All the vulnerabilites related to Siemens - SCALANCE X204IRT
var-202210-0551
Vulnerability from variot
A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < V5.5.0), SCALANCE X201-3P IRT (All versions < V5.5.0), SCALANCE X201-3P IRT PRO (All versions < V5.5.0), SCALANCE X202-2IRT (All versions < V5.5.0), SCALANCE X202-2P IRT (All versions < V5.5.0), SCALANCE X202-2P IRT PRO (All versions < V5.5.0), SCALANCE X204-2 (All versions < V5.2.5), SCALANCE X204-2FM (All versions < V5.2.5), SCALANCE X204-2LD (All versions < V5.2.5), SCALANCE X204-2LD TS (All versions < V5.2.5), SCALANCE X204-2TS (All versions < V5.2.5), SCALANCE X204IRT (All versions < V5.5.0), SCALANCE X204IRT PRO (All versions < V5.5.0), SCALANCE X206-1 (All versions < V5.2.5), SCALANCE X206-1LD (All versions < V5.2.5), SCALANCE X208 (All versions < V5.2.5), SCALANCE X208PRO (All versions < V5.2.5), SCALANCE X212-2 (All versions < V5.2.5), SCALANCE X212-2LD (All versions < V5.2.5), SCALANCE X216 (All versions < V5.2.5), SCALANCE X224 (All versions < V5.2.5), SCALANCE XF201-3P IRT (All versions < V5.5.0), SCALANCE XF202-2P IRT (All versions < V5.5.0), SCALANCE XF204 (All versions < V5.2.5), SCALANCE XF204-2 (All versions < V5.2.5), SCALANCE XF204-2BA IRT (All versions < V5.5.0), SCALANCE XF204IRT (All versions < V5.5.0), SCALANCE XF206-1 (All versions < V5.2.5), SCALANCE XF208 (All versions < V5.2.5), SIPLUS NET SCALANCE X202-2P IRT (All versions < V5.5.0). There is a cross-site scripting vulnerability on the affected devices, that if used by a threat actor, it could result in session hijacking. scalance x200-4p irt firmware, SCALANCE X201-3P IRT firmware, SCALANCE X201-3P IRT PRO Multiple Siemens products such as firmware contain a cross-site scripting vulnerability.Information may be obtained and information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0551", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance x208", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x204-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x224", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf201-3p irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance x201-3p irt pro", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance x204-2ts", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x206-1ld", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x216", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf206-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance x204-2fm", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x204-2ld", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x212-2ld", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf202-2p irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance xf204-2ba irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance x204irt pro", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance xf208", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x204irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance x202-2irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance x206-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x200-4p irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance xf204-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x202-2p irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance x202-2p irt pro", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "siplus net scalance x202-2p irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance x204-2ld ts", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x201-3p irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance x208pro", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x212-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x201-3p irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x201-3p irt pro", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x204-2ts", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x204irt pro", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x206-1ld", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x202-2irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x208pro", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x212-2ld", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x200-4p irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x202-2p irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x202-2p irt pro", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x204-2ld ts", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x204irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x216", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x204-2fm", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x206-1", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x204-2ld", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x208", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x204-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x212-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018712" }, { "db": "NVD", "id": "CVE-2022-40631" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens reported this vulnerability to CISA.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-504" } ], "trust": 0.6 }, "cve": "CVE-2022-40631", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "id": "CVE-2022-40631", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.1, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2022-40631", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-40631", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-40631", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202210-504", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018712" }, { "db": "CNNVD", "id": "CNNVD-202210-504" }, { "db": "NVD", "id": "CVE-2022-40631" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SCALANCE X200-4P IRT (All versions \u003c V5.5.0), SCALANCE X201-3P IRT (All versions \u003c V5.5.0), SCALANCE X201-3P IRT PRO (All versions \u003c V5.5.0), SCALANCE X202-2IRT (All versions \u003c V5.5.0), SCALANCE X202-2P IRT (All versions \u003c V5.5.0), SCALANCE X202-2P IRT PRO (All versions \u003c V5.5.0), SCALANCE X204-2 (All versions \u003c V5.2.5), SCALANCE X204-2FM (All versions \u003c V5.2.5), SCALANCE X204-2LD (All versions \u003c V5.2.5), SCALANCE X204-2LD TS (All versions \u003c V5.2.5), SCALANCE X204-2TS (All versions \u003c V5.2.5), SCALANCE X204IRT (All versions \u003c V5.5.0), SCALANCE X204IRT PRO (All versions \u003c V5.5.0), SCALANCE X206-1 (All versions \u003c V5.2.5), SCALANCE X206-1LD (All versions \u003c V5.2.5), SCALANCE X208 (All versions \u003c V5.2.5), SCALANCE X208PRO (All versions \u003c V5.2.5), SCALANCE X212-2 (All versions \u003c V5.2.5), SCALANCE X212-2LD (All versions \u003c V5.2.5), SCALANCE X216 (All versions \u003c V5.2.5), SCALANCE X224 (All versions \u003c V5.2.5), SCALANCE XF201-3P IRT (All versions \u003c V5.5.0), SCALANCE XF202-2P IRT (All versions \u003c V5.5.0), SCALANCE XF204 (All versions \u003c V5.2.5), SCALANCE XF204-2 (All versions \u003c V5.2.5), SCALANCE XF204-2BA IRT (All versions \u003c V5.5.0), SCALANCE XF204IRT (All versions \u003c V5.5.0), SCALANCE XF206-1 (All versions \u003c V5.2.5), SCALANCE XF208 (All versions \u003c V5.2.5), SIPLUS NET SCALANCE X202-2P IRT (All versions \u003c V5.5.0). There is a cross-site scripting vulnerability on the affected devices, that if used by a threat actor, it could result in session hijacking. scalance x200-4p irt firmware, SCALANCE X201-3P IRT firmware, SCALANCE X201-3P IRT PRO Multiple Siemens products such as firmware contain a cross-site scripting vulnerability.Information may be obtained and information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-40631" }, { "db": "JVNDB", "id": "JVNDB-2022-018712" } ], "trust": 1.62 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-40631", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-501891", "trust": 2.4 }, { "db": "ICS CERT", "id": "ICSA-22-286-15", "trust": 1.4 }, { "db": "JVN", "id": "JVNVU92214181", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-018712", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-504", "trust": 0.6 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018712" }, { "db": "CNNVD", "id": "CNNVD-202210-504" }, { "db": "NVD", "id": "CVE-2022-40631" } ] }, "id": "VAR-202210-0551", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.5104343616666666 }, "last_update_date": "2024-08-14T12:41:47.096000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Siemens Scalance X-200 Fixes for cross-site scripting vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=210803" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-504" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.0 }, { "problemtype": "Cross-site scripting (CWE-79) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018712" }, { "db": "NVD", "id": "CVE-2022-40631" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-501891.pdf" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu92214181/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-40631" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-15" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-286-15" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-40631/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018712" }, { "db": "CNNVD", "id": "CNNVD-202210-504" }, { "db": "NVD", "id": "CVE-2022-40631" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "JVNDB", "id": "JVNDB-2022-018712" }, { "db": "CNNVD", "id": "CNNVD-202210-504" }, { "db": "NVD", "id": "CVE-2022-40631" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018712" }, { "date": "2022-10-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-504" }, { "date": "2022-10-11T11:15:10.997000", "db": "NVD", "id": "CVE-2022-40631" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-10-23T02:34:00", "db": "JVNDB", "id": "JVNDB-2022-018712" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-504" }, { "date": "2022-10-14T17:07:54.777000", "db": "NVD", "id": "CVE-2022-40631" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-504" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site scripting vulnerability in multiple Siemens products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018712" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-504" } ], "trust": 0.6 } }
var-201309-0316
Vulnerability from variot
The authentication implementation in the web server on Siemens SCALANCE X-200 switches with firmware before 5.0.0 does not use a sufficient source of entropy for generating values of random numbers, which makes it easier for remote attackers to hijack sessions by predicting a value. The Siemens Scalance X200 is an industrial Ethernet switch from Siemens. Remote attackers can exploit this issue to hijack web sessions over the network without authentication. Other attacks are also possible. Siemens Scalance X-200 Series switches running firmware versions prior to 5.0.0 are vulnerable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201309-0316", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance x-200 series", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": "4.3" }, { "model": "scalance x204irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance x-200 series", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "4.4" }, { "model": "scalance x-200", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xf-200", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance x202-2irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance x-200rna", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance x202-2p irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance x201-3p irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance x200-4p irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance x-200", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance x-200 series", "scope": "lt", "trust": 0.8, "vendor": "siemens", "version": "5.0.0" }, { "model": "scalance x-200rna", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance x200-4pirt", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance x201-3p irt", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance x202-2irt", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance x202-2p irt", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance x204irt", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance xf-200", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance series switches", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x-200" }, { "model": "scalance x-200 series", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "4.4" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "scalance x202 2p irt", "version": null }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "scalance x204irt", "version": null }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "scalance x201 3p irt", "version": null }, { "model": "scalance xf208", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "scalance xf206-1", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "scalance xf204-2", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "scalance xf204", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "scalance", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "x2240" }, { "model": "scalance", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "x2160" }, { "model": "scalance x212-2ld", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "scalance", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "x212-20" }, { "model": "scalance x208pro", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "scalance", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "x2080" }, { "model": "scalance x206-1ld", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "scalance", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "x206-10" }, { "model": "scalance x204-2ts", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "scalance x204-2ld", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "scalance", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "x204-20" }, { "model": "scalance xf208", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "5.0" }, { "model": "scalance xf206-1", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "5.0" }, { "model": "scalance xf204-2", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "5.0" }, { "model": "scalance xf204", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "5.0" }, { "model": "scalance", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "x2245.0" }, { "model": "scalance", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "x2165.0" }, { "model": "scalance x212-2ld", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "5.0" }, { "model": "scalance", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "x212-25.0" }, { "model": "scalance x208pro", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "5.0" }, { "model": "scalance", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "x2085.0" }, { "model": "scalance x206-1ld", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "5.0" }, { "model": "scalance x204-2ts", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "5.0" }, { "model": "scalance x204-2ld", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "5.0" }, { "model": "scalance", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "x204-25.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x 200rna", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x 200 series", "version": "4.4" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x 200", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x200 4p irt", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x 200 series", "version": "4.3" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x202 2irt", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance xf 200", "version": null } ], "sources": [ { "db": "IVD", "id": "abb36416-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-13027" }, { "db": "BID", "id": "62341" }, { "db": "JVNDB", "id": "JVNDB-2013-004188" }, { "db": "CNNVD", "id": "CNNVD-201309-245" }, { "db": "NVD", "id": "CVE-2013-5709" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:siemens:scalance_x-200", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:scalance_x-200_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:siemens:scalance_x-200rna", "vulnerable": true }, { "cpe22Uri": "cpe:/h:siemens:scalance_x200-4p_irt", "vulnerable": true }, { "cpe22Uri": "cpe:/h:siemens:scalance_x201-3p_irt", "vulnerable": true }, { "cpe22Uri": "cpe:/h:siemens:scalance_x202-2irt", "vulnerable": true }, { "cpe22Uri": "cpe:/h:siemens:scalance_x202-2p_irt", "vulnerable": true }, { "cpe22Uri": "cpe:/h:siemens:scalance_x204irt", "vulnerable": true }, { "cpe22Uri": "cpe:/h:siemens:scalance_xf-200", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004188" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Eireann Leverett of IOActive", "sources": [ { "db": "BID", "id": "62341" }, { "db": "CNNVD", "id": "CNNVD-201309-245" } ], "trust": 0.9 }, "cve": "CVE-2013-5709", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2013-5709", "impactScore": 8.5, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2013-13027", "impactScore": 8.5, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "abb36416-2352-11e6-abef-000c29c66e3d", "impactScore": 8.5, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-65711", "impactScore": 8.5, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-5709", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2013-5709", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2013-13027", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201309-245", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "abb36416-2352-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-65711", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "abb36416-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-13027" }, { "db": "VULHUB", "id": "VHN-65711" }, { "db": "JVNDB", "id": "JVNDB-2013-004188" }, { "db": "CNNVD", "id": "CNNVD-201309-245" }, { "db": "NVD", "id": "CVE-2013-5709" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The authentication implementation in the web server on Siemens SCALANCE X-200 switches with firmware before 5.0.0 does not use a sufficient source of entropy for generating values of random numbers, which makes it easier for remote attackers to hijack sessions by predicting a value. The Siemens Scalance X200 is an industrial Ethernet switch from Siemens. \nRemote attackers can exploit this issue to hijack web sessions over the network without authentication. Other attacks are also possible. \nSiemens Scalance X-200 Series switches running firmware versions prior to 5.0.0 are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2013-5709" }, { "db": "JVNDB", "id": "JVNDB-2013-004188" }, { "db": "CNVD", "id": "CNVD-2013-13027" }, { "db": "BID", "id": "62341" }, { "db": "IVD", "id": "abb36416-2352-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-65711" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-5709", "trust": 3.6 }, { "db": "ICS CERT", "id": "ICSA-13-254-01", "trust": 2.8 }, { "db": "SIEMENS", "id": "SSA-850708", "trust": 2.3 }, { "db": "BID", "id": "62341", "trust": 1.0 }, { "db": "CNNVD", "id": "CNNVD-201309-245", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2013-13027", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2013-004188", "trust": 0.8 }, { "db": "SECUNIA", "id": "54784", "trust": 0.6 }, { "db": "IVD", "id": "ABB36416-2352-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "SEEBUG", "id": "SSVID-89653", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-65711", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "abb36416-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-13027" }, { "db": "VULHUB", "id": "VHN-65711" }, { "db": "BID", "id": "62341" }, { "db": "JVNDB", "id": "JVNDB-2013-004188" }, { "db": "CNNVD", "id": "CNNVD-201309-245" }, { "db": "NVD", "id": "CVE-2013-5709" } ] }, "id": "VAR-201309-0316", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "abb36416-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-13027" }, { "db": "VULHUB", "id": "VHN-65711" } ], "trust": 1.4751035300000002 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "abb36416-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-13027" } ] }, "last_update_date": "2024-11-23T22:08:30.113000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-850708", "trust": 0.8, "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-850708.pdf" }, { "title": "Patch for the Siemens SCALANCE X-200 Series Switch Session Hijacking Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/39576" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-13027" }, { "db": "JVNDB", "id": "JVNDB-2013-004188" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-189", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-65711" }, { "db": "JVNDB", "id": "JVNDB-2013-004188" }, { "db": "NVD", "id": "CVE-2013-5709" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://ics-cert.us-cert.gov/advisories/icsa-13-254-01" }, { "trust": 1.7, "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-850708.pdf" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-850708.pdf" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5709" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5709" }, { "trust": 0.6, "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-850708.pdf" }, { "trust": 0.6, "url": "http://www.secunia.com/advisories/54784/" }, { "trust": 0.3, "url": "http://subscriber.communications.siemens.com/" }, { "trust": 0.3, "url": "http://ics-cert.us-cert.gov/advisories/icsa-13-254-01#footnoteb_gtr58ow" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-13027" }, { "db": "VULHUB", "id": "VHN-65711" }, { "db": "BID", "id": "62341" }, { "db": "JVNDB", "id": "JVNDB-2013-004188" }, { "db": "CNNVD", "id": "CNNVD-201309-245" }, { "db": "NVD", "id": "CVE-2013-5709" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "abb36416-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-13027" }, { "db": "VULHUB", "id": "VHN-65711" }, { "db": "BID", "id": "62341" }, { "db": "JVNDB", "id": "JVNDB-2013-004188" }, { "db": "CNNVD", "id": "CNNVD-201309-245" }, { "db": "NVD", "id": "CVE-2013-5709" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-09-17T00:00:00", "db": "IVD", "id": "abb36416-2352-11e6-abef-000c29c66e3d" }, { "date": "2013-09-16T00:00:00", "db": "CNVD", "id": "CNVD-2013-13027" }, { "date": "2013-09-17T00:00:00", "db": "VULHUB", "id": "VHN-65711" }, { "date": "2013-09-11T00:00:00", "db": "BID", "id": "62341" }, { "date": "2013-09-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-004188" }, { "date": "2013-09-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201309-245" }, { "date": "2013-09-17T12:04:28.820000", "db": "NVD", "id": "CVE-2013-5709" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-09-17T00:00:00", "db": "CNVD", "id": "CNVD-2013-13027" }, { "date": "2020-02-10T00:00:00", "db": "VULHUB", "id": "VHN-65711" }, { "date": "2013-09-11T00:00:00", "db": "BID", "id": "62341" }, { "date": "2013-09-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-004188" }, { "date": "2020-02-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201309-245" }, { "date": "2024-11-21T01:57:59.320000", "db": "NVD", "id": "CVE-2013-5709" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201309-245" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens SCALANCE X-200 Series Switch Session Hijacking Vulnerability", "sources": [ { "db": "IVD", "id": "abb36416-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-13027" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "digital error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201309-245" } ], "trust": 0.6 } }
