-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 # SSA-764417: Weak Encryption Vulnerability in RUGGEDCOM ROS Devices Publication Date: 2022-03-08 Last Update: 2023-11-14 Current Version: 1.8 CVSS v3.1 Base Score: 6.7 SUMMARY ======= The SSH server on RUGGEDCOM ROS devices is configured to offer weak ciphers by default. This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data passed over the connection between legitimate clients and the affected device. Siemens has released updates for the affected products and recommends to update to the latest versions. AFFECTED PRODUCTS AND SOLUTION ============================== * RUGGEDCOM i800 - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM i801 - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM i802 - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM i803 - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM M969 - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM M2100 - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM M2200 - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RMC30 - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RMC8388 V4.X - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RMC8388 V5.X - Affected versions: All versions < V5.7.0 - Remediation: Update to V5.7.0 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109814608/ * RUGGEDCOM RP110 - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS400 - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS401 - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS416 - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS416P - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS416Pv2 V4.X - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS416Pv2 V5.X - Affected versions: All versions < V5.7.0 - Remediation: Update to V5.7.0 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109814608/ * RUGGEDCOM RS416v2 V4.X - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS416v2 V5.X - Affected versions: All versions < V5.7.0 - Remediation: Update to V5.7.0 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109814608/ * RUGGEDCOM RS900 - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS900 (32M) V4.X - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS900 (32M) V5.X - Affected versions: All versions < V5.7.0 - Remediation: Update to V5.7.0 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109814608/ * RUGGEDCOM RS900G - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS900G (32M) V4.X - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS900G (32M) V5.X - Affected versions: All versions < V5.7.0 - Remediation: Update to V5.7.0 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109814608/ * RUGGEDCOM RS900GP - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS900L - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS900M-GETS-C01 - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS900M-GETS-XX - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS900M-STND-C01 - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS900M-STND-XX - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS900W - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS910 - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS910L - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS910W - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS920L - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS920W - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS930L - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS930W - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS940G - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS969 - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS1600 - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS1600F - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS1600T - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS8000 - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS8000A - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS8000H - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RS8000T - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RSG907R - Affected versions: All versions < V5.7.0 - Remediation: Update to V5.7.0 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109814608/ * RUGGEDCOM RSG908C - Affected versions: All versions < V5.7.0 - Remediation: Update to V5.7.0 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109814608/ * RUGGEDCOM RSG909R - Affected versions: All versions < V5.7.0 - Remediation: Update to V5.7.0 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109814608/ * RUGGEDCOM RSG910C - Affected versions: All versions < V5.7.0 - Remediation: Update to V5.7.0 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109814608/ * RUGGEDCOM RSG920P V4.X - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RSG920P V5.X - Affected versions: All versions < V5.7.0 - Remediation: Update to V5.7.0 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109814608/ * RUGGEDCOM RSG2100 - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RSG2100 (32M) V4.X - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RSG2100 (32M) V5.X - Affected versions: All versions < V5.7.0 - Remediation: Update to V5.7.0 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109814608/ * RUGGEDCOM RSG2100P - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RSG2200 - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RSG2288 V4.X - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RSG2288 V5.X - Affected versions: All versions < V5.7.0 - Remediation: Update to V5.7.0 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109814608/ * RUGGEDCOM RSG2300 V4.X - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RSG2300 V5.X - Affected versions: All versions < V5.7.0 - Remediation: Update to V5.7.0 