110, RUGGEDCOM RP110NC, RUGGEDCOM RS1600, RUGGEDCOM RS1600F, RUGGEDCOM RS1600FNC, RUGGEDCOM RS160</pre>
</td>
</tr>
<tr data-testid="vuln-change-history-5">
<td
data-testid="vuln-change-history-5-action">Added</td>
<td
data-testid="vuln-change-history-5-type">CVSS V3.1</td>
<td data-testid="vuln-change-history-5-old">
</td>
<td data-testid="vuln-change-history-5-new">
<pre style="word-break: break-all !important">Siemens AG AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-6">CVE Modified by Siemens AG</span> <span
data-testid="vuln-change-history-date-6">11/08/2022 6:15:11 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-6">
<td
data-testid="vuln-change-history-6-action">Changed</td>
<td
data-testid="vuln-change-history-6-type">Description</td>
<td data-testid="vuln-change-history-6-old">
<strong data-testid="vuln-change-history-6-showing"
>Record truncated, showing 500 of 1214 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2022-39158/change-record?changeRecordedOn=11/08/2022T06:15:11.460-0500">View Entire Change Record</a><br/>
<pre>A vulnerability has been identified in RUGGEDCOM ROS RMC8388 (All versions &lt; V5.6.0), RUGGEDCOM ROS RS416Pv2 (All versions &lt; V5.6.0), RUGGEDCOM ROS RS416v2 (All versions &lt; V5.6.0), RUGGEDCOM ROS RS900 (32M) (All versions &lt; V5.6.0), RUGGEDCOM ROS RS900G (32M) (All versions &lt; V5.6.0), RUGGEDCOM ROS RSG2100 (32M) (All versions &lt; V5.6.0), RUGGEDCOM ROS RSG2288 (All versions &lt; V5.6.0), RUGGEDCOM ROS RSG2300 (All versions &lt; V5.6.0), RUGGEDCOM ROS RSG2300P (All versions &lt; V5.6.0), RUGGEDCOM ROS RSG2488</pre>
</td>
<td data-testid="vuln-change-history-6-new">
<strong data-testid="vuln-change-history-6-showing"
>Record truncated, showing 500 of 3144 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2022-39158/change-record?changeRecordedOn=11/08/2022T06:15:11.460-0500">View Entire Change Record</a><br />
<pre>A vulnerability has been identified in RUGGEDCOM ROS RMC30 V4.X (All versions), RUGGEDCOM ROS RMC8388 V4.X (All versions), RUGGEDCOM ROS RMC8388 V5.X (All versions &lt; V5.6.0), RUGGEDCOM ROS RP110 V4.X (All versions), RUGGEDCOM ROS RS1600 V4.X (All versions), RUGGEDCOM ROS RS1600F V4.X (All versions), RUGGEDCOM ROS RS1600T V4.X (All versions), RUGGEDCOM ROS RS400 V4.X (All versions), RUGGEDCOM ROS RS401 V4.X (All versions), RUGGEDCOM ROS RS416Pv2 V4.X (All versions), RUGGEDCOM ROS RS416Pv2 V5.X (A</pre>
</td>
</tr>
<tr data-testid="vuln-change-history-6">
<td
data-testid="vuln-change-history-6-action">Added</td>
<td
data-testid="vuln-change-history-6-type">Reference</td>
<td data-testid="vuln-change-history-6-old">
</td>
<td data-testid="vuln-change-history-6-new">
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-787941.pdf [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-7">Initial Analysis by NIST</span> <span
data-testid="vuln-change-history-date-7">9/16/2022 3:17:34 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-7">
<td
data-testid="vuln-change-history-7-action">Added</td>
<td
data-testid="vuln-change-history-7-type">CVSS V3.1</td>
<td data-testid="vuln-change-history-7-old">
</td>
<td data-testid="vuln-change-history-7-new">
<pre style="word-break: break-all !important">NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-7">
<td
data-testid="vuln-change-history-7-action">Added</td>
<td
data-testid="vuln-change-history-7-type">CPE Configuration</td>
<td data-testid="vuln-change-history-7-old">
</td>
<td data-testid="vuln-change-history-7-new">
<strong data-testid="vuln-change-history-7-showing"
>Record truncated, showing 500 of 1374 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2022-39158/change-record?changeRecordedOn=09/16/2022T15:17:34.087-0400">View Entire Change Record</a><br />
<pre>AND
OR
*cpe:2.3:o:siemens:ruggedcom_ros:*:*:*:*:*:*:*:* versions up to (excluding) 5.6.0
OR
cpe:2.3:h:siemens:ruggedcom_rmc8388:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs416pv2:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs416v2:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs900_\(32m\):-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rs900g_\(32m\):-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rsg2100_\(32m\):-:*:*:*:*:</pre>
</td>
</tr>
<tr data-testid="vuln-change-history-7">
<td
data-testid="vuln-change-history-7-action">Changed</td>
<td
data-testid="vuln-change-history-7-type">Reference Type</td>
<td data-testid="vuln-change-history-7-old">
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-459643.pdf No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-7-new">
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-459643.pdf Patch, Vendor Advisory</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
</div>
</div>
</div>
</div>
<div class="col-lg-3 col-md-5 col-sm-12">
<div class="bs-callout bs-callout-info">
<h4>Quick Info</h4>
<strong>CVE Dictionary Entry:</strong><br/> <a
target="_blank" rel="noopener noreferrer" data-testid="vuln-cve-dictionary-entry"
href="https://cve.org/CVERecord?id=CVE-2022-39158">CVE-2022-39158</a><br/> <strong>NVD
Published Date:</strong><br/> <span