var-201305-0214
Vulnerability from variot
A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (Versions < V5.0.0 for CVE-2013-3633 and versions < V4.5.0 for CVE-2013-3634), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.1.0). The user privileges for the web interface are only enforced on client side and not properly verified on server side. Therefore, an attacker is able to execute privileged commands using an unprivileged account. Siemens Scalance X200 IRT Included in switch firmware Web The interface is vulnerable to arbitrary command execution because authentication relies on client-side authorization checks.An arbitrary command may be executed by a remotely authenticated user. The Siemens Scalance X200 series switches can be used to connect industrial components such as PLCs or HMIs. Note: Limited information is currently available regarding this issue. We will update this BID as more information emerges. There are permissions and access control vulnerabilities in Siemens SCALANCE X-200 versions earlier than V5.0.0 and SCALANCE X-200IRT versions earlier than V5.1.0. The vulnerability stems from the lack of effective permissions and access control measures in network systems or products
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201305-0214", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance x200irt", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "5.0.0" }, { "model": "scalance x204irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance x202-2irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance x202-2p irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance x201-3p irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance x200-4p irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xf204irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance x200 irt", "scope": "lt", "trust": 0.8, "vendor": "siemens", "version": "5.1.0" }, { "model": "scalance x200-4pirt", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance x201-3p irt", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "none" }, { "model": "scalance x201-3p irt", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "pro" }, { "model": "scalance x202-2irt", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance x202-2p irt", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "none" }, { "model": "scalance x202-2p irt", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "pro" }, { "model": "scalance x204irt", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "none" }, { "model": "scalance x204irt", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "pro" }, { "model": "scalance xf204irt", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance series switches", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x-200" }, { "model": "scalance x200irt", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5.0.0" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "scalance x204irt", "version": null }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "scalance x202 2p irt", "version": null }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "scalance x201 3p irt", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x202 2irt", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x200 4p irt", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance xf204irt", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x200irt", "version": "5.0.0" } ], "sources": [ { "db": "IVD", "id": "eea523d6-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-06561" }, { "db": "JVNDB", "id": "JVNDB-2013-002822" }, { "db": "CNNVD", "id": "CNNVD-201305-538" }, { "db": "NVD", "id": "CVE-2013-3633" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:siemens:scalance_x200irt_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:siemens:scalance_x200-4p_irt", "vulnerable": true }, { "cpe22Uri": "cpe:/h:siemens:scalance_x201-3p_irt", "vulnerable": true }, { "cpe22Uri": "cpe:/h:siemens:scalance_x202-2irt", "vulnerable": true }, { "cpe22Uri": "cpe:/h:siemens:scalance_x202-2p_irt", "vulnerable": true }, { "cpe22Uri": "cpe:/h:siemens:scalance_x204irt", "vulnerable": true }, { "cpe22Uri": "cpe:/h:siemens:scalance_xf204irt", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-002822" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "60165" } ], "trust": 0.3 }, "cve": "CVE-2013-3633", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 8.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "CVE-2013-3633", "impactScore": 8.5, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 8.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "CNVD-2013-06561", "impactScore": 8.5, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 8.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "eea523d6-2352-11e6-abef-000c29c66e3d", "impactScore": 8.5, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 8.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "VHN-63635", "impactScore": 8.5, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-3633", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2013-3633", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2013-06561", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201305-538", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "eea523d6-2352-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-63635", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "eea523d6-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-06561" }, { "db": "VULHUB", "id": "VHN-63635" }, { "db": "JVNDB", "id": "JVNDB-2013-002822" }, { "db": "CNNVD", "id": "CNNVD-201305-538" }, { "db": "NVD", "id": "CVE-2013-3633" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (Versions \u003c V5.0.0 for CVE-2013-3633 and versions \u003c V4.5.0 for CVE-2013-3634), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions \u003c V5.1.0). The user privileges for the web interface are only enforced on client side and not properly verified on server side. Therefore, an attacker is able to execute privileged commands using an unprivileged account. Siemens Scalance X200 IRT Included in switch firmware Web The interface is vulnerable to arbitrary command execution because authentication relies on client-side authorization checks.An arbitrary command may be executed by a remotely authenticated user. The Siemens Scalance X200 series switches can be used to connect industrial components such as PLCs or HMIs. \nNote: Limited information is currently available regarding this issue. We will update this BID as more information emerges. There are permissions and access control vulnerabilities in Siemens SCALANCE X-200 versions earlier than V5.0.0 and SCALANCE X-200IRT versions earlier than V5.1.0. The vulnerability stems from the lack of effective permissions and access control measures in network systems or products", "sources": [ { "db": "NVD", "id": "CVE-2013-3633" }, { "db": "JVNDB", "id": "JVNDB-2013-002822" }, { "db": "CNVD", "id": "CNVD-2013-06561" }, { "db": "BID", "id": "60165" }, { "db": "IVD", "id": "eea523d6-2352-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-63635" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-3633", "trust": 3.6 }, { "db": "SIEMENS", "id": "SSA-170686", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-13-149-01", "trust": 1.4 }, { "db": "BID", "id": "60165", "trust": 1.0 }, { "db": "CNNVD", "id": "CNNVD-201305-538", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2013-06561", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-13-169-01", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2013-002822", "trust": 0.8 }, { "db": "SECUNIA", "id": "53519", "trust": 0.6 }, { "db": "IVD", "id": "EEA523D6-2352-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "SEEBUG", "id": "SSVID-89660", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-63635", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "eea523d6-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-06561" }, { "db": "VULHUB", "id": "VHN-63635" }, { "db": "BID", "id": "60165" }, { "db": "JVNDB", "id": "JVNDB-2013-002822" }, { "db": "CNNVD", "id": "CNNVD-201305-538" }, { "db": "NVD", "id": "CVE-2013-3633" } ] }, "id": "VAR-201305-0214", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "eea523d6-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-06561" }, { "db": "VULHUB", "id": "VHN-63635" } ], "trust": 1.4751035300000002 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "eea523d6-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-06561" } ] }, "last_update_date": "2024-11-23T22:08:30.931000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-170686", "trust": 0.8, "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-170686.pdf" }, { "title": "Patch for Siemens Scalance X200 Series Switches Remote Privilege Escalation Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/34436" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-06561" }, { "db": "JVNDB", "id": "JVNDB-2013-002822" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-63635" }, { "db": "JVNDB", "id": "JVNDB-2013-002822" }, { "db": "NVD", "id": "CVE-2013-3633" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-170686.pdf" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3633" }, { "trust": 0.8, "url": "http://ics-cert.us-cert.gov/advisories/icsa-13-149-01" }, { "trust": 0.8, "url": "https://ics-cert.us-cert.gov/advisories/icsa-13-169-01" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3633" }, { "trust": 0.6, "url": "http://secunia.com/advisories/53519/" }, { "trust": 0.6, "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-1" }, { "trust": 0.6, "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-170686.pdf" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-13-149-01" }, { "trust": 0.3, "url": "http://subscriber.communications.siemens.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-06561" }, { "db": "VULHUB", "id": "VHN-63635" }, { "db": "BID", "id": "60165" }, { "db": "JVNDB", "id": "JVNDB-2013-002822" }, { "db": "CNNVD", "id": "CNNVD-201305-538" }, { "db": "NVD", "id": "CVE-2013-3633" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "eea523d6-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-06561" }, { "db": "VULHUB", "id": "VHN-63635" }, { "db": "BID", "id": "60165" }, { "db": "JVNDB", "id": "JVNDB-2013-002822" }, { "db": "CNNVD", "id": "CNNVD-201305-538" }, { "db": "NVD", "id": "CVE-2013-3633" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-06-04T00:00:00", "db": "IVD", "id": "eea523d6-2352-11e6-abef-000c29c66e3d" }, { "date": "2013-06-04T00:00:00", "db": "CNVD", "id": "CNVD-2013-06561" }, { "date": "2013-05-24T00:00:00", "db": "VULHUB", "id": "VHN-63635" }, { "date": "2013-05-24T00:00:00", "db": "BID", "id": "60165" }, { "date": "2013-05-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-002822" }, { "date": "2013-05-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201305-538" }, { "date": "2013-05-24T20:55:01.737000", "db": "NVD", "id": "CVE-2013-3633" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-06-04T00:00:00", "db": "CNVD", "id": "CNVD-2013-06561" }, { "date": "2019-12-12T00:00:00", "db": "VULHUB", "id": "VHN-63635" }, { "date": "2013-06-19T06:37:00", "db": "BID", "id": "60165" }, { "date": "2013-06-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-002822" }, { "date": "2019-12-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201305-538" }, { "date": "2024-11-21T01:54:01.613000", "db": "NVD", "id": "CVE-2013-3633" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201305-538" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens Scalance X200 Series Switch Remote Privilege Escalation Vulnerability", "sources": [ { "db": "IVD", "id": "eea523d6-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-06561" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-201305-538" } ], "trust": 0.6 } }
var-202207-0554
Vulnerability from variot
A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT PRO (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2P IRT (All versions < V5.5.2), SCALANCE X202-2P IRT PRO (All versions < V5.5.2), SCALANCE X204-2 (All versions < V5.2.6), SCALANCE X204-2FM (All versions < V5.2.6), SCALANCE X204-2LD (All versions < V5.2.6), SCALANCE X204-2LD TS (All versions < V5.2.6), SCALANCE X204-2TS (All versions < V5.2.6), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT PRO (All versions < V5.5.2), SCALANCE X206-1 (All versions < V5.2.6), SCALANCE X206-1LD (All versions < V5.2.6), SCALANCE X208 (All versions < V5.2.6), SCALANCE X208PRO (All versions < V5.2.6), SCALANCE X212-2 (All versions < V5.2.6), SCALANCE X212-2LD (All versions < V5.2.6), SCALANCE X216 (All versions < V5.2.6), SCALANCE X224 (All versions < V5.2.6), SCALANCE XF201-3P IRT (All versions < V5.5.2), SCALANCE XF202-2P IRT (All versions < V5.5.2), SCALANCE XF204 (All versions < V5.2.6), SCALANCE XF204-2 (All versions < V5.2.6), SCALANCE XF204-2BA IRT (All versions < V5.5.2), SCALANCE XF204IRT (All versions < V5.5.2), SCALANCE XF206-1 (All versions < V5.2.6), SCALANCE XF208 (All versions < V5.2.6). Affected devices do not properly validate the GET parameter XNo of incoming HTTP requests. This could allow an unauthenticated remote attacker to crash affected devices. SCALANCE X204-2 firmware, SCALANCE X204-2FM firmware, SCALANCE X204-2LD Multiple Siemens products, such as firmware, contain a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Siemens SCALANCE X Switches is an industrial Ethernet switch product from Siemens (Siemens) in Germany
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0554", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance x204-2fm", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x204-2ld", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x204-2ld ts", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x204-2ts", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x206-1ld", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x212-2ld", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance xf204", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance xf204-2", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance xf206-1", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance xf208", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x200-4p irt", "scope": null, "trust": 1.2, "vendor": "siemens", "version": null }, { "model": "scalance x201-3p irt", "scope": null, "trust": 1.2, "vendor": "siemens", "version": null }, { "model": "scalance x201-3p irt pro", "scope": null, "trust": 1.2, "vendor": "siemens", "version": null }, { "model": "scalance x202-2irt", "scope": null, "trust": 1.2, "vendor": "siemens", "version": null }, { "model": "scalance x202-2p irt", "scope": null, "trust": 1.2, "vendor": "siemens", "version": null }, { "model": "scalance x202-2p irt pro", "scope": null, "trust": 1.2, "vendor": "siemens", "version": null }, { "model": "scalance x204irt", "scope": null, "trust": 1.2, "vendor": "siemens", "version": null }, { "model": "scalance x204irt pro", "scope": null, "trust": 1.2, "vendor": "siemens", "version": null }, { "model": "scalance xf204irt", "scope": null, "trust": 1.2, "vendor": "siemens", "version": null }, { "model": "scalance x202-2p irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x206-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x200-4p irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x201-3p irt pro", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x202-2irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf204-2ba irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x208 pro", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x212-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance xf201-3p irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x204-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x208", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x204irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x204irt pro", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x224", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x216", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance xf202-2p irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x202-2p irt pro", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x201-3p irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf204irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x212-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x204-2ld", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xf204", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x204-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x206-1ld", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x208", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xf204-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x204-2fm", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x200-4p irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x204-2ld ts", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x208 pro", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x216", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x204-2ts", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xf208", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x206-1", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x224", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x201-3p irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x212-2ld", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x201-3p irt pro", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xf206-1", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x204-2\u003c5.2.6" }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x206-1\u003c5.2.6" }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x208\u003c5.2.6" }, { "model": "scalance x208pro", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x212-2\u003c5.2.6" }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x216\u003c5.2.6" }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x224\u003c5.2.6" }, { "model": "scalance xf201-3p irt", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance xf202-2p irt", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance xf204-2ba irt", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-51439" }, { "db": "JVNDB", "id": "JVNDB-2022-013160" }, { "db": "NVD", "id": "CVE-2022-26648" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens reported these vulnerabilities to CISA.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-942" } ], "trust": 0.6 }, "cve": "CVE-2022-26648", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2022-26648", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "CNVD-2022-51439", "impactScore": 8.5, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-26648", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "productcert@siemens.com", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "exploitabilityScore": 2.3, "id": "CVE-2022-26648", "impactScore": 5.3, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "OTHER", "availabilityImpact": "High", "baseScore": 8.2, "baseSeverity": "High", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2022-013160", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "Low", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-26648", "trust": 1.0, "value": "HIGH" }, { "author": "productcert@siemens.com", "id": "CVE-2022-26648", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-26648", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2022-51439", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-942", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2022-26648", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-51439" }, { "db": "VULMON", "id": "CVE-2022-26648" }, { "db": "JVNDB", "id": "JVNDB-2022-013160" }, { "db": "CNNVD", "id": "CNNVD-202207-942" }, { "db": "NVD", "id": "CVE-2022-26648" }, { "db": "NVD", "id": "CVE-2022-26648" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SCALANCE X200-4P IRT (All versions \u003c V5.5.2), SCALANCE X201-3P IRT (All versions \u003c V5.5.2), SCALANCE X201-3P IRT PRO (All versions \u003c V5.5.2), SCALANCE X202-2IRT (All versions \u003c V5.5.2), SCALANCE X202-2IRT (All versions \u003c V5.5.2), SCALANCE X202-2P IRT (All versions \u003c V5.5.2), SCALANCE X202-2P IRT PRO (All versions \u003c V5.5.2), SCALANCE X204-2 (All versions \u003c V5.2.6), SCALANCE X204-2FM (All versions \u003c V5.2.6), SCALANCE X204-2LD (All versions \u003c V5.2.6), SCALANCE X204-2LD TS (All versions \u003c V5.2.6), SCALANCE X204-2TS (All versions \u003c V5.2.6), SCALANCE X204IRT (All versions \u003c V5.5.2), SCALANCE X204IRT (All versions \u003c V5.5.2), SCALANCE X204IRT PRO (All versions \u003c V5.5.2), SCALANCE X206-1 (All versions \u003c V5.2.6), SCALANCE X206-1LD (All versions \u003c V5.2.6), SCALANCE X208 (All versions \u003c V5.2.6), SCALANCE X208PRO (All versions \u003c V5.2.6), SCALANCE X212-2 (All versions \u003c V5.2.6), SCALANCE X212-2LD (All versions \u003c V5.2.6), SCALANCE X216 (All versions \u003c V5.2.6), SCALANCE X224 (All versions \u003c V5.2.6), SCALANCE XF201-3P IRT (All versions \u003c V5.5.2), SCALANCE XF202-2P IRT (All versions \u003c V5.5.2), SCALANCE XF204 (All versions \u003c V5.2.6), SCALANCE XF204-2 (All versions \u003c V5.2.6), SCALANCE XF204-2BA IRT (All versions \u003c V5.5.2), SCALANCE XF204IRT (All versions \u003c V5.5.2), SCALANCE XF206-1 (All versions \u003c V5.2.6), SCALANCE XF208 (All versions \u003c V5.2.6). Affected devices do not properly validate the GET parameter XNo of incoming HTTP requests. This could allow an unauthenticated remote attacker to crash affected devices. SCALANCE X204-2 firmware, SCALANCE X204-2FM firmware, SCALANCE X204-2LD Multiple Siemens products, such as firmware, contain a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Siemens SCALANCE X Switches is an industrial Ethernet switch product from Siemens (Siemens) in Germany", "sources": [ { "db": "NVD", "id": "CVE-2022-26648" }, { "db": "JVNDB", "id": "JVNDB-2022-013160" }, { "db": "CNVD", "id": "CNVD-2022-51439" }, { "db": "VULMON", "id": "CVE-2022-26648" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-26648", "trust": 3.9 }, { "db": "SIEMENS", "id": "SSA-310038", "trust": 3.1 }, { "db": "ICS CERT", "id": "ICSA-22-195-01", "trust": 1.5 }, { "db": "JVN", "id": "JVNVU97764115", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-013160", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-51439", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022071408", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202207-942", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-26648", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-51439" }, { "db": "VULMON", "id": "CVE-2022-26648" }, { "db": "JVNDB", "id": "JVNDB-2022-013160" }, { "db": "CNNVD", "id": "CNNVD-202207-942" }, { "db": "NVD", "id": "CVE-2022-26648" } ] }, "id": "VAR-202207-0554", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-51439" } ], "trust": 1.1104343616666665 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-51439" } ] }, "last_update_date": "2024-08-14T13:42:36.659000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Siemens SCALANCE X Switches Buffer Overflow Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/339431" }, { "title": "Siemens SCALANCE Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=232913" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-51439" }, { "db": "CNNVD", "id": "CNNVD-202207-942" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.0 }, { "problemtype": "Classic buffer overflow (CWE-120) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013160" }, { "db": "NVD", "id": "CVE-2022-26648" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-310038.pdf" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu97764115/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26648" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-195-01" }, { "trust": 0.6, "url": "https://cert-portal.siemens.com/productcert/html/ssa-310038.html" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-26648/" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022071408" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-195-01" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/120.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-195-01" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-51439" }, { "db": "VULMON", "id": "CVE-2022-26648" }, { "db": "JVNDB", "id": "JVNDB-2022-013160" }, { "db": "CNNVD", "id": "CNNVD-202207-942" }, { "db": "NVD", "id": "CVE-2022-26648" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-51439" }, { "db": "VULMON", "id": "CVE-2022-26648" }, { "db": "JVNDB", "id": "JVNDB-2022-013160" }, { "db": "CNNVD", "id": "CNNVD-202207-942" }, { "db": "NVD", "id": "CVE-2022-26648" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-14T00:00:00", "db": "CNVD", "id": "CNVD-2022-51439" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-26648" }, { "date": "2023-09-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013160" }, { "date": "2022-07-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-942" }, { "date": "2022-07-12T10:15:10.313000", "db": "NVD", "id": "CVE-2022-26648" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-14T00:00:00", "db": "CNVD", "id": "CNVD-2022-51439" }, { "date": "2022-07-15T00:00:00", "db": "VULMON", "id": "CVE-2022-26648" }, { "date": "2023-10-20T07:00:00", "db": "JVNDB", "id": "JVNDB-2022-013160" }, { "date": "2023-04-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-942" }, { "date": "2023-04-11T10:15:14.190000", "db": "NVD", "id": "CVE-2022-26648" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-942" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Classic buffer overflow vulnerability in multiple Siemens products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013160" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-942" } ], "trust": 0.6 } }
