{"uuid": "dc045c66-be2b-486b-a286-ae340a83bd9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29054", "type": "seen", "source": "https://t.me/cibsecurity/61846", "content": "\u203c CVE-2023-29054 \u203c\n\nA vulnerability has been identified in SCALANCE X200-4P IRT (All versions &lt; V5.5.2), SCALANCE X201-3P IRT (All versions &lt; V5.5.2), SCALANCE X201-3P IRT PRO (All versions &lt; V5.5.2), SCALANCE X202-2IRT (All versions &lt; V5.5.2), SCALANCE X202-2IRT (All versions &lt; V5.5.2), SCALANCE X202-2P IRT (All versions &lt; V5.5.2), SCALANCE X202-2P IRT PRO (All versions &lt; V5.5.2), SCALANCE X204IRT (All versions &lt; V5.5.2), SCALANCE X204IRT (All versions &lt; V5.5.2), SCALANCE X204IRT PRO (All versions &lt; V5.5.2), SCALANCE XF201-3P IRT (All versions &lt; V5.5.2), SCALANCE XF202-2P IRT (All versions &lt; V5.5.2), SCALANCE XF204-2BA IRT (All versions &lt; V5.5.2), SCALANCE XF204IRT (All versions &lt; V5.5.2), SIPLUS NET SCALANCE X202-2P IRT (All versions &lt; V5.5.2). The SSH server on affected devices is configured to offer weak ciphers by default. This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data passed over the connection between legitimate clients and the affected device.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-11T14:23:27.000000Z"}