data-testid="vuln-published-on">09/13/2022</span><br/> <strong>NVD
Last Modified:</strong><br/> <span
data-testid="vuln-last-modified-on">11/21/2024</span><br/> <strong>
Source:</strong><br/> <span
data-testid="vuln-current-description-source">Siemens AG</span><br/>
</div>
</div>
</div>
</td>
</tr>
</table>
</div>
<!-- Hidden input for padding -->
<input type="hidden" value="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" id="padding" name="padding"/>
</div>
</div>
</div>
</main>
<footer id="footer" role="contentinfo">
<div class="container">
<div class="row">
<div class="col-sm-12">
<ul class="social-list pull-right">
<li class="field-item service-twitter list-horiz"><a
href="https://twitter.com/NISTCyber" target="_blank" rel="noopener noreferrer"
class="social-btn social-btn--large extlink ext"> <i
class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span
class="ext"><span class="element-invisible"> (link
is external)</span></span>
</a></li>
<li class="field-item service-facebook list-horiz"><a
href="https://www.facebook.com/NIST" target="_blank" rel="noopener noreferrer"
class="social-btn social-btn--large extlink ext"> <i
class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span
class="ext"><span class="element-invisible"> (link
is external)</span></span></a></li>
<li class="field-item service-linkedin list-horiz"><a
href="https://www.linkedin.com/company/nist" target="_blank" rel="noopener noreferrer"
class="social-btn social-btn--large extlink ext"> <i
class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span
class="ext"><span class="element-invisible"> (link
is external)</span></span></a></li>
<li class="field-item service-youtube list-horiz"><a
href="https://www.youtube.com/user/USNISTGOV" target="_blank" rel="noopener noreferrer"
class="social-btn social-btn--large extlink ext"> <i
class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span
class="ext"><span class="element-invisible"> (link
is external)</span></span></a></li>
<li class="field-item service-rss list-horiz"><a
href="https://www.nist.gov/news-events/nist-rss-feeds"
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink">
<i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i>
</a></li>
<li class="field-item service-govdelivery list-horiz last"><a
href="https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3"
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink ext">
<i class="fa fa-envelope fa-fw"><span
class="element-invisible">govdelivery</span></i><span class="ext"><span
class="element-invisible"> (link is external)</span></span>
</a></li>
</ul>
<span class="hidden-xs"> <a
title="National Institute of Standards and Technology" rel="home"
class="footer-nist-logo"> <img
src="/site-media/images/nist/nist-logo.png"
alt="National Institute of Standards and Technology logo" />
</a>
</span>
</div>
</div>
<div class="row hidden-sm hidden-md hidden-lg">
<div class="col-sm-12">
<a href="https://www.nist.gov"
title="National Institute of Standards and Technology" rel="home"
target="_blank" rel="noopener noreferrer" class="footer-nist-logo"> <img
src="/site-media/images/nist/nist-logo.png"
alt="National Institute of Standards and Technology logo" />
</a>
</div>
</div>
<div class="row footer-contact-container">
<div class="col-sm-6">
<strong>HEADQUARTERS</strong>
<br>
100 Bureau Drive
<br>
Gaithersburg, MD 20899
<br>
<a href="tel:301-975-2000">(301) 975-2000</a>
<br>
<br>
<a href="mailto:nvd@nist.gov">Webmaster</a> | <a
href="https://www.nist.gov/about-nist/contact-us">Contact Us</a>
| <a href="https://www.nist.gov/about-nist/visit"
style="display: inline-block;">Our Other Offices</a>
</div>
<div class="col-sm-6">
<div class="pull-right"
style="text-align:right">
<strong>Incident Response Assistance and Non-NVD Related<br>Technical Cyber Security Questions:</strong>
<br>
US-CERT Security Operations Center
<br> Email: <a href="mailto:soc@us-cert.gov">soc@us-cert.gov</a>
<br> Phone: 1-888-282-0870
</div>
</div>
</div>
<div class="row">
<nav title="Footer Navigation" role="navigation"
class="row footer-bottom-links-container">
<!-- https://github.com/usnistgov/nist-header-footer/blob/nist-pages/boilerplate-footer.html -->
<p>
<a href="https://www.nist.gov/oism/site-privacy">Site Privacy</a>
|
<a href="https://www.nist.gov/oism/accessibility">Accessibility</a>
|
<a href="https://www.nist.gov/privacy">Privacy Program</a>
|
<a href="https://www.nist.gov/oism/copyrights">Copyrights</a>
|
<a href="https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a>
|
<a href="https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a>
|
<a href="https://www.nist.gov/foia">FOIA</a>
|
<a href="https://www.nist.gov/environmental-policy-statement">Environmental Policy</a>
|
<a href="https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a>
|
<a href="https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a>
|
<a href="https://www.commerce.gov/">Commerce.gov</a>
|
<a href="https://www.science.gov/">Science.gov</a>
|
<a href="https://www.usa.gov/">USA.gov</a>
</p>
</nav>
</div>
</div>
</footer>
</body>
</html>