var-202101-0486
Vulnerability from variot
A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0), SCALANCE X-200RNA switch family (All versions < V3.2.7). Devices create a new unique key upon factory reset, except when used with C-PLUG. When used with C-PLUG the devices use the hardcoded private RSA-key shipped with the firmware-image. An attacker could leverage this situation to a man-in-the-middle situation and decrypt previously captured traffic. SCALANCE X is a switch used to connect industrial components, such as programmable logic controllers (plc) or human machine interfaces (HMIs)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0486", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance xp216eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xb213-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xp216 \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x202-2pirt siplus net", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance xc216-4c g eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204-2ba dna", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc206-2g poe", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xb205-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc206-2sfp g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf201-3p irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x200-4pirt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance xc208g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x310", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf202-2p irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xp208eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x308-2lh\\+", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc208g poe", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc208", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x308-2", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x308-2m", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2g poe eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x308-2lh", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2sfp eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc208eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc224", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc216-4c g \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x310fe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp208 \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xp208", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x307-3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x201-3pirt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance x204irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance xb208", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x202-2pirt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance xp216poe eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xp216", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xb205-3ld", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x308-2ld", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x202-2irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance x320-3ldfe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc216", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc216-4c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc224-4c g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc206-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc224-4c g eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc216eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x307-3ld", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xb213-3ld", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc206-2sfp g \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc208g eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204 dna", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf206-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204-2ba irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc206-2sfp", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf208", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xp208poe eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x308-2m ts", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc216-4c g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xb216", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc208g \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x320-1fe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2sfp g eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc224-4c g \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x200-4pirt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x307-3ld", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x202-2pirt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x308-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "siplus net scalance x202-2pirt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x204irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x307-3", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x201-3pirt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x202-2irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x308-2ld", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x-200irt switch family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance switch family", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x-200" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02593" }, { "db": "JVNDB", "id": "JVNDB-2020-015531" }, { "db": "NVD", "id": "CVE-2020-28391" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens ProductCERT reported these vulnerabilities to CISA.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-834" } ], "trust": 0.6 }, "cve": "CVE-2020-28391", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2020-28391", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 9.4, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2021-02593", "impactScore": 9.2, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "id": "CVE-2020-28391", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.9, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-28391", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-28391", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2020-28391", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2021-02593", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202101-834", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2020-28391", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02593" }, { "db": "VULMON", "id": "CVE-2020-28391" }, { "db": "JVNDB", "id": "JVNDB-2020-015531" }, { "db": "CNNVD", "id": "CNNVD-202101-834" }, { "db": "NVD", "id": "CVE-2020-28391" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions \u003c V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions \u003c V5.5.0), SCALANCE X-200RNA switch family (All versions \u003c V3.2.7). Devices create a new unique key upon factory reset, except when used with C-PLUG. When used with C-PLUG the devices use the hardcoded private RSA-key shipped with the firmware-image. An attacker could leverage this situation to a man-in-the-middle situation and decrypt previously captured traffic. SCALANCE X is a switch used to connect industrial components, such as programmable logic controllers (plc) or human machine interfaces (HMIs)", "sources": [ { "db": "NVD", "id": "CVE-2020-28391" }, { "db": "JVNDB", "id": "JVNDB-2020-015531" }, { "db": "CNVD", "id": "CNVD-2021-02593" }, { "db": "VULMON", "id": "CVE-2020-28391" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-28391", "trust": 3.1 }, { "db": "ICS CERT", "id": "ICSA-21-012-02", "trust": 2.5 }, { "db": "SIEMENS", "id": "SSA-274900", "trust": 2.3 }, { "db": "JVNDB", "id": "JVNDB-2020-015531", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-02593", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0124", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202101-834", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2020-28391", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02593" }, { "db": "VULMON", "id": "CVE-2020-28391" }, { "db": "JVNDB", "id": "JVNDB-2020-015531" }, { "db": "CNNVD", "id": "CNNVD-202101-834" }, { "db": "NVD", "id": "CVE-2020-28391" } ] }, "id": "VAR-202101-0486", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-02593" } ], "trust": 1.2641418511111109 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02593" } ] }, "last_update_date": "2024-11-23T20:47:39.963000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-274900", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-274900.pdf" }, { "title": "Patch for Scalance X Products hard-coded encryption key vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/244015" }, { "title": "Multiple Siemens Product security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=139506" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=16f5b7ec974eee0b50172f47db7b7ec5" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02593" }, { "db": "VULMON", "id": "CVE-2020-28391" }, { "db": "JVNDB", "id": "JVNDB-2020-015531" }, { "db": "CNNVD", "id": "CNNVD-202101-834" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-798", "trust": 1.0 }, { "problemtype": "CWE-321", "trust": 1.0 }, { "problemtype": "Using hardcoded credentials (CWE-798) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015531" }, { "db": "NVD", "id": "CVE-2020-28391" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-02" }, { "trust": 2.3, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-274900.pdf" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-28391" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0124/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/321.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-012-02" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02593" }, { "db": "VULMON", "id": "CVE-2020-28391" }, { "db": "JVNDB", "id": "JVNDB-2020-015531" }, { "db": "CNNVD", "id": "CNNVD-202101-834" }, { "db": "NVD", "id": "CVE-2020-28391" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-02593" }, { "db": "VULMON", "id": "CVE-2020-28391" }, { "db": "JVNDB", "id": "JVNDB-2020-015531" }, { "db": "CNNVD", "id": "CNNVD-202101-834" }, { "db": "NVD", "id": "CVE-2020-28391" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-13T00:00:00", "db": "CNVD", "id": "CNVD-2021-02593" }, { "date": "2021-01-12T00:00:00", "db": "VULMON", "id": "CVE-2020-28391" }, { "date": "2021-10-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-015531" }, { "date": "2021-01-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-834" }, { "date": "2021-01-12T21:15:18.120000", "db": "NVD", "id": "CVE-2020-28391" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-02-04T00:00:00", "db": "CNVD", "id": "CNVD-2021-02593" }, { "date": "2022-12-13T00:00:00", "db": "VULMON", "id": "CVE-2020-28391" }, { "date": "2021-10-01T08:04:00", "db": "JVNDB", "id": "JVNDB-2020-015531" }, { "date": "2022-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-834" }, { "date": "2024-11-21T05:22:42.433000", "db": "NVD", "id": "CVE-2020-28391" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-834" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SCALANCE\u00a0X-200\u00a0 and \u00a0SCALANCE\u00a0X-200IRT\u00a0 Vulnerability in using hard-coded credentials in switch families", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015531" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "trust management problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-834" } ], "trust": 0.6 } }
var-201305-0215
Vulnerability from variot
A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (Versions < V5.0.0 for CVE-2013-3633 and versions < V4.5.0 for CVE-2013-3634), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.1.0). The implementation of SNMPv3 does not check the user credentials sufficiently. Therefore, an attacker is able to execute SNMP commands without correct credentials. Siemens Scalance X200 IRT Switch firmware SNMPv3 The function does not properly validate the credentials, so any SNMP A command execution vulnerability exists.By using information related to the user name by a third party, any SNMP The command may be executed. The Siemens Scalance X200 series switches can be used to connect industrial components such as PLCs or HMIs. Note: Limited information is currently available regarding this issue. We will update this BID as more information emerges. There is an input validation error vulnerability in Siemens SCALANCE X-200 versions earlier than V4.5.0 and SCALANCE X-200IRT versions earlier than V5.1.0. The vulnerability stems from the failure of the network system or product to properly validate the input data
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201305-0215", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance x200irt", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "5.0.0" }, { "model": "scalance x204irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance x202-2irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance x202-2p irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance x201-3p irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance x200-4p irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance xf204irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "scalance x200 irt", "scope": "lt", "trust": 0.8, "vendor": "siemens", "version": "5.1.0" }, { "model": "scalance x200-4pirt", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance x201-3p irt", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "none" }, { "model": "scalance x201-3p irt", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "pro" }, { "model": "scalance x202-2irt", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance x202-2p irt", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "none" }, { "model": "scalance x202-2p irt", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "pro" }, { "model": "scalance x204irt", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "none" }, { "model": "scalance x204irt", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "pro" }, { "model": "scalance xf204irt", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance series switches", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x-200" }, { "model": "scalance x200irt", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5.0.0" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "scalance x204irt", "version": null }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "scalance x202 2p irt", "version": null }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "scalance x201 3p irt", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x202 2irt", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x200 4p irt", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance xf204irt", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x200irt", "version": "5.0.0" } ], "sources": [ { "db": "IVD", "id": "ee998b48-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-06391" }, { "db": "JVNDB", "id": "JVNDB-2013-002823" }, { "db": "CNNVD", "id": "CNNVD-201305-539" }, { "db": "NVD", "id": "CVE-2013-3634" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:siemens:scalance_x200irt_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:siemens:scalance_x200-4p_irt", "vulnerable": true }, { "cpe22Uri": "cpe:/h:siemens:scalance_x201-3p_irt", "vulnerable": true }, { "cpe22Uri": "cpe:/h:siemens:scalance_x202-2irt", "vulnerable": true }, { "cpe22Uri": "cpe:/h:siemens:scalance_x202-2p_irt", "vulnerable": true }, { "cpe22Uri": "cpe:/h:siemens:scalance_x204irt", "vulnerable": true }, { "cpe22Uri": "cpe:/h:siemens:scalance_xf204irt", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-002823" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "60168" } ], "trust": 0.3 }, "cve": "CVE-2013-3634", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2013-3634", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2013-06391", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "ee998b48-2352-11e6-abef-000c29c66e3d", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-63636", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-3634", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2013-3634", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2013-06391", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201305-539", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "ee998b48-2352-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-63636", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "ee998b48-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-06391" }, { "db": "VULHUB", "id": "VHN-63636" }, { "db": "JVNDB", "id": "JVNDB-2013-002823" }, { "db": "CNNVD", "id": "CNNVD-201305-539" }, { "db": "NVD", "id": "CVE-2013-3634" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (Versions \u003c V5.0.0 for CVE-2013-3633 and versions \u003c V4.5.0 for CVE-2013-3634), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions \u003c V5.1.0). The implementation of SNMPv3 does not check the user credentials sufficiently. Therefore, an attacker is able to execute SNMP commands without correct credentials. Siemens Scalance X200 IRT Switch firmware SNMPv3 The function does not properly validate the credentials, so any SNMP A command execution vulnerability exists.By using information related to the user name by a third party, any SNMP The command may be executed. The Siemens Scalance X200 series switches can be used to connect industrial components such as PLCs or HMIs. \nNote: Limited information is currently available regarding this issue. We will update this BID as more information emerges. There is an input validation error vulnerability in Siemens SCALANCE X-200 versions earlier than V4.5.0 and SCALANCE X-200IRT versions earlier than V5.1.0. The vulnerability stems from the failure of the network system or product to properly validate the input data", "sources": [ { "db": "NVD", "id": "CVE-2013-3634" }, { "db": "JVNDB", "id": "JVNDB-2013-002823" }, { "db": "CNVD", "id": "CNVD-2013-06391" }, { "db": "BID", "id": "60168" }, { "db": "IVD", "id": "ee998b48-2352-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-63636" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-3634", "trust": 3.6 }, { "db": "SIEMENS", "id": "SSA-170686", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-13-149-01", "trust": 1.4 }, { "db": "BID", "id": "60168", "trust": 1.0 }, { "db": "CNNVD", "id": "CNNVD-201305-539", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2013-06391", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-13-169-01", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2013-002823", "trust": 0.8 }, { "db": "SECUNIA", "id": "53519", "trust": 0.6 }, { "db": "IVD", "id": "EE998B48-2352-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "SEEBUG", "id": "SSVID-89661", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-63636", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "ee998b48-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-06391" }, { "db": "VULHUB", "id": "VHN-63636" }, { "db": "BID", "id": "60168" }, { "db": "JVNDB", "id": "JVNDB-2013-002823" }, { "db": "CNNVD", "id": "CNNVD-201305-539" }, { "db": "NVD", "id": "CVE-2013-3634" } ] }, "id": "VAR-201305-0215", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "ee998b48-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-06391" }, { "db": "VULHUB", "id": "VHN-63636" } ], "trust": 1.4751035300000002 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "ee998b48-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-06391" } ] }, "last_update_date": "2024-11-23T22:08:30.972000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-170686", "trust": 0.8, "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-170686.pdf" }, { "title": "Siemens Scalance X200 Series Switch SNMPv3 Remote Security Bypass Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/34397" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-06391" }, { "db": "JVNDB", "id": "JVNDB-2013-002823" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-63636" }, { "db": "JVNDB", "id": "JVNDB-2013-002823" }, { "db": "NVD", "id": "CVE-2013-3634" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-170686.pdf" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3634" }, { "trust": 0.8, "url": "http://ics-cert.us-cert.gov/advisories/icsa-13-149-01" }, { "trust": 0.8, "url": "https://ics-cert.us-cert.gov/advisories/icsa-13-169-01" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3634" }, { "trust": 0.6, "url": "http://secunia.com/advisories/53519/" }, { "trust": 0.6, "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-170686.pdf" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-13-149-01" }, { "trust": 0.3, "url": "http://subscriber.communications.siemens.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-06391" }, { "db": "VULHUB", "id": "VHN-63636" }, { "db": "BID", "id": "60168" }, { "db": "JVNDB", "id": "JVNDB-2013-002823" }, { "db": "CNNVD", "id": "CNNVD-201305-539" }, { "db": "NVD", "id": "CVE-2013-3634" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "ee998b48-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-06391" }, { "db": "VULHUB", "id": "VHN-63636" }, { "db": "BID", "id": "60168" }, { "db": "JVNDB", "id": "JVNDB-2013-002823" }, { "db": "CNNVD", "id": "CNNVD-201305-539" }, { "db": "NVD", "id": "CVE-2013-3634" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-05-31T00:00:00", "db": "IVD", "id": "ee998b48-2352-11e6-abef-000c29c66e3d" }, { "date": "2013-05-31T00:00:00", "db": "CNVD", "id": "CNVD-2013-06391" }, { "date": "2013-05-24T00:00:00", "db": "VULHUB", "id": "VHN-63636" }, { "date": "2013-05-24T00:00:00", "db": "BID", "id": "60168" }, { "date": "2013-05-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-002823" }, { "date": "2013-05-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201305-539" }, { "date": "2013-05-24T20:55:01.767000", "db": "NVD", "id": "CVE-2013-3634" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-05-31T00:00:00", "db": "CNVD", "id": "CNVD-2013-06391" }, { "date": "2019-12-12T00:00:00", "db": "VULHUB", "id": "VHN-63636" }, { "date": "2013-06-19T06:37:00", "db": "BID", "id": "60168" }, { "date": "2013-06-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-002823" }, { "date": "2019-12-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201305-539" }, { "date": "2024-11-21T01:54:01.750000", "db": "NVD", "id": "CVE-2013-3634" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201305-539" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens Scalance X200 IRT Switch SNMPv3 Any in function SNMP Command execution vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-002823" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input validation error", "sources": [ { "db": "IVD", "id": "ee998b48-2352-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201305-539" } ], "trust": 0.8 } }