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109814608/ * RUGGEDCOM RSG2300P V4.X - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RSG2300P V5.X - Affected versions: All versions < V5.7.0 - Remediation: Update to V5.7.0 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109814608/ * RUGGEDCOM RSG2488 V4.X - Affected versions: All versions < V4.3.8 - Remediation: Update to V4.3.8 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109816735/ * RUGGEDCOM RSG2488 V5.X - Affected versions: All versions < V5.7.0 - Remediation: Update to V5.7.0 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109814608/ * RUGGEDCOM RSL910 - Affected versions: All versions < V5.7.0 - Remediation: Update to V5.7.0 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109814608/ * RUGGEDCOM RST916C - Affected versions: All versions < V5.7.0 - Remediation: Update to V5.7.0 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109814608/ * RUGGEDCOM RST916P - Affected versions: All versions < V5.7.0 - Remediation: Update to V5.7.0 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109814608/ * RUGGEDCOM RST2228 - Affected versions: All versions < V5.7.0 - Remediation: Update to V5.7.0 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109814608/ * RUGGEDCOM RST2228P - Affected versions: All versions < V5.7.0 - Remediation: Update to V5.7.0 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109814608/ WORKAROUNDS AND MITIGATIONS =========================== Siemens has identified the following specific workarounds and mitigations that customers can apply to reduce the risk: * Configure the SSH clients to make use of the following strong key exchange ciphers, supported by the ROS SSH server: ecdh-sha2-nistp256, ecdh- sha2-nistp384, or ecdh-sha2-nistp521 * Add only trusted SSH client public keys to ROS and allow access to those clients only Product-specific remediations or mitigations can be found in the section "Affected Products and Solution". Please follow the "General Security Recommendations". GENERAL SECURITY RECOMMENDATIONS ================================ As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial- security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity PRODUCT DESCRIPTION =================== RUGGEDCOM ROS-based devices, typically switches and serial-to-Ethernet devices, are used to connect devices that operate in harsh environments such as electric utility substations and traffic control cabinets. VULNERABILITY CLASSIFICATION ============================ The vulnerability classification has been performed by using the CVSS scoring system in version 3.1 (CVSS v3.1) (https://www.first.org/cvss/). The CVSS environmental score is specific to the customer's environment and will impact the overall CVSS score. The environmental score should therefore be individually defined by the customer to accomplish final scoring. An additional classification has been performed using the CWE classification, a community-developed list of common software security weaknesses. This serves as a common language and as a baseline for weakness identification, mitigation, and prevention efforts. A detailed list of CWE classes can be found at: https://cwe.mitre.org/. * Vulnerability CVE-2021-37209 The SSH server on affected devices is configured to offer weak ciphers by default. This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data passed over the connection between legitimate clients and the affected device. CVSS v3.1 Base Score: 6.7 CVSS Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H/E:P/RL:U/RC:C CWE: CWE-326: Inadequate Encryption Strength ACKNOWLEDGMENTS =============== Siemens thanks the following party for its efforts: * Michael Messner from Siemens Energy for reporting the vulnerability ADDITIONAL INFORMATION ====================== For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories HISTORY DATA ============ V1.0 (2022-03-08): Publication Date V1.1 (2022-03-11): Corrected the list of affected products and fix releases V1.2 (2022-04-12): Added acknowledgements V1.3 (2022-06-14): Corrected title, vulnerability description, CVSS vector and CWE ID; clarified that a fix release is currently not available for affected devices V1.4 (2022-08-09): Reflected a more accurate fix status in advisory V1.5 (2022-11-08): Reflect information about an upcoming fix. Highlight version lines of the affected devices V1.6 (2022-12-13): Added fix for RUGGEDCOM ROS V5.X devices V1.7 (2023-03-14): Added missing affected products. Added fix for RUGGEDCOM ROS devices using V4.X V1.8 (2023-11-14): Added missing affected products: RUGGEDCOM RS416v2 V4.X, RUGGEDCOM RS416Pv2 V4.X. Adjusted the name of RUGGEDCOM RS416v2 V5.X, RUGGEDCOM RS416Pv2 V5.X (added reference to V5.X) TERMS OF USE ============ Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter "License Terms"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter "Terms of Use"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use. Copyright: Siemens 2023 -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEch+g+vCfo0skv7l6x5aGHHWng/oFAmVSuIAACgkQx5aGHHWn g/oUGw//QXcLpjeZI0s/htBhw1vazhKY0NPGgpvsKu4Lb7ElRvbGvbjamHo67QYY arxYR8OWI0HjBb8M66xUoILQiaYinbAT3GFcZJ2QW2eqdDBckP15Mc3aTDGPfmG2 fjzp6901ewJkU4sVCj0AGiFLCII69KOIbWZYONyL/y/4aDSUFNzrroJT68JEXvVp a4H/q52mLVWfeHTQ9k2qHeIlFhoa2wsYWrHCp62jKT3E37UbaOptL+6KK7V77GsU aJeQIermLUXGJSykm5x23jclriMI4+UlfeG+Y3e56hiF5DqHZYI6IGU0fT/gruvi nfmax5WWlFFrklPToIsm9CM4qHx5BWJZjwYEsUO+cAyxWhcDi9K73+GUWrHZlXiz +lyie3iibvWPQsEFFafNfGzdJiQaFrE0EZM1ad/L4EqlEXYz0I3fl83umSaylc5h oKNpZbCrkZwbpHgj3Ivp2WB8JfKbdcwJZzVrFEtZPrWSxFouRwqOWbnC3ONvPaJk R7JU8H6ChZysLLfrexYvxxFEJhBcWWiHOlXu5VIQ8YfsOCvA9zGTyxwfUw6jPvx6 V59159eGnEcmtssBKp/bPQkPOM4tpcTDUZRgkdd61w5/wqbVmnOADSCLcyp5dIvs pzZ7OPxc6zPq1Y3sCL7bJhW78S2T7R532ceyP8iZA50a+w0Di3k= =RGZq -----END PGP SIGNATURE-----