var-202101-0139
Vulnerability from variot
A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions < V4.1.0). The webserver of the affected devices contains a vulnerability that may lead to a heap overflow condition. An attacker could cause this condition on the webserver by sending specially crafted requests. This could stop the webserver temporarily. SCALANCE X-200 and SCALANCE X-200IRT An out-of-bounds write vulnerability exists in the switch family.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. SCALANCE X is a switch used to connect industrial components, such as programmable logic controllers (plc) or human machine interfaces (HMIs)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0139", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance xp216eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xb213-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xp216 \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x202-2pirt siplus net", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance xc216-4c g eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204-2ba dna", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc206-2g poe", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xb205-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc206-2sfp g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf201-3p irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x200-4pirt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance xc208g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x310", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf202-2p irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xp208eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x308-2lh\\+", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc208g poe", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc208", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x308-2", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x308-2m", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2g poe eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x308-2lh", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2sfp eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc208eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc224", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc216-4c g \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x310fe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp208 \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xp208", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x307-3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x201-3pirt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance x204irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance xb208", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x202-2pirt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance xp216poe eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xp216", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xb205-3ld", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x308-2ld", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x202-2irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance x320-3ldfe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc216", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc216-4c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc224-4c g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc206-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc224-4c g eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc216eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x307-3ld", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xb213-3ld", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc206-2sfp g \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc208g eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204 dna", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf206-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204-2ba irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc206-2sfp", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf208", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xp208poe eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x308-2m ts", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc216-4c g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xb216", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc208g \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x320-1fe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2sfp g eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc224-4c g \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x200-4pirt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x307-3ld", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x202-2pirt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x308-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "siplus net scalance x202-2pirt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x204irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x307-3", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x201-3pirt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x202-2irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x308-2ld", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x-200irt switch family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance switch family", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x-200" }, { "model": "scalance switch family", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x-300x408\u003cv4.1.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02595" }, { "db": "JVNDB", "id": "JVNDB-2020-015534" }, { "db": "NVD", "id": "CVE-2020-15800" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens reported these vulnerabilities to CISA.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-915" } ], "trust": 0.6 }, "cve": "CVE-2020-15800", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2020-15800", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2021-02595", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-15800", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-15800", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-15800", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2020-15800", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2021-02595", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202101-915", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02595" }, { "db": "JVNDB", "id": "JVNDB-2020-015534" }, { "db": "CNNVD", "id": "CNNVD-202101-915" }, { "db": "NVD", "id": "CVE-2020-15800" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions \u003c V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions \u003c V5.5.0), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions \u003c V4.1.0). The webserver of the affected devices contains a vulnerability that may lead to a heap overflow condition. An attacker could cause this condition on the webserver by sending specially crafted requests. This could stop the webserver temporarily. SCALANCE X-200 and SCALANCE X-200IRT An out-of-bounds write vulnerability exists in the switch family.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. SCALANCE X is a switch used to connect industrial components, such as programmable logic controllers (plc) or human machine interfaces (HMIs)", "sources": [ { "db": "NVD", "id": "CVE-2020-15800" }, { "db": "JVNDB", "id": "JVNDB-2020-015534" }, { "db": "CNVD", "id": "CNVD-2021-02595" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-15800", "trust": 3.0 }, { "db": "SIEMENS", "id": "SSA-139628", "trust": 2.2 }, { "db": "JVNDB", "id": "JVNDB-2020-015534", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-02595", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-21-012-05", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0127", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202101-915", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02595" }, { "db": "JVNDB", "id": "JVNDB-2020-015534" }, { "db": "CNNVD", "id": "CNNVD-202101-915" }, { "db": "NVD", "id": "CVE-2020-15800" } ] }, "id": "VAR-202101-0139", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-02595" } ], "trust": 1.2641418511111109 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02595" } ] }, "last_update_date": "2024-11-23T20:33:26.845000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-139628", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf" }, { "title": "Patch for Scalance X Products heap buffer overflow vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/244021" }, { "title": "Siemens SCALANCE X-200IRT Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=138843" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02595" }, { "db": "JVNDB", "id": "JVNDB-2020-015534" }, { "db": "CNNVD", "id": "CNNVD-202101-915" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-122", "trust": 1.0 }, { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015534" }, { "db": "NVD", "id": "CVE-2020-15800" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-15800" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-05" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0127/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02595" }, { "db": "JVNDB", "id": "JVNDB-2020-015534" }, { "db": "CNNVD", "id": "CNNVD-202101-915" }, { "db": "NVD", "id": "CVE-2020-15800" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-02595" }, { "db": "JVNDB", "id": "JVNDB-2020-015534" }, { "db": "CNNVD", "id": "CNNVD-202101-915" }, { "db": "NVD", "id": "CVE-2020-15800" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-13T00:00:00", "db": "CNVD", "id": "CNVD-2021-02595" }, { "date": "2021-10-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-015534" }, { "date": "2021-01-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-915" }, { "date": "2021-01-12T21:15:16.480000", "db": "NVD", "id": "CVE-2020-15800" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-02-04T00:00:00", "db": "CNVD", "id": "CNVD-2021-02595" }, { "date": "2021-10-01T08:52:00", "db": "JVNDB", "id": "JVNDB-2020-015534" }, { "date": "2021-09-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-915" }, { "date": "2024-11-21T05:06:12.450000", "db": "NVD", "id": "CVE-2020-15800" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-915" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SCALANCE\u00a0X-200\u00a0 and \u00a0SCALANCE\u00a0X-200IRT\u00a0 Out-of-bounds write vulnerability in switch family", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015534" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-915" } ], "trust": 0.6 } }
var-202101-0304
Vulnerability from variot
A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0). The web server of the affected devices contains a vulnerability that may lead to a buffer overflow condition. An attacker could cause this condition on the webserver by sending a specially crafted request. The webserver could stop and not recover anymore. SCALANCE X-200 and SCALANCE X-200IRT An out-of-bounds write vulnerability exists in the switch family.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. SCALANCE X is a switch used to connect industrial components, such as programmable logic controllers (plc) or human machine interfaces (HMIs)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0304", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance xp216eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xb213-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xp216 \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x202-2pirt siplus net", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance xc216-4c g eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204-2ba dna", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc206-2g poe", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xb205-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc206-2sfp g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf201-3p irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x200-4pirt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance xc208g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x310", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf202-2p irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xp208eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x308-2lh\\+", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc208g poe", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc208", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x308-2", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x308-2m", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2g poe eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x308-2lh", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2sfp eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc208eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc224", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc216-4c g \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x310fe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp208 \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xp208", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x307-3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x201-3pirt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance x204irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance xb208", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x202-2pirt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance xp216poe eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xp216", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xb205-3ld", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x308-2ld", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x202-2irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance x320-3ldfe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc216", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc216-4c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc224-4c g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc206-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc224-4c g eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc216eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x307-3ld", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xb213-3ld", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc206-2sfp g \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc208g eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204 dna", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf206-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204-2ba irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc206-2sfp", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf208", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xp208poe eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x308-2m ts", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc216-4c g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xb216", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc208g \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x320-1fe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2sfp g eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc224-4c g \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x200-4pirt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x307-3ld", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x202-2pirt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x308-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "siplus net scalance x202-2pirt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x204irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x307-3", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x201-3pirt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x202-2irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x308-2ld", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x-200irt switch family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance switch family", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x-200" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02594" }, { "db": "JVNDB", "id": "JVNDB-2020-015533" }, { "db": "NVD", "id": "CVE-2020-25226" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens reported these vulnerabilities to CISA.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-917" } ], "trust": 0.6 }, "cve": "CVE-2020-25226", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2020-25226", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2021-02594", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-25226", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-25226", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-25226", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2020-25226", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2021-02594", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202101-917", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02594" }, { "db": "JVNDB", "id": "JVNDB-2020-015533" }, { "db": "CNNVD", "id": "CNNVD-202101-917" }, { "db": "NVD", "id": "CVE-2020-25226" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions \u003c V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions \u003c V5.5.0). The web server of the affected devices contains a vulnerability that may lead to a buffer overflow condition. An attacker could cause this condition on the webserver by sending a specially crafted request. The webserver could stop and not recover anymore. SCALANCE X-200 and SCALANCE X-200IRT An out-of-bounds write vulnerability exists in the switch family.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. SCALANCE X is a switch used to connect industrial components, such as programmable logic controllers (plc) or human machine interfaces (HMIs)", "sources": [ { "db": "NVD", "id": "CVE-2020-25226" }, { "db": "JVNDB", "id": "JVNDB-2020-015533" }, { "db": "CNVD", "id": "CNVD-2021-02594" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-25226", "trust": 3.0 }, { "db": "SIEMENS", "id": "SSA-139628", "trust": 2.2 }, { "db": "JVNDB", "id": "JVNDB-2020-015533", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-02594", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-21-012-05", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0127", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202101-917", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02594" }, { "db": "JVNDB", "id": "JVNDB-2020-015533" }, { "db": "CNNVD", "id": "CNNVD-202101-917" }, { "db": "NVD", "id": "CVE-2020-25226" } ] }, "id": "VAR-202101-0304", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-02594" } ], "trust": 1.264141851111111 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02594" } ] }, "last_update_date": "2024-11-23T19:30:05.728000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-139628", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf" }, { "title": "Patch for Scalance X Products heap buffer overflow vulnerability (CNVD-2021-02594)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/244018" }, { "title": "Multiple Siemens Product Buffer Error Vulnerability Fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139392" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02594" }, { "db": "JVNDB", "id": "JVNDB-2020-015533" }, { "db": "CNNVD", "id": "CNNVD-202101-917" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-122", "trust": 1.0 }, { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015533" }, { "db": "NVD", "id": "CVE-2020-25226" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25226" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-05" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0127/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02594" }, { "db": "JVNDB", "id": "JVNDB-2020-015533" }, { "db": "CNNVD", "id": "CNNVD-202101-917" }, { "db": "NVD", "id": "CVE-2020-25226" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-02594" }, { "db": "JVNDB", "id": "JVNDB-2020-015533" }, { "db": "CNNVD", "id": "CNNVD-202101-917" }, { "db": "NVD", "id": "CVE-2020-25226" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-13T00:00:00", "db": "CNVD", "id": "CNVD-2021-02594" }, { "date": "2021-10-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-015533" }, { "date": "2021-01-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-917" }, { "date": "2021-01-12T21:15:16.543000", "db": "NVD", "id": "CVE-2020-25226" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-02-04T00:00:00", "db": "CNVD", "id": "CNVD-2021-02594" }, { "date": "2021-10-01T08:45:00", "db": "JVNDB", "id": "JVNDB-2020-015533" }, { "date": "2021-09-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-917" }, { "date": "2024-11-21T05:17:42.257000", "db": "NVD", "id": "CVE-2020-25226" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-917" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SCALANCE\u00a0X-200\u00a0 and \u00a0SCALANCE\u00a0X-200IRT\u00a0 Out-of-bounds write vulnerability in switch family", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015533" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-917" } ], "trust": 0.6 } }
var-202207-0555
Vulnerability from variot
A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT PRO (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2P IRT (All versions < V5.5.2), SCALANCE X202-2P IRT PRO (All versions < V5.5.2), SCALANCE X204-2 (All versions < V5.2.6), SCALANCE X204-2FM (All versions < V5.2.6), SCALANCE X204-2LD (All versions < V5.2.6), SCALANCE X204-2LD TS (All versions < V5.2.6), SCALANCE X204-2TS (All versions < V5.2.6), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT PRO (All versions < V5.5.2), SCALANCE X206-1 (All versions < V5.2.6), SCALANCE X206-1LD (All versions < V5.2.6), SCALANCE X208 (All versions < V5.2.6), SCALANCE X208PRO (All versions < V5.2.6), SCALANCE X212-2 (All versions < V5.2.6), SCALANCE X212-2LD (All versions < V5.2.6), SCALANCE X216 (All versions < V5.2.6), SCALANCE X224 (All versions < V5.2.6), SCALANCE XF201-3P IRT (All versions < V5.5.2), SCALANCE XF202-2P IRT (All versions < V5.5.2), SCALANCE XF204 (All versions < V5.2.6), SCALANCE XF204-2 (All versions < V5.2.6), SCALANCE XF204-2BA IRT (All versions < V5.5.2), SCALANCE XF204IRT (All versions < V5.5.2), SCALANCE XF206-1 (All versions < V5.2.6), SCALANCE XF208 (All versions < V5.2.6). The webserver of affected devices calculates session ids and nonces in an insecure manner. This could allow an unauthenticated remote attacker to brute-force session ids and hijack existing sessions. Siemens SCALANCE X Switches is an industrial Ethernet switch product from Siemens (Siemens) in Germany
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0555", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance x204-2fm", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x204-2ld", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x204-2ld ts", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x204-2ts", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x206-1ld", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x212-2ld", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance xf204", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance xf204-2", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance xf206-1", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance xf208", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x200-4p irt", "scope": null, "trust": 1.2, "vendor": "siemens", "version": null }, { "model": "scalance x201-3p irt", "scope": null, "trust": 1.2, "vendor": "siemens", "version": null }, { "model": "scalance x201-3p irt pro", "scope": null, "trust": 1.2, "vendor": "siemens", "version": null }, { "model": "scalance x202-2irt", "scope": null, "trust": 1.2, "vendor": "siemens", "version": null }, { "model": "scalance x202-2p irt", "scope": null, "trust": 1.2, "vendor": "siemens", "version": null }, { "model": "scalance x202-2p irt pro", "scope": null, "trust": 1.2, "vendor": "siemens", "version": null }, { "model": "scalance x204irt", "scope": null, "trust": 1.2, "vendor": "siemens", "version": null }, { "model": "scalance x204irt pro", "scope": null, "trust": 1.2, "vendor": "siemens", "version": null }, { "model": "scalance xf204irt", "scope": null, "trust": 1.2, "vendor": "siemens", "version": null }, { "model": "scalance x202-2p irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x206-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x200-4p irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x201-3p irt pro", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x202-2irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf204-2ba irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x208 pro", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x212-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance xf201-3p irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x204-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x208", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x204irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x204irt pro", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x224", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x216", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance xf202-2p irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x202-2p irt pro", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x201-3p irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf204irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x204-2\u003c5.2.6" }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x206-1\u003c5.2.6" }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x208\u003c5.2.6" }, { "model": "scalance x208pro", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x212-2\u003c5.2.6" }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x216\u003c5.2.6" }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x224\u003c5.2.6" }, { "model": "scalance xf201-3p irt", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance xf202-2p irt", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance xf204-2ba irt", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-51440" }, { "db": "NVD", "id": "CVE-2022-26647" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens reported these vulnerabilities to CISA.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-950" } ], "trust": 0.6 }, "cve": "CVE-2022-26647", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2022-26647", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2022-51440", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-26647", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "productcert@siemens.com", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2022-26647", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-26647", "trust": 1.0, "value": "CRITICAL" }, { "author": "productcert@siemens.com", "id": "CVE-2022-26647", "trust": 1.0, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2022-51440", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-950", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2022-26647", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-51440" }, { "db": "VULMON", "id": "CVE-2022-26647" }, { "db": "CNNVD", "id": "CNNVD-202207-950" }, { "db": "NVD", "id": "CVE-2022-26647" }, { "db": "NVD", "id": "CVE-2022-26647" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SCALANCE X200-4P IRT (All versions \u003c V5.5.2), SCALANCE X201-3P IRT (All versions \u003c V5.5.2), SCALANCE X201-3P IRT PRO (All versions \u003c V5.5.2), SCALANCE X202-2IRT (All versions \u003c V5.5.2), SCALANCE X202-2IRT (All versions \u003c V5.5.2), SCALANCE X202-2P IRT (All versions \u003c V5.5.2), SCALANCE X202-2P IRT PRO (All versions \u003c V5.5.2), SCALANCE X204-2 (All versions \u003c V5.2.6), SCALANCE X204-2FM (All versions \u003c V5.2.6), SCALANCE X204-2LD (All versions \u003c V5.2.6), SCALANCE X204-2LD TS (All versions \u003c V5.2.6), SCALANCE X204-2TS (All versions \u003c V5.2.6), SCALANCE X204IRT (All versions \u003c V5.5.2), SCALANCE X204IRT (All versions \u003c V5.5.2), SCALANCE X204IRT PRO (All versions \u003c V5.5.2), SCALANCE X206-1 (All versions \u003c V5.2.6), SCALANCE X206-1LD (All versions \u003c V5.2.6), SCALANCE X208 (All versions \u003c V5.2.6), SCALANCE X208PRO (All versions \u003c V5.2.6), SCALANCE X212-2 (All versions \u003c V5.2.6), SCALANCE X212-2LD (All versions \u003c V5.2.6), SCALANCE X216 (All versions \u003c V5.2.6), SCALANCE X224 (All versions \u003c V5.2.6), SCALANCE XF201-3P IRT (All versions \u003c V5.5.2), SCALANCE XF202-2P IRT (All versions \u003c V5.5.2), SCALANCE XF204 (All versions \u003c V5.2.6), SCALANCE XF204-2 (All versions \u003c V5.2.6), SCALANCE XF204-2BA IRT (All versions \u003c V5.5.2), SCALANCE XF204IRT (All versions \u003c V5.5.2), SCALANCE XF206-1 (All versions \u003c V5.2.6), SCALANCE XF208 (All versions \u003c V5.2.6). The webserver of affected devices calculates session ids and nonces in an insecure manner. This could allow an unauthenticated remote attacker to brute-force session ids and hijack existing sessions. Siemens SCALANCE X Switches is an industrial Ethernet switch product from Siemens (Siemens) in Germany", "sources": [ { "db": "NVD", "id": "CVE-2022-26647" }, { "db": "CNVD", "id": "CNVD-2022-51440" }, { "db": "VULMON", "id": "CVE-2022-26647" } ], "trust": 1.53 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-26647", "trust": 2.3 }, { "db": "SIEMENS", "id": "SSA-310038", "trust": 2.3 }, { "db": "ICS CERT", "id": "ICSA-22-195-01", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-51440", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022071408", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202207-950", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-26647", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-51440" }, { "db": "VULMON", "id": "CVE-2022-26647" }, { "db": "CNNVD", "id": "CNNVD-202207-950" }, { "db": "NVD", "id": "CVE-2022-26647" } ] }, "id": "VAR-202207-0555", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-51440" } ], "trust": 1.1104343616666665 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-51440" } ] }, "last_update_date": "2024-08-14T13:42:37.019000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Unknown Vulnerability in Siemens SCALANCE X Switches", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/339406" }, { "title": "Siemens SCALANCE Security Feature Issues Feature Issues Vulnerabilities Repair Measures", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=232914" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-51440" }, { "db": "CNNVD", "id": "CNNVD-202207-950" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-330", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-26647" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-310038.pdf" }, { "trust": 0.6, "url": "https://cert-portal.siemens.com/productcert/html/ssa-310038.html" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-26647/" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022071408" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-195-01" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/330.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-195-01" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-51440" }, { "db": "VULMON", "id": "CVE-2022-26647" }, { "db": "CNNVD", "id": "CNNVD-202207-950" }, { "db": "NVD", "id": "CVE-2022-26647" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-51440" }, { "db": "VULMON", "id": "CVE-2022-26647" }, { "db": "CNNVD", "id": "CNNVD-202207-950" }, { "db": "NVD", "id": "CVE-2022-26647" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-14T00:00:00", "db": "CNVD", "id": "CNVD-2022-51440" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-26647" }, { "date": "2022-07-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-950" }, { "date": "2022-07-12T10:15:10.257000", "db": "NVD", "id": "CVE-2022-26647" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-14T00:00:00", "db": "CNVD", "id": "CNVD-2022-51440" }, { "date": "2022-07-15T00:00:00", "db": "VULMON", "id": "CVE-2022-26647" }, { "date": "2023-04-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-950" }, { "date": "2023-04-11T10:15:13.657000", "db": "NVD", "id": "CVE-2022-26647" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-950" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown Vulnerability in Siemens SCALANCE X Switches", "sources": [ { "db": "CNVD", "id": "CNVD-2022-51440" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "security feature problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-950" } ], "trust": 0.6 } }
var-202207-0556
Vulnerability from variot
A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT PRO (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2P IRT (All versions < V5.5.2), SCALANCE X202-2P IRT PRO (All versions < V5.5.2), SCALANCE X204-2 (All versions < V5.2.6), SCALANCE X204-2FM (All versions < V5.2.6), SCALANCE X204-2LD (All versions < V5.2.6), SCALANCE X204-2LD TS (All versions < V5.2.6), SCALANCE X204-2TS (All versions < V5.2.6), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT PRO (All versions < V5.5.2), SCALANCE X206-1 (All versions < V5.2.6), SCALANCE X206-1LD (All versions < V5.2.6), SCALANCE X208 (All versions < V5.2.6), SCALANCE X208PRO (All versions < V5.2.6), SCALANCE X212-2 (All versions < V5.2.6), SCALANCE X212-2LD (All versions < V5.2.6), SCALANCE X216 (All versions < V5.2.6), SCALANCE X224 (All versions < V5.2.6), SCALANCE XF201-3P IRT (All versions < V5.5.2), SCALANCE XF202-2P IRT (All versions < V5.5.2), SCALANCE XF204 (All versions < V5.2.6), SCALANCE XF204-2 (All versions < V5.2.6), SCALANCE XF204-2BA IRT (All versions < V5.5.2), SCALANCE XF204IRT (All versions < V5.5.2), SCALANCE XF206-1 (All versions < V5.2.6), SCALANCE XF208 (All versions < V5.2.6). Affected devices do not properly validate the URI of incoming HTTP GET requests. This could allow an unauthenticated remote attacker to crash affected devices. Siemens SCALANCE X Switches is an industrial Ethernet switch product from Siemens (Siemens) in Germany
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0556", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance x204-2fm", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x204-2ld", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x204-2ld ts", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x204-2ts", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x206-1ld", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x212-2ld", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance xf204", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance xf204-2", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance xf206-1", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance xf208", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x200-4p irt", "scope": null, "trust": 1.2, "vendor": "siemens", "version": null }, { "model": "scalance x201-3p irt", "scope": null, "trust": 1.2, "vendor": "siemens", "version": null }, { "model": "scalance x201-3p irt pro", "scope": null, "trust": 1.2, "vendor": "siemens", "version": null }, { "model": "scalance x202-2irt", "scope": null, "trust": 1.2, "vendor": "siemens", "version": null }, { "model": "scalance x202-2p irt", "scope": null, "trust": 1.2, "vendor": "siemens", "version": null }, { "model": "scalance x202-2p irt pro", "scope": null, "trust": 1.2, "vendor": "siemens", "version": null }, { "model": "scalance x204irt", "scope": null, "trust": 1.2, "vendor": "siemens", "version": null }, { "model": "scalance x204irt pro", "scope": null, "trust": 1.2, "vendor": "siemens", "version": null }, { "model": "scalance xf204irt", "scope": null, "trust": 1.2, "vendor": "siemens", "version": null }, { "model": "scalance x202-2p irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x206-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x200-4p irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x201-3p irt pro", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x202-2irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf204-2ba irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x208 pro", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x212-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance xf201-3p irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x204-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x208", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x204irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x204irt pro", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x224", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance x216", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance xf202-2p irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x202-2p irt pro", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x201-3p irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf204irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x204-2\u003c5.2.6" }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x206-1\u003c5.2.6" }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x208\u003c5.2.6" }, { "model": "scalance x208pro", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "5.2.6" }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x212-2\u003c5.2.6" }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x216\u003c5.2.6" }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x224\u003c5.2.6" }, { "model": "scalance xf201-3p irt", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance xf202-2p irt", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance xf204-2ba irt", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-51438" }, { "db": "NVD", "id": "CVE-2022-26649" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens reported these vulnerabilities to CISA.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-940" } ], "trust": 0.6 }, "cve": "CVE-2022-26649", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2022-26649", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.5, "id": "CNVD-2022-51438", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-26649", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "productcert@siemens.com", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2022-26649", "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-26649", "trust": 1.0, "value": "HIGH" }, { "author": "productcert@siemens.com", "id": "CVE-2022-26649", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2022-51438", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-940", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2022-26649", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-51438" }, { "db": "VULMON", "id": "CVE-2022-26649" }, { "db": "CNNVD", "id": "CNNVD-202207-940" }, { "db": "NVD", "id": "CVE-2022-26649" }, { "db": "NVD", "id": "CVE-2022-26649" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SCALANCE X200-4P IRT (All versions \u003c V5.5.2), SCALANCE X201-3P IRT (All versions \u003c V5.5.2), SCALANCE X201-3P IRT PRO (All versions \u003c V5.5.2), SCALANCE X202-2IRT (All versions \u003c V5.5.2), SCALANCE X202-2IRT (All versions \u003c V5.5.2), SCALANCE X202-2P IRT (All versions \u003c V5.5.2), SCALANCE X202-2P IRT PRO (All versions \u003c V5.5.2), SCALANCE X204-2 (All versions \u003c V5.2.6), SCALANCE X204-2FM (All versions \u003c V5.2.6), SCALANCE X204-2LD (All versions \u003c V5.2.6), SCALANCE X204-2LD TS (All versions \u003c V5.2.6), SCALANCE X204-2TS (All versions \u003c V5.2.6), SCALANCE X204IRT (All versions \u003c V5.5.2), SCALANCE X204IRT (All versions \u003c V5.5.2), SCALANCE X204IRT PRO (All versions \u003c V5.5.2), SCALANCE X206-1 (All versions \u003c V5.2.6), SCALANCE X206-1LD (All versions \u003c V5.2.6), SCALANCE X208 (All versions \u003c V5.2.6), SCALANCE X208PRO (All versions \u003c V5.2.6), SCALANCE X212-2 (All versions \u003c V5.2.6), SCALANCE X212-2LD (All versions \u003c V5.2.6), SCALANCE X216 (All versions \u003c V5.2.6), SCALANCE X224 (All versions \u003c V5.2.6), SCALANCE XF201-3P IRT (All versions \u003c V5.5.2), SCALANCE XF202-2P IRT (All versions \u003c V5.5.2), SCALANCE XF204 (All versions \u003c V5.2.6), SCALANCE XF204-2 (All versions \u003c V5.2.6), SCALANCE XF204-2BA IRT (All versions \u003c V5.5.2), SCALANCE XF204IRT (All versions \u003c V5.5.2), SCALANCE XF206-1 (All versions \u003c V5.2.6), SCALANCE XF208 (All versions \u003c V5.2.6). Affected devices do not properly validate the URI of incoming HTTP GET requests. This could allow an unauthenticated remote attacker to crash affected devices. Siemens SCALANCE X Switches is an industrial Ethernet switch product from Siemens (Siemens) in Germany", "sources": [ { "db": "NVD", "id": "CVE-2022-26649" }, { "db": "CNVD", "id": "CNVD-2022-51438" }, { "db": "VULMON", "id": "CVE-2022-26649" } ], "trust": 1.53 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-26649", "trust": 2.3 }, { "db": "SIEMENS", "id": "SSA-310038", "trust": 2.3 }, { "db": "ICS CERT", "id": "ICSA-22-195-01", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-51438", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022071408", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202207-940", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-26649", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-51438" }, { "db": "VULMON", "id": "CVE-2022-26649" }, { "db": "CNNVD", "id": "CNNVD-202207-940" }, { "db": "NVD", "id": "CVE-2022-26649" } ] }, "id": "VAR-202207-0556", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-51438" } ], "trust": 1.1104343616666665 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-51438" } ] }, "last_update_date": "2024-08-14T13:42:36.991000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Siemens SCALANCE X Switches Buffer Overflow Vulnerability (CNVD-2022-51438)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/339441" }, { "title": "Multiple Siemens SCALANCE Product security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=232912" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-51438" }, { "db": "CNNVD", "id": "CNNVD-202207-940" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-26649" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-310038.pdf" }, { "trust": 0.6, "url": "https://cert-portal.siemens.com/productcert/html/ssa-310038.html" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-26649/" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022071408" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-195-01" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/120.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-195-01" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-51438" }, { "db": "VULMON", "id": "CVE-2022-26649" }, { "db": "CNNVD", "id": "CNNVD-202207-940" }, { "db": "NVD", "id": "CVE-2022-26649" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-51438" }, { "db": "VULMON", "id": "CVE-2022-26649" }, { "db": "CNNVD", "id": "CNNVD-202207-940" }, { "db": "NVD", "id": "CVE-2022-26649" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-14T00:00:00", "db": "CNVD", "id": "CNVD-2022-51438" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-26649" }, { "date": "2022-07-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-940" }, { "date": "2022-07-12T10:15:10.367000", "db": "NVD", "id": "CVE-2022-26649" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-14T00:00:00", "db": "CNVD", "id": "CNVD-2022-51438" }, { "date": "2022-07-15T00:00:00", "db": "VULMON", "id": "CVE-2022-26649" }, { "date": "2023-04-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-940" }, { "date": "2023-04-11T10:15:14.387000", "db": "NVD", "id": "CVE-2022-26649" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-940" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens SCALANCE X Switches Buffer Overflow Vulnerability (CNVD-2022-51438)", "sources": [ { "db": "CNVD", "id": "CNVD-2022-51438" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-940" } ], "trust": 0.6 } }
var-202304-0694
Vulnerability from variot
A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT PRO (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2P IRT (All versions < V5.5.2), SCALANCE X202-2P IRT PRO (All versions < V5.5.2), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT PRO (All versions < V5.5.2), SCALANCE XF201-3P IRT (All versions < V5.5.2), SCALANCE XF202-2P IRT (All versions < V5.5.2), SCALANCE XF204-2BA IRT (All versions < V5.5.2), SCALANCE XF204IRT (All versions < V5.5.2), SIPLUS NET SCALANCE X202-2P IRT (All versions < V5.5.2). The SSH server on affected devices is configured to offer weak ciphers by default.
This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data passed over the connection between legitimate clients and the affected device. SCALANCE X200-4P IRT firmware, SCALANCE X201-3P IRT firmware, SCALANCE X201-3P IRT PRO Multiple Siemens products, including firmware, have vulnerabilities related to encryption strength.Information may be obtained and information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202304-0694", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance xf204irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.2" }, { "model": "scalance x201-3p irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.2" }, { "model": "scalance x204irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.2" }, { "model": "scalance xf202-2p irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.2" }, { "model": "scalance x204irt pro", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.2" }, { "model": "scalance xf201-3p irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.2" }, { "model": "scalance x202-2irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.2" }, { "model": "scalance x201-3p irt pro", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.2" }, { "model": "scalance x202-2p irt pro", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.2" }, { "model": "scalance xf204-2ba irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.2" }, { "model": "scalance x200-4p irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.2" }, { "model": "scalance x202-2p irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.2" }, { "model": "siplus net scalance x202-2p irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.2" }, { "model": "scalance x201-3p irt pro", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xf204irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x201-3p irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xf201-3p irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x200-4p irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xf204-2ba irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x204irt pro", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "siplus net scalance x202-2p irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xf202-2p irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x202-2irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x202-2p irt pro", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x202-2p irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x204irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-006528" }, { "db": "NVD", "id": "CVE-2023-29054" } ] }, "cve": "CVE-2023-29054", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "id": "CVE-2023-29054", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "HIGH", "attackVector": "ADJACENT", "author": "productcert@siemens.com", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 1.2, "id": "CVE-2023-29054", "impactScore": 5.5, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.4, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2023-29054", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2023-29054", "trust": 1.0, "value": "HIGH" }, { "author": "productcert@siemens.com", "id": "CVE-2023-29054", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2023-29054", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202304-793", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-006528" }, { "db": "CNNVD", "id": "CNNVD-202304-793" }, { "db": "NVD", "id": "CVE-2023-29054" }, { "db": "NVD", "id": "CVE-2023-29054" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SCALANCE X200-4P IRT (All versions \u003c V5.5.2), SCALANCE X201-3P IRT (All versions \u003c V5.5.2), SCALANCE X201-3P IRT PRO (All versions \u003c V5.5.2), SCALANCE X202-2IRT (All versions \u003c V5.5.2), SCALANCE X202-2IRT (All versions \u003c V5.5.2), SCALANCE X202-2P IRT (All versions \u003c V5.5.2), SCALANCE X202-2P IRT PRO (All versions \u003c V5.5.2), SCALANCE X204IRT (All versions \u003c V5.5.2), SCALANCE X204IRT (All versions \u003c V5.5.2), SCALANCE X204IRT PRO (All versions \u003c V5.5.2), SCALANCE XF201-3P IRT (All versions \u003c V5.5.2), SCALANCE XF202-2P IRT (All versions \u003c V5.5.2), SCALANCE XF204-2BA IRT (All versions \u003c V5.5.2), SCALANCE XF204IRT (All versions \u003c V5.5.2), SIPLUS NET SCALANCE X202-2P IRT (All versions \u003c V5.5.2). The SSH server on affected devices is configured to offer weak ciphers by default. \r\n\r\nThis could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data\r\npassed over the connection between legitimate clients and the affected device. SCALANCE X200-4P IRT firmware, SCALANCE X201-3P IRT firmware, SCALANCE X201-3P IRT PRO Multiple Siemens products, including firmware, have vulnerabilities related to encryption strength.Information may be obtained and information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2023-29054" }, { "db": "JVNDB", "id": "JVNDB-2023-006528" } ], "trust": 1.62 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2023-29054", "trust": 3.2 }, { "db": "SIEMENS", "id": "SSA-479249", "trust": 2.4 }, { "db": "ICS CERT", "id": "ICSA-23-103-05", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU94715153", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2023-006528", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202304-793", "trust": 0.6 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-006528" }, { "db": "CNNVD", "id": "CNNVD-202304-793" }, { "db": "NVD", "id": "CVE-2023-29054" } ] }, "id": "VAR-202304-0694", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.5252349089999999 }, "last_update_date": "2024-08-14T12:12:41.046000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Siemens SCALANCE Fixes for encryption problem vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=234432" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202304-793" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-326", "trust": 1.0 }, { "problemtype": "Inappropriate cryptographic strength (CWE-326) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-006528" }, { "db": "NVD", "id": "CVE-2023-29054" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-479249.pdf" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu94715153/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-29054" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-103-05" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2023-29054/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-006528" }, { "db": "CNNVD", "id": "CNNVD-202304-793" }, { "db": "NVD", "id": "CVE-2023-29054" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "JVNDB", "id": "JVNDB-2023-006528" }, { "db": "CNNVD", "id": "CNNVD-202304-793" }, { "db": "NVD", "id": "CVE-2023-29054" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-11-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-006528" }, { "date": "2023-04-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202304-793" }, { "date": "2023-04-11T10:15:18.517000", "db": "NVD", "id": "CVE-2023-29054" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-11-15T05:05:00", "db": "JVNDB", "id": "JVNDB-2023-006528" }, { "date": "2023-04-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202304-793" }, { "date": "2023-04-20T18:43:29.747000", "db": "NVD", "id": "CVE-2023-29054" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202304-793" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cryptographic strength vulnerabilities in multiple Siemens products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-006528" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202304-793" } ], "trust": 0.6 } }
var-201502-0113
Vulnerability from variot
The web server on Siemens SCALANCE X-200IRT switches with firmware before 5.2.0 allows remote attackers to hijack sessions via unspecified vectors. The Siemens SCALANCE X-200IRT is an industrial Ethernet switch from Siemens AG. A remote attacker can exploit this vulnerability to hijack a session. Siemens SCALANCE X-200IRT is prone to a user-impersonation vulnerability. An attacker can exploit this issue to impersonate arbitrary users and perform unauthorized actions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201502-0113", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance x-200 series", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "5.1.1" }, { "model": "scalance x-200 series", "scope": "lt", "trust": 0.8, "vendor": "siemens", "version": "5.2.0" }, { "model": "scalance x201-3p irt", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "none" }, { "model": "scalance x201-3p irt", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "pro" }, { "model": "scalance x202-2irt", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance x202-2p irt", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "none" }, { "model": "scalance x202-2p irt", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "pro" }, { "model": "scalance x204irt", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "none" }, { "model": "scalance x204irt", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "pro" }, { "model": "scalance xf204irt", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance x-200irt switches with", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "5.2.0" }, { "model": "scalance x-200 series", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "5.1.1" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "scalance x 200 series", "version": "*" }, { "model": "scalance x-200irt", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "5.1.2" }, { "model": "scalance x-200irt", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "5.1" }, { "model": "scalance x-200irt", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "5.2.0" } ], "sources": [ { "db": "IVD", "id": "6dbd3766-e28f-438e-b2d5-4c5a15eb4212" }, { "db": "IVD", "id": "a50f102a-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-00844" }, { "db": "BID", "id": "72512" }, { "db": "JVNDB", "id": "JVNDB-2015-001341" }, { "db": "CNNVD", "id": "CNNVD-201502-017" }, { "db": "NVD", "id": "CVE-2015-1049" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:siemens:scalance_x-200_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:siemens:scalance_x201-3p_irt", "vulnerable": true }, { "cpe22Uri": "cpe:/h:siemens:scalance_x202-2irt", "vulnerable": true }, { "cpe22Uri": "cpe:/h:siemens:scalance_x202-2p_irt", "vulnerable": true }, { "cpe22Uri": "cpe:/h:siemens:scalance_x204irt", "vulnerable": true }, { "cpe22Uri": "cpe:/h:siemens:scalance_xf204irt", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-001341" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "72512" } ], "trust": 0.3 }, "cve": "CVE-2015-1049", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2015-1049", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2015-00844", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "6dbd3766-e28f-438e-b2d5-4c5a15eb4212", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "a50f102a-2351-11e6-abef-000c29c66e3d", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-79009", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2015-1049", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2015-1049", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2015-00844", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201502-017", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "6dbd3766-e28f-438e-b2d5-4c5a15eb4212", "trust": 0.2, "value": "MEDIUM" }, { "author": "IVD", "id": "a50f102a-2351-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-79009", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2015-1049", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "6dbd3766-e28f-438e-b2d5-4c5a15eb4212" }, { "db": "IVD", "id": "a50f102a-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-00844" }, { "db": "VULHUB", "id": "VHN-79009" }, { "db": "VULMON", "id": "CVE-2015-1049" }, { "db": "JVNDB", "id": "JVNDB-2015-001341" }, { "db": "CNNVD", "id": "CNNVD-201502-017" }, { "db": "NVD", "id": "CVE-2015-1049" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The web server on Siemens SCALANCE X-200IRT switches with firmware before 5.2.0 allows remote attackers to hijack sessions via unspecified vectors. The Siemens SCALANCE X-200IRT is an industrial Ethernet switch from Siemens AG. A remote attacker can exploit this vulnerability to hijack a session. Siemens SCALANCE X-200IRT is prone to a user-impersonation vulnerability. \nAn attacker can exploit this issue to impersonate arbitrary users and perform unauthorized actions", "sources": [ { "db": "NVD", "id": "CVE-2015-1049" }, { "db": "JVNDB", "id": "JVNDB-2015-001341" }, { "db": "CNVD", "id": "CNVD-2015-00844" }, { "db": "BID", "id": "72512" }, { "db": "IVD", "id": "6dbd3766-e28f-438e-b2d5-4c5a15eb4212" }, { "db": "IVD", "id": "a50f102a-2351-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-79009" }, { "db": "VULMON", "id": "CVE-2015-1049" } ], "trust": 2.97 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-1049", "trust": 3.9 }, { "db": "SIEMENS", "id": "SSA-954136", "trust": 2.1 }, { "db": "CNNVD", "id": "CNNVD-201502-017", "trust": 1.1 }, { "db": "CNVD", "id": "CNVD-2015-00844", "trust": 1.0 }, { "db": "BID", "id": "72512", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2015-001341", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-15-034-01", "trust": 0.4 }, { "db": "IVD", "id": "6DBD3766-E28F-438E-B2D5-4C5A15EB4212", "trust": 0.2 }, { "db": "IVD", "id": "A50F102A-2351-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-79009", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2015-1049", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "6dbd3766-e28f-438e-b2d5-4c5a15eb4212" }, { "db": "IVD", "id": "a50f102a-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-00844" }, { "db": "VULHUB", "id": "VHN-79009" }, { "db": "VULMON", "id": "CVE-2015-1049" }, { "db": "BID", "id": "72512" }, { "db": "JVNDB", "id": "JVNDB-2015-001341" }, { "db": "CNNVD", "id": "CNNVD-201502-017" }, { "db": "NVD", "id": "CVE-2015-1049" } ] }, "id": "VAR-201502-0113", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "6dbd3766-e28f-438e-b2d5-4c5a15eb4212" }, { "db": "IVD", "id": "a50f102a-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-00844" }, { "db": "VULHUB", "id": "VHN-79009" } ], "trust": 1.703436866 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.4 } ], "sources": [ { "db": "IVD", "id": "6dbd3766-e28f-438e-b2d5-4c5a15eb4212" }, { "db": "IVD", "id": "a50f102a-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-00844" } ] }, "last_update_date": "2024-11-23T23:02:41.864000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-954136", "trust": 0.8, "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-954136.pdf" }, { "title": "Siemens SCALANCE X-200IRT Web Server Session Hijacking Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/54947" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00844" }, { "db": "JVNDB", "id": "JVNDB-2015-001341" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-79009" }, { "db": "JVNDB", "id": "JVNDB-2015-001341" }, { "db": "NVD", "id": "CVE-2015-1049" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-954136.pdf" }, { "trust": 1.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-954136.pdf" }, { "trust": 1.4, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-1049" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1049" }, { "trust": 0.4, "url": "https://ics-cert.us-cert.gov/advisories/icsa-15-034-01" }, { "trust": 0.3, "url": "http://www.automation.siemens.com/mcms/industrial-communication/en/ie/ie_switches_media-converters/pages/ie_switches_media-converters.aspx" }, { "trust": 0.3, "url": "http://www.siemens.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=37350" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00844" }, { "db": "VULHUB", "id": "VHN-79009" }, { "db": "VULMON", "id": "CVE-2015-1049" }, { "db": "BID", "id": "72512" }, { "db": "JVNDB", "id": "JVNDB-2015-001341" }, { "db": "CNNVD", "id": "CNNVD-201502-017" }, { "db": "NVD", "id": "CVE-2015-1049" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "6dbd3766-e28f-438e-b2d5-4c5a15eb4212" }, { "db": "IVD", "id": "a50f102a-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-00844" }, { "db": "VULHUB", "id": "VHN-79009" }, { "db": "VULMON", "id": "CVE-2015-1049" }, { "db": "BID", "id": "72512" }, { "db": "JVNDB", "id": "JVNDB-2015-001341" }, { "db": "CNNVD", "id": "CNNVD-201502-017" }, { "db": "NVD", "id": "CVE-2015-1049" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-02-04T00:00:00", "db": "IVD", "id": "6dbd3766-e28f-438e-b2d5-4c5a15eb4212" }, { "date": "2015-02-04T00:00:00", "db": "IVD", "id": "a50f102a-2351-11e6-abef-000c29c66e3d" }, { "date": "2015-02-04T00:00:00", "db": "CNVD", "id": "CNVD-2015-00844" }, { "date": "2015-02-02T00:00:00", "db": "VULHUB", "id": "VHN-79009" }, { "date": "2015-02-02T00:00:00", "db": "VULMON", "id": "CVE-2015-1049" }, { "date": "2015-02-03T00:00:00", "db": "BID", "id": "72512" }, { "date": "2015-02-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-001341" }, { "date": "2015-02-03T00:00:00", "db": "CNNVD", "id": "CNNVD-201502-017" }, { "date": "2015-02-02T15:59:01.973000", "db": "NVD", "id": "CVE-2015-1049" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-02-04T00:00:00", "db": "CNVD", "id": "CNVD-2015-00844" }, { "date": "2020-02-10T00:00:00", "db": "VULHUB", "id": "VHN-79009" }, { "date": "2020-02-10T00:00:00", "db": "VULMON", "id": "CVE-2015-1049" }, { "date": "2015-02-03T00:00:00", "db": "BID", "id": "72512" }, { "date": "2015-02-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-001341" }, { "date": "2020-02-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201502-017" }, { "date": "2024-11-21T02:24:32.573000", "db": "NVD", "id": "CVE-2015-1049" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201502-017" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens SCALANCE X-200IRT Web Server Session Hijacking Vulnerability", "sources": [ { "db": "IVD", "id": "6dbd3766-e28f-438e-b2d5-4c5a15eb4212" }, { "db": "IVD", "id": "a50f102a-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-00844" } ], "trust": 1.0 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201502-017" } ], "trust": 0.6 } }
var-202101-0138
Vulnerability from variot
A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0). The vulnerability could allow an unauthenticated attacker to reboot the device over the network by using special urls from integrated web server of the affected products. SCALANCE X-200 and SCALANCE X-200IRT A vulnerability exists in the switch family regarding the lack of authentication for critical features.Denial of service (DoS) It may be put into a state. SCALANCE X is a switch used to connect industrial components, such as programmable logic controllers (plc) or human machine interfaces (HMIs)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0138", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance xp216eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xb213-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xp216 \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x202-2pirt siplus net", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance xc216-4c g eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204-2ba dna", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc206-2g poe", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xb205-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc206-2sfp g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf201-3p irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x200-4pirt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance xc208g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x310", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf202-2p irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xp208eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x308-2lh\\+", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc208g poe", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc208", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x308-2", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x308-2m", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2g poe eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x308-2lh", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2sfp eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc208eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc224", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc216-4c g \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x310fe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp208 \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xp208", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x307-3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x201-3pirt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance x204irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance xb208", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x202-2pirt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance xp216poe eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xp216", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xb205-3ld", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x308-2ld", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x202-2irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance x320-3ldfe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc216", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc216-4c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc224-4c g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc206-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc224-4c g eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc216eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x307-3ld", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xb213-3ld", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc206-2sfp g \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc208g eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204 dna", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf206-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204-2ba irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc206-2sfp", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf208", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xp208poe eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x308-2m ts", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc216-4c g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xb216", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc208g \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x320-1fe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2sfp g eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc224-4c g \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x307-3ld", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x201-3pirt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x200-4pirt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x202-2pirt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x204irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "siplus net scalance x202-2pirt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x308-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x202-2irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x308-2ld", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x307-3", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x-200irt switch family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance switch family", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x-200" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02596" }, { "db": "JVNDB", "id": "JVNDB-2020-015540" }, { "db": "NVD", "id": "CVE-2020-15799" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens reported these vulnerabilities to CISA.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-856" } ], "trust": 0.6 }, "cve": "CVE-2020-15799", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2020-15799", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2021-02596", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2020-15799", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-15799", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-15799", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2020-15799", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2021-02596", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202101-856", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02596" }, { "db": "JVNDB", "id": "JVNDB-2020-015540" }, { "db": "CNNVD", "id": "CNNVD-202101-856" }, { "db": "NVD", "id": "CVE-2020-15799" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions \u003c V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions \u003c V5.5.0). The vulnerability could allow an unauthenticated attacker to reboot the device over the network by using special urls from integrated web server of the affected products. SCALANCE X-200 and SCALANCE X-200IRT A vulnerability exists in the switch family regarding the lack of authentication for critical features.Denial of service (DoS) It may be put into a state. SCALANCE X is a switch used to connect industrial components, such as programmable logic controllers (plc) or human machine interfaces (HMIs)", "sources": [ { "db": "NVD", "id": "CVE-2020-15799" }, { "db": "JVNDB", "id": "JVNDB-2020-015540" }, { "db": "CNVD", "id": "CNVD-2021-02596" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-15799", "trust": 3.0 }, { "db": "SIEMENS", "id": "SSA-139628", "trust": 2.2 }, { "db": "JVNDB", "id": "JVNDB-2020-015540", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-02596", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-21-012-05", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0127", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202101-856", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02596" }, { "db": "JVNDB", "id": "JVNDB-2020-015540" }, { "db": "CNNVD", "id": "CNNVD-202101-856" }, { "db": "NVD", "id": "CVE-2020-15799" } ] }, "id": "VAR-202101-0138", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-02596" } ], "trust": 1.2641418511111109 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02596" } ] }, "last_update_date": "2024-11-23T19:39:47.719000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-139628", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf" }, { "title": "Patch for Scalance X Products key function certification missing vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/244024" }, { "title": "Multiple Siemens SCALANCE Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139366" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02596" }, { "db": "JVNDB", "id": "JVNDB-2020-015540" }, { "db": "CNNVD", "id": "CNNVD-202101-856" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.0 }, { "problemtype": "Lack of authentication for important features (CWE-306) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015540" }, { "db": "NVD", "id": "CVE-2020-15799" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-15799" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-05" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0127/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02596" }, { "db": "JVNDB", "id": "JVNDB-2020-015540" }, { "db": "CNNVD", "id": "CNNVD-202101-856" }, { "db": "NVD", "id": "CVE-2020-15799" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-02596" }, { "db": "JVNDB", "id": "JVNDB-2020-015540" }, { "db": "CNNVD", "id": "CNNVD-202101-856" }, { "db": "NVD", "id": "CVE-2020-15799" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-13T00:00:00", "db": "CNVD", "id": "CNVD-2021-02596" }, { "date": "2021-10-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-015540" }, { "date": "2021-01-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-856" }, { "date": "2021-01-12T21:15:16.370000", "db": "NVD", "id": "CVE-2020-15799" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-02-04T00:00:00", "db": "CNVD", "id": "CNVD-2021-02596" }, { "date": "2021-10-04T05:21:00", "db": "JVNDB", "id": "JVNDB-2020-015540" }, { "date": "2021-09-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-856" }, { "date": "2024-11-21T05:06:12.267000", "db": "NVD", "id": "CVE-2020-15799" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-856" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SCALANCE\u00a0X-200\u00a0 and \u00a0SCALANCE\u00a0X-200IRT\u00a0 Vulnerability in lack of authentication for critical features in the switch family", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015540" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-856" } ], "trust": 0.6 } }
cve-2023-29054
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | SCALANCE X200-4P IRT |
Version: All versions < V5.5.2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:00:14.631Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-479249.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "SCALANCE X200-4P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X201-3P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X201-3P IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2P IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF201-3P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF202-2P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE X202-2P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SCALANCE X200-4P IRT (All versions \u003c V5.5.2), SCALANCE X201-3P IRT (All versions \u003c V5.5.2), SCALANCE X201-3P IRT PRO (All versions \u003c V5.5.2), SCALANCE X202-2IRT (All versions \u003c V5.5.2), SCALANCE X202-2IRT (All versions \u003c V5.5.2), SCALANCE X202-2P IRT (All versions \u003c V5.5.2), SCALANCE X202-2P IRT PRO (All versions \u003c V5.5.2), SCALANCE X204IRT (All versions \u003c V5.5.2), SCALANCE X204IRT (All versions \u003c V5.5.2), SCALANCE X204IRT PRO (All versions \u003c V5.5.2), SCALANCE XF201-3P IRT (All versions \u003c V5.5.2), SCALANCE XF202-2P IRT (All versions \u003c V5.5.2), SCALANCE XF204-2BA IRT (All versions \u003c V5.5.2), SCALANCE XF204IRT (All versions \u003c V5.5.2), SIPLUS NET SCALANCE X202-2P IRT (All versions \u003c V5.5.2). The SSH server on affected devices is configured to offer weak ciphers by default.\r\n\r\nThis could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data\r\npassed over the connection between legitimate clients and the affected device." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H/E:P/RL:U/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-326", "description": "CWE-326: Inadequate Encryption Strength", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-11T09:03:08.813Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-479249.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2023-29054", "datePublished": "2023-04-11T09:03:08.813Z", "dateReserved": "2023-03-30T12:04:26.539Z", "dateUpdated": "2024-08-02T14:00:14.631Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-40631
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | SCALANCE X200-4P IRT |
Version: All versions < V5.5.0 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:21:46.592Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-501891.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SCALANCE X200-4P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.0" } ] }, { "product": "SCALANCE X201-3P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.0" } ] }, { "product": "SCALANCE X201-3P IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.0" } ] }, { "product": "SCALANCE X202-2IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.0" } ] }, { "product": "SCALANCE X202-2P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.0" } ] }, { "product": "SCALANCE X202-2P IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.0" } ] }, { "product": "SCALANCE X204-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "product": "SCALANCE X204-2FM", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "product": "SCALANCE X204-2LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "product": "SCALANCE X204-2LD TS", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "product": "SCALANCE X204-2TS", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "product": "SCALANCE X204IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.0" } ] }, { "product": "SCALANCE X204IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.0" } ] }, { "product": "SCALANCE X206-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "product": "SCALANCE X206-1LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "product": "SCALANCE X208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "product": "SCALANCE X208PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "product": "SCALANCE X212-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "product": "SCALANCE X212-2LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "product": "SCALANCE X216", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "product": "SCALANCE X224", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "product": "SCALANCE XF201-3P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.0" } ] }, { "product": "SCALANCE XF202-2P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.0" } ] }, { "product": "SCALANCE XF204", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "product": "SCALANCE XF204-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "product": "SCALANCE XF204-2BA IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.0" } ] }, { "product": "SCALANCE XF204IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.0" } ] }, { "product": "SCALANCE XF206-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "product": "SCALANCE XF208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "product": "SIPLUS NET SCALANCE X202-2P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SCALANCE X200-4P IRT (All versions \u003c V5.5.0), SCALANCE X201-3P IRT (All versions \u003c V5.5.0), SCALANCE X201-3P IRT PRO (All versions \u003c V5.5.0), SCALANCE X202-2IRT (All versions \u003c V5.5.0), SCALANCE X202-2P IRT (All versions \u003c V5.5.0), SCALANCE X202-2P IRT PRO (All versions \u003c V5.5.0), SCALANCE X204-2 (All versions \u003c V5.2.5), SCALANCE X204-2FM (All versions \u003c V5.2.5), SCALANCE X204-2LD (All versions \u003c V5.2.5), SCALANCE X204-2LD TS (All versions \u003c V5.2.5), SCALANCE X204-2TS (All versions \u003c V5.2.5), SCALANCE X204IRT (All versions \u003c V5.5.0), SCALANCE X204IRT PRO (All versions \u003c V5.5.0), SCALANCE X206-1 (All versions \u003c V5.2.5), SCALANCE X206-1LD (All versions \u003c V5.2.5), SCALANCE X208 (All versions \u003c V5.2.5), SCALANCE X208PRO (All versions \u003c V5.2.5), SCALANCE X212-2 (All versions \u003c V5.2.5), SCALANCE X212-2LD (All versions \u003c V5.2.5), SCALANCE X216 (All versions \u003c V5.2.5), SCALANCE X224 (All versions \u003c V5.2.5), SCALANCE XF201-3P IRT (All versions \u003c V5.5.0), SCALANCE XF202-2P IRT (All versions \u003c V5.5.0), SCALANCE XF204 (All versions \u003c V5.2.5), SCALANCE XF204-2 (All versions \u003c V5.2.5), SCALANCE XF204-2BA IRT (All versions \u003c V5.5.0), SCALANCE XF204IRT (All versions \u003c V5.5.0), SCALANCE XF206-1 (All versions \u003c V5.2.5), SCALANCE XF208 (All versions \u003c V5.2.5), SIPLUS NET SCALANCE X202-2P IRT (All versions \u003c V5.5.0). There is a cross-site scripting vulnerability on the affected devices, that if used by a threat actor, it could result in session hijacking." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-11T00:00:00", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-501891.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-40631", "datePublished": "2022-10-11T00:00:00", "dateReserved": "2022-09-13T00:00:00", "dateUpdated": "2024-08-03T12:21:46.592Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-26648
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | SCALANCE X200-4P IRT |
Version: All versions < V5.5.2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:11:43.481Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-310038.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "SCALANCE X200-4P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X201-3P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X201-3P IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2P IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2FM", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2LD TS", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2TS", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X206-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X206-1LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X208PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X212-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X212-2LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X216", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X224", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF201-3P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF202-2P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF206-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SCALANCE X200-4P IRT (All versions \u003c V5.5.2), SCALANCE X201-3P IRT (All versions \u003c V5.5.2), SCALANCE X201-3P IRT PRO (All versions \u003c V5.5.2), SCALANCE X202-2IRT (All versions \u003c V5.5.2), SCALANCE X202-2IRT (All versions \u003c V5.5.2), SCALANCE X202-2P IRT (All versions \u003c V5.5.2), SCALANCE X202-2P IRT PRO (All versions \u003c V5.5.2), SCALANCE X204-2 (All versions \u003c V5.2.6), SCALANCE X204-2FM (All versions \u003c V5.2.6), SCALANCE X204-2LD (All versions \u003c V5.2.6), SCALANCE X204-2LD TS (All versions \u003c V5.2.6), SCALANCE X204-2TS (All versions \u003c V5.2.6), SCALANCE X204IRT (All versions \u003c V5.5.2), SCALANCE X204IRT (All versions \u003c V5.5.2), SCALANCE X204IRT PRO (All versions \u003c V5.5.2), SCALANCE X206-1 (All versions \u003c V5.2.6), SCALANCE X206-1LD (All versions \u003c V5.2.6), SCALANCE X208 (All versions \u003c V5.2.6), SCALANCE X208PRO (All versions \u003c V5.2.6), SCALANCE X212-2 (All versions \u003c V5.2.6), SCALANCE X212-2LD (All versions \u003c V5.2.6), SCALANCE X216 (All versions \u003c V5.2.6), SCALANCE X224 (All versions \u003c V5.2.6), SCALANCE XF201-3P IRT (All versions \u003c V5.5.2), SCALANCE XF202-2P IRT (All versions \u003c V5.5.2), SCALANCE XF204 (All versions \u003c V5.2.6), SCALANCE XF204-2 (All versions \u003c V5.2.6), SCALANCE XF204-2BA IRT (All versions \u003c V5.5.2), SCALANCE XF204IRT (All versions \u003c V5.5.2), SCALANCE XF206-1 (All versions \u003c V5.2.6), SCALANCE XF208 (All versions \u003c V5.2.6). Affected devices do not properly validate the GET parameter XNo of incoming HTTP requests. This could allow an unauthenticated remote attacker to crash affected devices." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-11T09:02:20.560Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-310038.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-26648", "datePublished": "2022-07-12T10:06:34", "dateReserved": "2022-03-07T00:00:00", "dateUpdated": "2024-08-03T05:11:43.481Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-13946
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2019-13946", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-09T18:06:01.358486Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-09T18:06:09.778Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-05T00:05:44.023Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-780073.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-780073.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V4.5" } ] }, { "defaultStatus": "unknown", "product": "Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V4.6" } ] }, { "defaultStatus": "unknown", "product": "PROFINET Driver for Controller", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V2.1" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 family", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 LAN-Router", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W-700 IEEE 802.11n family", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c= V6.0.1" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X200-4P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X201-3P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X201-3P IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2P IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2FM", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2LD TS", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2TS", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X206-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X206-1LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X208PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X212-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X212-2LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X216", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X224", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (230V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (24V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (2x 230V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (2x 230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (2x 24V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (2x 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X304-2FE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X306-1LD FE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (230V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (24V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (2x 230V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (2x 230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (2x 24V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (2x 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-3LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-3LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LH", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LH", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LH+", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LH+", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M PoE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M PoE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M TS", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M TS", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X310", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X310", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X310FE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X310FE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X320-1 FE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X320-1-2LD FE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X408-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB-200 family", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC-200", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF-200BA", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF201-3P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF202-2P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.3" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF206-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM-400 family", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V6.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP-200", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR-300WG family", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR-500 family", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V6.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (230V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (230V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (230V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (230V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M TS (24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M TS (24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M PoE (230V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M PoE (230V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M PoE (24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M PoE (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M PoE TS (24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 1616 and CP 1604", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V2.8" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 343-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 343-1 Advanced", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 343-1 ERPC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 343-1 Lean", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 443-1", "vendor": "Siemens", "versions": [ { "lessThan": "V3.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 443-1", "vendor": "Siemens", "versions": [ { "lessThan": "V3.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 443-1 Advanced", "vendor": "Siemens", "versions": [ { "lessThan": "V3.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 443-1 OPC UA", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET 200AL IM 157-1 PN", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET 200M IM 153-4 PN IO HF (incl. SIPLUS variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET 200M IM 153-4 PN IO ST (incl. SIPLUS variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET 200MP IM 155-5 PN HF", "vendor": "Siemens", "versions": [ { "lessThan": "V4.2.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET 200MP IM 155-5 PN ST", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET 200pro IM 154-3 PN HF", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET 200pro IM 154-4 PN HF", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET 200SP IM 155-6 PN BA", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET 200SP IM 155-6 PN HF", "vendor": "Siemens", "versions": [ { "lessThan": "V4.2.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET 200SP IM 155-6 PN ST", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET 200SP IM 155-6 PN ST BA", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET200ecoPN, 16DI, DC24V, 8xM12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET200ecoPN, 16DO DC24V/1,3A, 8xM12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET200ecoPN, 4AO U/I 4xM12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET200ecoPN, 8 DIO, DC24V/1,3A, 8xM12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET200ecoPN, 8 DO, DC24V/2A, 8xM12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET200ecoPN, 8AI RTD/TC 8xM12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET200ecoPN, 8AI; 4 U/I; 4 RTD/TC 8xM12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET200ecoPN, 8DI, DC24V, 4xM12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET200ecoPN, 8DI, DC24V, 8xM12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET200ecoPN, 8DO, DC24V/0,5A, 4xM12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET200ecoPN, 8DO, DC24V/1,3A, 4xM12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET200ecoPN, 8DO, DC24V/1,3A, 8xM12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET200ecoPN: IO-Link Master", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC ET200S (incl. SIPLUS variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC IPC Support, Package for VxWorks", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC MV420 SR-B", "vendor": "Siemens", "versions": [ { "lessThan": "V7.0.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC MV420 SR-B Body", "vendor": "Siemens", "versions": [ { "lessThan": "V7.0.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC MV420 SR-P", "vendor": "Siemens", "versions": [ { "lessThan": "V7.0.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC MV420 SR-P Body", "vendor": "Siemens", "versions": [ { "lessThan": "V7.0.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC MV440 HR", "vendor": "Siemens", "versions": [ { "lessThan": "V7.0.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC MV440 SR", "vendor": "Siemens", "versions": [ { "lessThan": "V7.0.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC MV440 UR", "vendor": "Siemens", "versions": [ { "lessThan": "V7.0.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC PN/PN Coupler (incl. SIPLUS NET variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC RF180C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC RF182C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC RF600R family", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3" } ] }, { "defaultStatus": "unknown", "product": "SIMOTION C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.5" } ] }, { "defaultStatus": "unknown", "product": "SIMOTION D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.5" } ] }, { "defaultStatus": "unknown", "product": "SIMOTION P", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.5" } ] }, { "defaultStatus": "unknown", "product": "SINAMICS DCP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V1.3" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200MP IM 155-5 PN HF", "vendor": "Siemens", "versions": [ { "lessThan": "V4.2.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200MP IM 155-5 PN HF", "vendor": "Siemens", "versions": [ { "lessThan": "V4.2.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL", "vendor": "Siemens", "versions": [ { "lessThan": "V4.2.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200MP IM 155-5 PN ST", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200MP IM 155-5 PN ST TX RAIL", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200SP IM 155-6 PN HF", "vendor": "Siemens", "versions": [ { "lessThan": "V4.2.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200SP IM 155-6 PN HF", "vendor": "Siemens", "versions": [ { "lessThan": "V4.2.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL", "vendor": "Siemens", "versions": [ { "lessThan": "V4.2.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200SP IM 155-6 PN ST", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200SP IM 155-6 PN ST BA", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS ET 200SP IM 155-6 PN ST TX RAIL", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET CP 343-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET CP 343-1 Advanced", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET CP 343-1 Lean", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET CP 443-1", "vendor": "Siemens", "versions": [ { "lessThan": "V3.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET CP 443-1 Advanced", "vendor": "Siemens", "versions": [ { "lessThan": "V3.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE X308-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SOFTNET-IE PNIO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Profinet-IO (PNIO) stack versions prior V06.00 do not properly limit\ninternal resource allocation when multiple legitimate diagnostic package\nrequests are sent to the DCE-RPC interface.\nThis could lead to a denial of service condition due to lack of memory\nfor devices that include a vulnerable version of the stack.\n\nThe security vulnerability could be exploited by an attacker with network\naccess to an affected device. Successful exploitation requires no system\nprivileges and no user interaction. An attacker could use the vulnerability\nto compromise the availability of the device." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-09T12:03:58.088Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-780073.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-780073.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-13946", "datePublished": "2020-02-11T15:36:10", "dateReserved": "2019-07-18T00:00:00", "dateUpdated": "2024-08-05T00:05:44.023Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-28400
Vulnerability from cvelistv5
8.7 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller |
Version: All versions |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:seimens:scalance_m812-1_adsl-router_annex_b:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m812-1_adsl-router_annex_b", "vendor": "seimens", "versions": [ { "status": "affected", "version": "0" } ] }, { "cpes": [ "cpe:2.3:a:siemens:development_evaluation_kits_for_profinet_io_dk_standard_ethernet_controller:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "development_evaluation_kits_for_profinet_io_dk_standard_ethernet_controller", "vendor": "siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:development_evaluation_kits_for_profinet_io_ek_ertec_200:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "development_evaluation_kits_for_profinet_io_ek_ertec_200", "vendor": "siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:development_evaluation_kits_for_profinet_io_ek_ertec_200p:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "development_evaluation_kits_for_profinet_io_ek_ertec_200p", "vendor": "siemens", "versions": [ { "lessThan": "v4.7", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:ruggedcom_rm1224:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ruggedcom_rm1224", "vendor": "siemens", "versions": [ { "lessThan": "v6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:scalance_m804pb:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m804pb", "vendor": "siemens", "versions": [ { "lessThan": "v6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:seimens:scalance_m812-1_adsl-router_annex_a:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m812-1_adsl-router_annex_a", "vendor": "seimens", "versions": [ { "lessThan": "v6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:seimens:scalance_m812-1_adsl-router_annex_b:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m812-1_adsl-router_annex_b", "vendor": "seimens", "versions": [ { "lessThan": "6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_m816_1_adsl_router_annex_a:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m816_1_adsl_router_annex_a", "vendor": "siemens", "versions": [ { "lessThan": "v6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_m816-1_adsl-router_annex_b:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m816-1_adsl-router_annex_b", "vendor": "siemens", "versions": [ { "lessThan": "v6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_m826-2_shdsl-router:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m826-2_shdsl-router", "vendor": "siemens", "versions": [ { "lessThan": "v6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalence_m874_2:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalence_m874_2", "vendor": "siemens", "versions": [ { "lessThan": "v6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalence_m874_3:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalence_m874_3", "vendor": "siemens", "versions": [ { "lessThan": "v6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_m876_3_evdo:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m876_3_evdo", "vendor": "siemens", "versions": [ { "lessThan": "v6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_m876_3_rok:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m876_3_rok", "vendor": "siemens", "versions": [ { "lessThan": "6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_m876_4_eu:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m876_4_eu", "vendor": "siemens", "versions": [ { "lessThan": "6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_m876_4_nam:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_m876_4_nam", "vendor": "siemens", "versions": [ { "lessThan": "v6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:scalance_s615:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_s615", "vendor": "siemens", "versions": [ { "lessThan": "v6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_w700_ieee_802.11n_family:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_w700_ieee_802.11n_family", "vendor": "siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_w1748_1_m12:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_w1748_1_m12", "vendor": "siemens", "versions": [ { "lessThan": "v3.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_w1788_1_m12:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_w1788_1_m12", "vendor": "siemens", "versions": [ { "lessThan": "v3.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_w1788_2_eec_m12:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_w1788_2_eec_m12", "vendor": "siemens", "versions": [ { "lessThan": "v3.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_w1788_2_m12:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_w1788_2_m12", "vendor": "siemens", "versions": [ { "lessThan": "v3.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_w1788_2ia_m12:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_w1788_2ia_m12", "vendor": "siemens", "versions": [ { "lessThan": "v3.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_x200_4p_irt:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_x200_4p_irt", "vendor": "siemens", "versions": [ { "lessThan": "v5.5.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_x201_3p_irt:0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_x201_3p_irt", "vendor": "siemens", "versions": [ { "lessThan": "v5.5.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalance_x201_3p_irt_pro:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalance_x201_3p_irt_pro", "vendor": "siemens", "versions": [ { "lessThan": "v5.5.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalancce_x202_2p_irt:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalancce_x202_2p_irt", "vendor": "siemens", "versions": [ { "lessThan": "v5.5.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalence_202_2p_irt_pro:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalence_202_2p_irt_pro", "vendor": "siemens", "versions": [ { "lessThan": "v5.5.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalancce_x204_2:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalancce_x204_2", "vendor": "siemens", "versions": [ { "lessThan": "v5.25", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalence_x204_2fm:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalence_x204_2fm", "vendor": "siemens", "versions": [ { "lessThan": "v5.25", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalence_x204_2ld:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalence_x204_2ld", "vendor": "siemens", "versions": [ { "lessThan": "v5.25", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalence_x204_2ld_ts:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalence_x204_2ld_ts", "vendor": "siemens", "versions": [ { "lessThan": "v5.25", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:scalence_x204_2ts:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "scalence_x204_2ts", "vendor": "siemens", "versions": [ { "lessThan": "v5.25", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2020-28400", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-13T18:59:11.953107Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-24T18:07:44.485Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-04T16:33:59.218Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-599968.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-194-03" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-599968.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.7" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) EU", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RM1224 LTE(4G) NAM", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M804PB", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M812-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M816-1 ADSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M826-2 SHDSL-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-2", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M874-3 3G-Router (CN)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-3 (ROK)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE M876-4 (NAM)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (A1)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (B1)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM853-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (A1)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (B1)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (CN)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (EU)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE MUM856-1 (RoW)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 EEC LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE S615 LAN-Router", "vendor": "Siemens", "versions": [ { "lessThan": "V6.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-2 EEC M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-2 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W1788-2IA M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W721-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W721-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W722-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W722-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W722-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W734-1 RJ45 (USA)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W738-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W738-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W748-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W761-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W761-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W774-1 RJ45 (USA)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W778-1 M12 EEC (USA)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2 SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2IA RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W786-2IA RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-1 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 M12 EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE W788-2 RJ45", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X200-4P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X201-3P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X201-3P IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2P IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2FM", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2LD", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2LD TS", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2TS", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X206-1", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X206-1LD", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X208", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X208PRO", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X212-2", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X212-2LD", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X216", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X224", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (230V, coated)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (230V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (24V, coated)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (24V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (2x 230V, coated)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (2x 230V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (2x 24V, coated)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (2x 24V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X304-2FE", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X306-1LD FE", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (230V, coated)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (230V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (24V, coated)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (24V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (2x 230V, coated)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (2x 230V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (2x 24V, coated)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (2x 24V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-3", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-3", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-3LD", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-3LD", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LD", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LD", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LH", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LH", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LH+", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LH+", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M PoE", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M PoE", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M TS", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M TS", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X310", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X310", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X310FE", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X310FE", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X320-1 FE", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X320-1-2LD FE", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X408-2", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (SC, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3LD (SC, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3LD (SC, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB208 (E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB208 (PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (SC, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (SC, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (ST, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3LD (SC, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3LD (SC, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB216 (E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB216 (PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2 (SC)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2 (ST/BFOC)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE EEC (54 V DC)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G (EIP DEF.)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G (EIP def.)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G PoE", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-3G PoE", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-3G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G (EIP Def.)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G (EIP Def.)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF201-3P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF202-2P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204 DNA", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA DNA", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF206-1", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF208", "vendor": "Siemens", "versions": [ { "lessThan": "V5.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-4C", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-4C (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-8C", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-8C (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM416-4C", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM416-4C (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208 (Ethernet/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208PoE EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216 (Ethernet/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216POE EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (230V, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (230V, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (230V, ports on rear)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (230V, ports on rear)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (24V, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (24V, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M TS (24V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M TS (24V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (24V, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (24V, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 24V, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 24V, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 24V, ports on rear)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 24V, ports on rear)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M PoE (230V, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M PoE (230V, ports on rear)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M PoE (24V, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M PoE (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M PoE TS (24V, ports on front)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324WG (24 x FE, AC 230V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324WG (24 X FE, DC 24V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR326-2C PoE WG", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR326-2C PoE WG (without UL)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (28xGE, AC 230V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (28xGE, DC 24V)", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 1x230V", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 1x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 24V", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 24V (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 2x230V", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 2x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 1x230V", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 1x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 24V", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 24V (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 2x230V", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 2x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (2HR2, L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (2HR2)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2, L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CFU DIQ", "vendor": "Siemens", "versions": [ { "lessThan": "V2.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CFU PA", "vendor": "Siemens", "versions": [ { "lessThan": "V2.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CM 1542-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 1604", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003e= V2.7" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 1616", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003e= V2.7" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 1626", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC IE/PB-LINK", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "V3", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC MV540 H", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC MV540 S", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC MV550 H", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC MV550 S", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC MV560 U", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC MV560 X", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.0" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC NET DK-16xx PN IO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003e= V2.7" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC Power Line Booster PLB, Base Module", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC PROFINET Driver", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.3" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC S7-1200 CPU family (incl. SIPLUS variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V4.5" } ] }, { "defaultStatus": "unknown", "product": "SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V1.1.3" } ] }, { "defaultStatus": "unknown", "product": "SIMOCODE pro V PROFINET (incl. SIPLUS variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.1.3" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE X308-2", "vendor": "Siemens", "versions": [ { "lessThan": "V4.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC206-2", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC206-2SFP", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC208", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC216-4C", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SOFTNET-IE PNIO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Affected devices contain a vulnerability that allows an unauthenticated attacker to trigger a denial of service condition. The vulnerability can be triggered if a large amount of DCP reset packets are sent to the device." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "cvssV4_0": { "baseScore": 8.7, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "version": "4.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770: Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-10T13:53:22.763Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-599968.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-194-03" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-599968.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2020-28400", "datePublished": "2021-07-13T11:02:49", "dateReserved": "2020-11-10T00:00:00", "dateUpdated": "2024-12-10T13:53:22.763Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-26647
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | SCALANCE X200-4P IRT |
Version: All versions < V5.5.2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:11:43.345Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-310038.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "SCALANCE X200-4P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X201-3P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X201-3P IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2P IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2FM", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2LD TS", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2TS", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X206-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X206-1LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X208PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X212-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X212-2LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X216", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X224", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF201-3P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF202-2P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF206-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SCALANCE X200-4P IRT (All versions \u003c V5.5.2), SCALANCE X201-3P IRT (All versions \u003c V5.5.2), SCALANCE X201-3P IRT PRO (All versions \u003c V5.5.2), SCALANCE X202-2IRT (All versions \u003c V5.5.2), SCALANCE X202-2IRT (All versions \u003c V5.5.2), SCALANCE X202-2P IRT (All versions \u003c V5.5.2), SCALANCE X202-2P IRT PRO (All versions \u003c V5.5.2), SCALANCE X204-2 (All versions \u003c V5.2.6), SCALANCE X204-2FM (All versions \u003c V5.2.6), SCALANCE X204-2LD (All versions \u003c V5.2.6), SCALANCE X204-2LD TS (All versions \u003c V5.2.6), SCALANCE X204-2TS (All versions \u003c V5.2.6), SCALANCE X204IRT (All versions \u003c V5.5.2), SCALANCE X204IRT (All versions \u003c V5.5.2), SCALANCE X204IRT PRO (All versions \u003c V5.5.2), SCALANCE X206-1 (All versions \u003c V5.2.6), SCALANCE X206-1LD (All versions \u003c V5.2.6), SCALANCE X208 (All versions \u003c V5.2.6), SCALANCE X208PRO (All versions \u003c V5.2.6), SCALANCE X212-2 (All versions \u003c V5.2.6), SCALANCE X212-2LD (All versions \u003c V5.2.6), SCALANCE X216 (All versions \u003c V5.2.6), SCALANCE X224 (All versions \u003c V5.2.6), SCALANCE XF201-3P IRT (All versions \u003c V5.5.2), SCALANCE XF202-2P IRT (All versions \u003c V5.5.2), SCALANCE XF204 (All versions \u003c V5.2.6), SCALANCE XF204-2 (All versions \u003c V5.2.6), SCALANCE XF204-2BA IRT (All versions \u003c V5.5.2), SCALANCE XF204IRT (All versions \u003c V5.5.2), SCALANCE XF206-1 (All versions \u003c V5.2.6), SCALANCE XF208 (All versions \u003c V5.2.6). The webserver of affected devices calculates session ids and nonces in an insecure manner. This could allow an unauthenticated remote attacker to brute-force session ids and hijack existing sessions." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-330", "description": "CWE-330: Use of Insufficiently Random Values", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-11T09:02:19.204Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-310038.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-26647", "datePublished": "2022-07-12T10:06:32", "dateReserved": "2022-03-07T00:00:00", "dateUpdated": "2024-08-03T05:11:43.345Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-19301
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | SCALANCE X200-4P IRT |
Version: All versions < V5.5.0 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:16:46.705Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-102233.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "SCALANCE X200-4P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X201-3P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X201-3P IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2P IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2FM", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2LD TS", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2TS", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X206-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X206-1LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X208PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X212-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X212-2LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X216", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X224", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (230V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (24V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (2x 230V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (2x 230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (2x 24V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X302-7 EEC (2x 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X304-2FE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X306-1LD FE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (230V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (24V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (2x 230V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (2x 230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (2x 24V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-2 EEC (2x 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-3LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X307-3LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LH", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LH", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LH+", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2LH+", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M PoE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M PoE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M TS", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X308-2M TS", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X310", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X310", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X310FE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X310FE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X320-1 FE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X320-1-2LD FE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X408-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF201-3P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF202-2P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.0" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF206-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (230V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (230V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (230V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (230V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M TS (24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-12M TS (24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M EEC (2x 24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M PoE (230V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M PoE (230V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M PoE (24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M PoE (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324-4M PoE TS (24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 343-1 Advanced", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 442-1 RNA", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V1.5.18" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 443-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.3" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 443-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.3" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 443-1 Advanced", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.3" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC CP 443-1 RNA", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V1.5.18" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC RF180C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC RF182C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET CP 343-1 Advanced", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET CP 443-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.3" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET CP 443-1 Advanced", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.3" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE X308-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.4" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SCALANCE X200-4P IRT, SCALANCE X201-3P IRT, SCALANCE X201-3P IRT PRO, SCALANCE X202-2IRT, SCALANCE X202-2P IRT, SCALANCE X202-2P IRT PRO, SCALANCE X204-2, SCALANCE X204-2FM, SCALANCE X204-2LD, SCALANCE X204-2LD TS, SCALANCE X204-2TS, SCALANCE X204IRT, SCALANCE X204IRT PRO, SCALANCE X206-1, SCALANCE X206-1LD, SCALANCE X208, SCALANCE X208PRO, SCALANCE X212-2, SCALANCE X212-2LD, SCALANCE X216, SCALANCE X224, SCALANCE X302-7 EEC (230V, coated), SCALANCE X302-7 EEC (230V), SCALANCE X302-7 EEC (24V, coated), SCALANCE X302-7 EEC (24V), SCALANCE X302-7 EEC (2x 230V, coated), SCALANCE X302-7 EEC (2x 230V), SCALANCE X302-7 EEC (2x 24V, coated), SCALANCE X302-7 EEC (2x 24V), SCALANCE X304-2FE, SCALANCE X306-1LD FE, SCALANCE X307-2 EEC (230V, coated), SCALANCE X307-2 EEC (230V), SCALANCE X307-2 EEC (24V, coated), SCALANCE X307-2 EEC (24V), SCALANCE X307-2 EEC (2x 230V, coated), SCALANCE X307-2 EEC (2x 230V), SCALANCE X307-2 EEC (2x 24V, coated), SCALANCE X307-2 EEC (2x 24V), SCALANCE X307-3, SCALANCE X307-3, SCALANCE X307-3LD, SCALANCE X307-3LD, SCALANCE X308-2, SCALANCE X308-2, SCALANCE X308-2LD, SCALANCE X308-2LD, SCALANCE X308-2LH, SCALANCE X308-2LH, SCALANCE X308-2LH+, SCALANCE X308-2LH+, SCALANCE X308-2M, SCALANCE X308-2M, SCALANCE X308-2M PoE, SCALANCE X308-2M PoE, SCALANCE X308-2M TS, SCALANCE X308-2M TS, SCALANCE X310, SCALANCE X310, SCALANCE X310FE, SCALANCE X310FE, SCALANCE X320-1 FE, SCALANCE X320-1-2LD FE, SCALANCE X408-2, SCALANCE XF201-3P IRT, SCALANCE XF202-2P IRT, SCALANCE XF204, SCALANCE XF204-2, SCALANCE XF204-2BA IRT, SCALANCE XF204IRT, SCALANCE XF206-1, SCALANCE XF208, SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M TS (24V), SCALANCE XR324-12M TS (24V), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M PoE (230V, ports on front), SCALANCE XR324-4M PoE (230V, ports on rear), SCALANCE XR324-4M PoE (24V, ports on front), SCALANCE XR324-4M PoE (24V, ports on rear), SCALANCE XR324-4M PoE TS (24V, ports on front), SIMATIC CP 343-1 Advanced, SIMATIC CP 442-1 RNA, SIMATIC CP 443-1, SIMATIC CP 443-1, SIMATIC CP 443-1 Advanced, SIMATIC CP 443-1 RNA, SIMATIC RF180C, SIMATIC RF182C, SIPLUS NET CP 343-1 Advanced, SIPLUS NET CP 443-1, SIPLUS NET CP 443-1 Advanced, SIPLUS NET SCALANCE X308-2. The VxWorks-based Profinet TCP Stack can be forced to make very expensive calls for every incoming packet which can lead to a denial of service." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:U/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-11T09:01:51.207Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-102233.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-19301", "datePublished": "2020-04-14T19:50:54", "dateReserved": "2019-11-26T00:00:00", "dateUpdated": "2024-08-05T02:16:46.705Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-26649
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | SCALANCE X200-4P IRT |
Version: All versions < V5.5.2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:11:43.372Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-310038.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "SCALANCE X200-4P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X201-3P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X201-3P IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X202-2P IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2FM", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2LD TS", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204-2TS", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X204IRT PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X206-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X206-1LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X208PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X212-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X212-2LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X216", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE X224", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF201-3P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF202-2P IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204IRT", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.2" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF206-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SCALANCE X200-4P IRT (All versions \u003c V5.5.2), SCALANCE X201-3P IRT (All versions \u003c V5.5.2), SCALANCE X201-3P IRT PRO (All versions \u003c V5.5.2), SCALANCE X202-2IRT (All versions \u003c V5.5.2), SCALANCE X202-2IRT (All versions \u003c V5.5.2), SCALANCE X202-2P IRT (All versions \u003c V5.5.2), SCALANCE X202-2P IRT PRO (All versions \u003c V5.5.2), SCALANCE X204-2 (All versions \u003c V5.2.6), SCALANCE X204-2FM (All versions \u003c V5.2.6), SCALANCE X204-2LD (All versions \u003c V5.2.6), SCALANCE X204-2LD TS (All versions \u003c V5.2.6), SCALANCE X204-2TS (All versions \u003c V5.2.6), SCALANCE X204IRT (All versions \u003c V5.5.2), SCALANCE X204IRT (All versions \u003c V5.5.2), SCALANCE X204IRT PRO (All versions \u003c V5.5.2), SCALANCE X206-1 (All versions \u003c V5.2.6), SCALANCE X206-1LD (All versions \u003c V5.2.6), SCALANCE X208 (All versions \u003c V5.2.6), SCALANCE X208PRO (All versions \u003c V5.2.6), SCALANCE X212-2 (All versions \u003c V5.2.6), SCALANCE X212-2LD (All versions \u003c V5.2.6), SCALANCE X216 (All versions \u003c V5.2.6), SCALANCE X224 (All versions \u003c V5.2.6), SCALANCE XF201-3P IRT (All versions \u003c V5.5.2), SCALANCE XF202-2P IRT (All versions \u003c V5.5.2), SCALANCE XF204 (All versions \u003c V5.2.6), SCALANCE XF204-2 (All versions \u003c V5.2.6), SCALANCE XF204-2BA IRT (All versions \u003c V5.5.2), SCALANCE XF204IRT (All versions \u003c V5.5.2), SCALANCE XF206-1 (All versions \u003c V5.2.6), SCALANCE XF208 (All versions \u003c V5.2.6). Affected devices do not properly validate the URI of incoming HTTP GET requests. This could allow an unauthenticated remote attacker to crash affected devices." } ], "metrics": [ { "cvssV3_1": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-11T09:02:21.918Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-310038.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-26649", "datePublished": "2022-07-12T10:06:35", "dateReserved": "2022-03-07T00:00:00", "dateUpdated": "2024-08-03T05:11:43.372Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }