Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2020-25226
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | SCALANCE X-200 switch family (incl. SIPLUS NET variants) |
Version: All versions < V5.2.5 |
||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T15:33:04.885Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "SCALANCE X-200 switch family (incl. SIPLUS NET variants)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V5.2.5", }, ], }, { product: "SCALANCE X-200IRT switch family (incl. SIPLUS NET variants)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V5.5.0", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0). The web server of the affected devices contains a vulnerability that may lead to a buffer overflow condition. An attacker could cause this condition on the webserver by sending a specially crafted request. The webserver could stop and not recover anymore.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-122", description: "CWE-122: Heap-based Buffer Overflow", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-09-14T10:47:10", orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", shortName: "siemens", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "productcert@siemens.com", ID: "CVE-2020-25226", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "SCALANCE X-200 switch family (incl. SIPLUS NET variants)", version: { version_data: [ { version_value: "All versions < V5.2.5", }, ], }, }, { product_name: "SCALANCE X-200IRT switch family (incl. SIPLUS NET variants)", version: { version_data: [ { version_value: "All versions < V5.5.0", }, ], }, }, ], }, vendor_name: "Siemens", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0). The web server of the affected devices contains a vulnerability that may lead to a buffer overflow condition. An attacker could cause this condition on the webserver by sending a specially crafted request. The webserver could stop and not recover anymore.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-122: Heap-based Buffer Overflow", }, ], }, ], }, references: { reference_data: [ { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf", refsource: "MISC", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", assignerShortName: "siemens", cveId: "CVE-2020-25226", datePublished: "2021-01-12T20:18:33", dateReserved: "2020-09-10T00:00:00", dateUpdated: "2024-08-04T15:33:04.885Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2020-25226\",\"sourceIdentifier\":\"productcert@siemens.com\",\"published\":\"2021-01-12T21:15:16.543\",\"lastModified\":\"2024-11-21T05:17:42.257\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0). The web server of the affected devices contains a vulnerability that may lead to a buffer overflow condition. An attacker could cause this condition on the webserver by sending a specially crafted request. The webserver could stop and not recover anymore.\"},{\"lang\":\"es\",\"value\":\"Se ha identificado una vulnerabilidad en la familia de switches SCALANCE X-200 (incluyendo Variantes SIPLUS NET) (Todas las versiones anteriores a la versiónV5.2.5), familia de switches SCALANCE X-200IRT (incluyendo Variantes SIPLUS NET) (Todas las versiones anteriores a la versiónV5.5.0). El servidor web de los dispositivos afectados contiene una vulnerabilidad que puede conllevar una condición de desbordamiento del búfer. Un atacante podría causar esta condición en el servidor web enviando una petición especialmente diseñada. El servidor web podría detenerse y no recuperarse más\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-122\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_x200-4pirt_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.5.0\",\"matchCriteriaId\":\"43B261ED-08C4-4A0D-8BAC-221006AB6F93\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_x200-4pirt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FDCB432-1AD0-4BF1-839F-8091D9871831\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_x201-3pirt_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.5.0\",\"matchCriteriaId\":\"53F56390-77CB-42D5-A603-5FB29EE5DAA5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_x201-3pirt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47498977-D642-4864-BB94-4CE077EDEB82\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_x202-2irt_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.5.0\",\"matchCriteriaId\":\"666FACCE-89EB-4E5D-A718-F1D4945F7DF4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_x202-2irt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8B1D979-038F-42F4-AB7D-E0664D051B4E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_x202-2pirt_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.5.0\",\"matchCriteriaId\":\"B79AD48F-2B99-4BE5-B3D7-440E2D3BC699\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_x202-2pirt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7819B14-7E93-4D0F-AAD5-049BE3B36D07\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_x202-2pirt_siplus_net_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.5.0\",\"matchCriteriaId\":\"CD18B3BE-E98D-46D1-AA10-89EB89BAFFEB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_x202-2pirt_siplus_net:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DABC3436-E04E-4B6C-9EF4-47B08C57B166\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_x204irt_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.5.0\",\"matchCriteriaId\":\"0C94D093-9D17-47C9-A7F6-28FF241BF874\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_x204irt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6716DCDE-BD3F-4BA2-A66A-A0C14C6A3C15\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_x307-3_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9676DB10-982D-445F-9779-B39AE720AF2F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_x307-3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55EF0738-C9EF-4E4B-A7E7-ECC1B5F0678A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_x307-3ld_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48D3EB09-6069-4289-A61E-C15B044EA2E2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_x307-3ld:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7737F0C2-43FC-4330-88F2-9B08BA5B35D7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_x308-2_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F045D6B1-459B-46F0-86DF-F9AA3CCEA9BD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_x308-2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CCED3E4-38EF-4645-B25C-4F2C3D4E091C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_x308-2ld_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40A1A5F9-4971-4E9D-BBE7-5A0357C56213\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_x308-2ld:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE1909FA-C8C6-46BE-83C6-2635D36FE69B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_x308-2lh_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F53C74B-2154-417E-ACFE-01F0BACD3F15\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_x308-2lh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DDBD94D-5312-4A54-AF76-D9DF791C0292\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_x308-2lh\\\\+_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D76A2268-5397-466C-98B5-01B46B4840A1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_x308-2lh\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85153EED-C677-495D-A6BB-72365DE1ED3F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_x308-2m_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F8888A7-3285-4ACA-A5AD-2B0578050C4C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_x308-2m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC54911E-C432-48FA-9551-9644422FFE14\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_x308-2m_ts_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2C12934-E79C-41A4-B023-BADD7D68CB55\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_x308-2m_ts:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFCCB68C-A58D-4543-A11F-721B01FFBBA4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_x310_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D288227C-69C1-4248-AB4A-51F44A41FDEA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_x310:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FE3716E-1C0A-4B72-809A-8318E5853FB1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_x310fe_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27F765CD-B8A9-45B6-BA3C-C569FF0F8FF0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_x310fe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FB34E83-83A3-45C3-B040-D8910971D439\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_x320-1fe_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91EDD23A-1DBD-4117-9396-89ADBC705B3A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_x320-1fe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC54880F-CBF4-4772-A4FB-B07D97287D44\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_x320-3ldfe_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF07B014-1BA3-477E-A405-5DB35F68126A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_x320-3ldfe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80502856-7617-4ED9-A103-681021131EE0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xb205-3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"7178F049-8E48-4175-AE8C-818128205D33\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xb205-3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9F9F101-6042-4D11-98CE-16A996023B38\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xb205-3ld_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"D7327CDF-EF0D-443B-A822-D69669C3B80C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xb205-3ld:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18DC9125-FC41-4BAB-9638-C42DEF40235B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xb208_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"C7DDB0D1-21AC-43AC-9DDF-C6D89D3F1AA1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xb208:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C19D54A-8070-4EC6-9B30-B1B04A8BDABD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xb213-3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"7FAB9D2E-94BC-4C90-ADF3-27FB34FC23A9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xb213-3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FF67A06-D93B-4E4E-A639-29E0E49654FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xb213-3ld_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"3003D9C7-A979-4289-AADD-190A55434F31\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xb213-3ld:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EFCF766-E1D3-4BD5-A70C-3A824B7D45DF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xb216_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"1A0E6F26-15BE-4586-8ACD-1DAF9492A7D7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xb216:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72EC10EB-0679-4AFE-ABC3-C58A68A0C4DD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xc206-2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"ED3A29A7-F1B0-4A2C-AB63-6E4A57A6864D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xc206-2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49C5CBD8-9799-4EBA-8297-EAE04F43DDD5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xc206-2g_poe__firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"4EFEB827-71F1-4DDF-B156-949AF8E39A34\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xc206-2g_poe_:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39310380-7D17-46C5-B91A-DFDF602D56A5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xc206-2g_poe_eec_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"1B191270-07F7-4173-833A-7F4929F643BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xc206-2g_poe_eec:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C21EC27-F0A8-4DCA-88AD-92D07477B5AD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xc206-2sfp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"FC590D4F-C818-4CD8-A8E9-E2A951E5D768\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xc206-2sfp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"804E37AB-9EE4-4931-A874-4FBD427252D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xc206-2sfp_eec_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"6AABE919-D289-43CB-A285-3212E630B313\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xc206-2sfp_eec:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC286693-55D6-4949-8164-262EB6C022C9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xc206-2sfp_g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"CA08C94B-BE44-49D1-AB10-7512F65D6DF1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xc206-2sfp_g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC7B235D-0141-46E5-9057-2203555AE58A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xc206-2sfp_g_\\\\(e\\\\/ip\\\\)_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"578CE1DA-BA53-4EA5-AB2D-4670321DDF81\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xc206-2sfp_g_\\\\(e\\\\/ip\\\\):-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB6B6ED1-7057-4240-B1C9-660173BF1A6A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xc206-2sfp_g_eec_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"DFEA3FDE-9575-4E9B-BE5F-6BEB005381D8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xc206-2sfp_g_eec:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F7D1CCD-4DFD-4037-9BDC-65466D639456\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xc208_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"5FC77B9E-9081-44E0-82AF-0411940B0684\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xc208:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A2B708-309D-4BE5-BAEE-7AE035A2ADD1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xc208eec_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"ED6AD6D3-75AC-4C7E-9471-8288FB7AABA4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xc208eec:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6550B2D-4B8E-414C-B4CB-7B12D6D4EA4A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xc208g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"D51DCE8E-2E29-4969-A26B-A1A10220CA83\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xc208g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E922B78-7951-4115-8985-D824F6DDE41B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xc208g_\\\\(e\\\\/ip\\\\)_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"F4F3FB17-F6E8-4BB1-B910-C9F03B936C32\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xc208g_\\\\(e\\\\/ip\\\\):-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62852B4B-AF5A-4967-AFC2-14CEC2F6972C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xc208g_eec_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"DF97E576-EBD2-4F1F-BE8F-4254D134565B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xc208g_eec:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CCF0CEF-2E48-472E-9BDE-6E63F4CEA467\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xc208g_poe_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"0378595B-379F-4775-B5D9-CCAC4042F635\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xc208g_poe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"585424EB-F9AB-45FB-B5C5-78FE45E3341A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xc216_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"8A03BBB2-9650-4C8A-A137-0C8AC6CDAD66\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xc216:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ABC0D8D-4F32-487F-835C-DADAB647EC21\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xc216-4c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"6BCD1CF2-F24A-4C47-9C88-340E67C77871\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xc216-4c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7668BC0B-A47A-4E05-9933-51CD43F3B7BA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xc216-4c_g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"4DAD438B-DABE-4B9A-9CDB-9BAC16313F0F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xc216-4c_g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78645734-50C1-4331-9FC4-AC8A8679B6AF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xc216-4c_g_\\\\(e\\\\/ip\\\\)_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"E1F3FE19-E279-4280-8F67-0C085B083E10\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xc216-4c_g_\\\\(e\\\\/ip\\\\):-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22B8B758-9781-474E-93C3-17DDDF263CC2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xc216-4c_g_eec_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"ED7BCCB2-CE77-45A3-A6E1-D591894847C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xc216-4c_g_eec:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"323CEAEA-8122-43A5-BB87-97C7133FF510\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xc216eec_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"E7C43419-B7AA-40EB-A40D-840F975BE2EC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xc216eec:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BE498F8-A9D8-4A92-90CE-21BA30234947\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xc224-4c_g__firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"580A5BD5-2E8E-4801-BFE8-7476088F4214\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xc224-4c_g_:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7806CF9-4DA5-4090-84BD-D098C5FB1178\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xc224-4c_g_\\\\(e\\\\/ip\\\\)_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"FFAC6598-DDAC-4873-9545-39B0EF21D478\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xc224-4c_g_\\\\(e\\\\/ip\\\\):-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE4E3630-DB15-46EA-B320-E4E457240B9F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xc224-4c_g_eec_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"561064E3-FC05-4028-B75D-4D2519FEFD24\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xc224-4c_g_eec:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B0A02C9-A7CB-4CB3-B5DC-5FEE20A59208\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xc224__firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"4303ED83-6610-458F-BEE9-B99BA31DD962\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xc224_:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39AB9EB3-0F05-41C2-A32F-27B6D0C9C039\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xf201-3p_irt_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"475E5069-C120-4D49-AB9D-D3C3F94BD093\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xf201-3p_irt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41614C70-97B4-44C8-A441-530A413A26F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xf202-2p_irt_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"274E5C49-CA32-44D2-A864-C99A48CAA869\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xf202-2p_irt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6751FB7D-C72C-4321-B535-5880FE696FC3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xf204_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"8CD13707-1164-415E-9083-7946D151F1FC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xf204:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F1AE867-67B4-4871-BF56-88017533A737\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xf204-2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"3A09FF2D-F369-47B5-AEE4-A862BEDD9851\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xf204-2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69285324-4C0B-4BDC-B60D-F653679DD52D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xf204-2ba_dna_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"0BBC3005-41D0-4BA0-A146-E48E612CAF58\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xf204-2ba_dna:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAF28152-D6CA-4D20-BDF1-1EF4B7D10429\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xf204-2ba_irt_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"85B917B7-81E1-4419-B493-1D321027017E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xf204-2ba_irt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99E6AFAA-B903-47BB-B0F3-7650B039C0FB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xf204_dna_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"FCBEE10A-7E96-4239-AE6C-5FA9A6A32196\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xf204_dna:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70D62F13-AD59-435E-851A-87A0A6E2FA3B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xf204irt_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"42288C48-A2AA-4AA1-B5A2-F83C5A3689AE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xf204irt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E5489B-277A-4D02-B4AB-4DB65969EED2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xf206-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"CFCDC84E-0695-409A-844B-D24024CC33F2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xf206-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B40D2EB-5C69-47FA-801B-DC48407D418C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xf208_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"A1DB6C03-71BF-4359-834B-384E78910E64\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xf208:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"898613B2-4A9D-44B9-A3FC-4347A2AD7CAB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xp208_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"8082D4C1-C59E-43B6-B11F-C814ACD00321\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xp208:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24C7FB09-D247-48F0-B87C-6A478BDC0A5A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xp208_\\\\(eip\\\\)_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"34349AEF-170F-432F-8D64-347F08536D3A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xp208_\\\\(eip\\\\):-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17BD41C2-2398-4A03-9C5F-43AEF424261E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xp208eec_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"EACF7493-4FE6-4902-9EE7-76F1B4AB118A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xp208eec:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B313A4C-D3E7-4964-BA51-3401546B36C5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xp208poe_eec_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"3237051D-0342-4DB8-B4A1-40A3B33A67BB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xp208poe_eec:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6E888EA-73A7-42B8-A617-621CF192F2A9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xp216_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"4969C410-25DF-4BFA-9125-53D63B33691B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xp216:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67E4D039-5BF8-469B-A6FE-A391A6D1BDA4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xp216_\\\\(eip\\\\)_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"B4A2ED6E-6632-4DD9-A359-73EB28BB306B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xp216_\\\\(eip\\\\):-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33D044BD-12AD-42C9-B01C-957BEC6C6790\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xp216eec_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"3B54DF8C-BB5A-46AF-862D-DC8E984A05AB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xp216eec:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12512EC4-FB7D-420F-9A8A-547562BE1B49\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:scalance_xp216poe_eec_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.5\",\"matchCriteriaId\":\"6FF74FFD-81C8-4E63-8B7B-AEBD98AB34F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:scalance_xp216poe_eec:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9BACE8C-6C69-4BC4-8F5B-1C74FA7EB339\"}]}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf\",\"source\":\"productcert@siemens.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}", }, }
var-202101-0304
Vulnerability from variot
A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0). The web server of the affected devices contains a vulnerability that may lead to a buffer overflow condition. An attacker could cause this condition on the webserver by sending a specially crafted request. The webserver could stop and not recover anymore. SCALANCE X-200 and SCALANCE X-200IRT An out-of-bounds write vulnerability exists in the switch family.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. SCALANCE X is a switch used to connect industrial components, such as programmable logic controllers (plc) or human machine interfaces (HMIs)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0304", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "scalance xp216eec", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xb213-3", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { "model": "scalance xp216 \\", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance x202-2pirt siplus net", scope: "lt", trust: 1, vendor: "siemens", version: "5.5.0", }, { model: "scalance xc216-4c g eec", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xf204-2ba dna", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xc206-2g poe", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xb205-3", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xc206-2sfp g", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xf201-3p irt", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance x200-4pirt", scope: "lt", trust: 1, vendor: "siemens", version: "5.5.0", }, { model: "scalance xc208g", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance x310", scope: "eq", trust: 1, vendor: "siemens", version: "*", }, { model: "scalance xf202-2p irt", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xp208eec", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xf204irt", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xf204", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance x308-2lh\\+", scope: "eq", trust: 1, vendor: "siemens", version: "*", }, { model: "scalance xc208g poe", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xc208", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance x308-2", scope: "eq", trust: 1, vendor: "siemens", version: "*", }, { model: "scalance x308-2m", scope: "eq", trust: 1, vendor: "siemens", version: "*", }, { model: "scalance xc206-2g poe eec", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance x308-2lh", scope: "eq", trust: 1, vendor: "siemens", version: "*", }, { model: "scalance xc206-2sfp eec", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xc208eec", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xc224", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { "model": "scalance xc216-4c g \\", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance x310fe", scope: "eq", trust: 1, vendor: "siemens", version: "*", }, { "model": "scalance xp208 \\", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xp208", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance x307-3", scope: "eq", trust: 1, vendor: "siemens", version: "*", }, { model: "scalance x201-3pirt", scope: "lt", trust: 1, vendor: "siemens", version: "5.5.0", }, { model: "scalance x204irt", scope: "lt", trust: 1, vendor: "siemens", version: "5.5.0", }, { model: "scalance xb208", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance x202-2pirt", scope: "lt", trust: 1, vendor: "siemens", version: "5.5.0", }, { model: "scalance xp216poe eec", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xp216", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xb205-3ld", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance x308-2ld", scope: "eq", trust: 1, vendor: "siemens", version: "*", }, { model: "scalance x202-2irt", scope: "lt", trust: 1, vendor: "siemens", version: "5.5.0", }, { model: "scalance x320-3ldfe", scope: "eq", trust: 1, vendor: "siemens", version: "*", }, { model: "scalance xc216", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xc216-4c", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xc224-4c g", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xc206-2", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xc224-4c g eec", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xc216eec", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance x307-3ld", scope: "eq", trust: 1, vendor: "siemens", version: "*", }, { model: "scalance xb213-3ld", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { "model": "scalance xc206-2sfp g \\", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xc208g eec", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xf204 dna", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xf206-1", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xf204-2ba irt", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xc206-2sfp", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xf208", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xp208poe eec", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance x308-2m ts", scope: "eq", trust: 1, vendor: "siemens", version: "*", }, { model: "scalance xc216-4c g", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xb216", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { "model": "scalance xc208g \\", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance xf204-2", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance x320-1fe", scope: "eq", trust: 1, vendor: "siemens", version: "*", }, { model: "scalance xc206-2sfp g eec", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { "model": "scalance xc224-4c g \\", scope: "lt", trust: 1, vendor: "siemens", version: "5.2.5", }, { model: "scalance x200-4pirt", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "scalance x307-3ld", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "scalance x202-2pirt", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "scalance x308-2", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "siplus net scalance x202-2pirt", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "scalance x204irt", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "scalance x307-3", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "scalance x201-3pirt", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "scalance x202-2irt", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "scalance x308-2ld", scope: null, trust: 0.8, vendor: "シーメンス", version: null, }, { model: "scalance x-200irt switch family", scope: null, trust: 0.6, vendor: "siemens", version: null, }, { model: "scalance switch family", scope: "eq", trust: 0.6, vendor: "siemens", version: "x-200", }, ], sources: [ { db: "CNVD", id: "CNVD-2021-02594", }, { db: "JVNDB", id: "JVNDB-2020-015533", }, { db: "NVD", id: "CVE-2020-25226", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Siemens reported these vulnerabilities to CISA.", sources: [ { db: "CNNVD", id: "CNNVD-202101-917", }, ], trust: 0.6, }, cve: "CVE-2020-25226", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "nvd@nist.gov", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", exploitabilityScore: 10, id: "CVE-2020-25226", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 1.8, vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "CNVD", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", exploitabilityScore: 10, id: "CNVD-2021-02594", impactScore: 6.9, integrityImpact: "NONE", severity: "HIGH", trust: 0.6, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "nvd@nist.gov", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", exploitabilityScore: 3.9, id: "CVE-2020-25226", impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Network", author: "NVD", availabilityImpact: "High", baseScore: 9.8, baseSeverity: "Critical", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2020-25226", impactScore: null, integrityImpact: "High", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "nvd@nist.gov", id: "CVE-2020-25226", trust: 1, value: "CRITICAL", }, { author: "NVD", id: "CVE-2020-25226", trust: 0.8, value: "Critical", }, { author: "CNVD", id: "CNVD-2021-02594", trust: 0.6, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-202101-917", trust: 0.6, value: "CRITICAL", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2021-02594", }, { db: "JVNDB", id: "JVNDB-2020-015533", }, { db: "CNNVD", id: "CNNVD-202101-917", }, { db: "NVD", id: "CVE-2020-25226", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0). The web server of the affected devices contains a vulnerability that may lead to a buffer overflow condition. An attacker could cause this condition on the webserver by sending a specially crafted request. The webserver could stop and not recover anymore. SCALANCE X-200 and SCALANCE X-200IRT An out-of-bounds write vulnerability exists in the switch family.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. SCALANCE X is a switch used to connect industrial components, such as programmable logic controllers (plc) or human machine interfaces (HMIs)", sources: [ { db: "NVD", id: "CVE-2020-25226", }, { db: "JVNDB", id: "JVNDB-2020-015533", }, { db: "CNVD", id: "CNVD-2021-02594", }, ], trust: 2.16, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2020-25226", trust: 3, }, { db: "SIEMENS", id: "SSA-139628", trust: 2.2, }, { db: "JVNDB", id: "JVNDB-2020-015533", trust: 0.8, }, { db: "CNVD", id: "CNVD-2021-02594", trust: 0.6, }, { db: "ICS CERT", id: "ICSA-21-012-05", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2021.0127", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-202101-917", trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2021-02594", }, { db: "JVNDB", id: "JVNDB-2020-015533", }, { db: "CNNVD", id: "CNNVD-202101-917", }, { db: "NVD", id: "CVE-2020-25226", }, ], }, id: "VAR-202101-0304", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2021-02594", }, ], trust: 1.264141851111111, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "ICS", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2021-02594", }, ], }, last_update_date: "2024-11-23T19:30:05.728000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "SSA-139628", trust: 0.8, url: "https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf", }, { title: "Patch for Scalance X Products heap buffer overflow vulnerability (CNVD-2021-02594)", trust: 0.6, url: "https://www.cnvd.org.cn/patchInfo/show/244018", }, { title: "Multiple Siemens Product Buffer Error Vulnerability Fix", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139392", }, ], sources: [ { db: "CNVD", id: "CNVD-2021-02594", }, { db: "JVNDB", id: "JVNDB-2020-015533", }, { db: "CNNVD", id: "CNNVD-202101-917", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-122", trust: 1, }, { problemtype: "CWE-787", trust: 1, }, { problemtype: "Out-of-bounds writing (CWE-787) [NVD Evaluation ]", trust: 0.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-015533", }, { db: "NVD", id: "CVE-2020-25226", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2.2, url: "https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf", }, { trust: 1.4, url: "https://nvd.nist.gov/vuln/detail/cve-2020-25226", }, { trust: 0.6, url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-05", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2021.0127/", }, ], sources: [ { db: "CNVD", id: "CNVD-2021-02594", }, { db: "JVNDB", id: "JVNDB-2020-015533", }, { db: "CNNVD", id: "CNNVD-202101-917", }, { db: "NVD", id: "CVE-2020-25226", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2021-02594", }, { db: "JVNDB", id: "JVNDB-2020-015533", }, { db: "CNNVD", id: "CNNVD-202101-917", }, { db: "NVD", id: "CVE-2020-25226", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2021-01-13T00:00:00", db: "CNVD", id: "CNVD-2021-02594", }, { date: "2021-10-01T00:00:00", db: "JVNDB", id: "JVNDB-2020-015533", }, { date: "2021-01-12T00:00:00", db: "CNNVD", id: "CNNVD-202101-917", }, { date: "2021-01-12T21:15:16.543000", db: "NVD", id: "CVE-2020-25226", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2021-02-04T00:00:00", db: "CNVD", id: "CNVD-2021-02594", }, { date: "2021-10-01T08:45:00", db: "JVNDB", id: "JVNDB-2020-015533", }, { date: "2021-09-15T00:00:00", db: "CNNVD", id: "CNNVD-202101-917", }, { date: "2024-11-21T05:17:42.257000", db: "NVD", id: "CVE-2020-25226", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-202101-917", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "SCALANCE X-200 and SCALANCE X-200IRT Out-of-bounds write vulnerability in switch family", sources: [ { db: "JVNDB", id: "JVNDB-2020-015533", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "buffer error", sources: [ { db: "CNNVD", id: "CNNVD-202101-917", }, ], trust: 0.6, }, }
icsa-21-012-05
Vulnerability from csaf_cisa
Notes
{ document: { acknowledgments: [ { organization: "Siemens", summary: "reporting these vulnerabilities to CISA", }, ], category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Disclosure is not limited", tlp: { label: "WHITE", url: "https://us-cert.cisa.gov/tlp/", }, }, lang: "en-US", notes: [ { category: "general", text: "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", title: "CISA Disclaimer", }, { category: "legal_disclaimer", text: "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", title: "Legal Notice", }, { category: "summary", text: "Successful exploitation of these vulnerabilities could cause denial-of-service conditions and further impact the system through heap and buffer overflows.", title: "Risk evaluation", }, { category: "other", text: "Critical Manufacturing", title: "Critical infrastructure sectors", }, { category: "other", text: "Worldwide", title: "Countries/areas deployed", }, { category: "other", text: "Germany", title: "Company headquarters location", }, { category: "general", text: "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:", title: "Recommended Practices", }, { category: "general", text: "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", title: "Recommended Practices", }, { category: "general", text: "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", title: "Recommended Practices", }, { category: "general", text: "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", title: "Additional Resources", }, { category: "other", text: "No known public exploits specifically target these vulnerabilities.", title: "Exploitability", }, ], publisher: { category: "coordinator", contact_details: "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", name: "CISA", namespace: "https://www.cisa.gov/", }, references: [ { category: "external", summary: "SSA-139628: Vulnerabilities in Web Server for Scalance X Products - CSAF Version", url: "https://cert-portal.siemens.com/productcert/csaf/ssa-139628.json", }, { category: "self", summary: "ICS Advisory ICSA-21-012-05 JSON", url: "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-012-05.json", }, { category: "self", summary: "ICS Advisory ICSA-21-012-05 Web Version", url: "https://www.cisa.gov/news-events/ics-advisories/icsa-21-012-05", }, { category: "external", summary: "Recommended Practices", url: "https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-10-301-01", }, { category: "external", summary: "Recommended Practices", url: "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf", }, { category: "external", summary: "Recommended Practices", url: "https://us-cert.cisa.gov/ics/tips/ICS-TIP-12-146-01B", }, { category: "external", summary: "SSA-139628: Vulnerabilities in Web Server for Scalance X Products - PDF Version", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf", }, { category: "external", summary: "SSA-139628: Vulnerabilities in Web Server for Scalance X Products - TXT Version", url: "https://cert-portal.siemens.com/productcert/txt/ssa-139628.txt", }, ], title: "Siemens SCALANCE X Products (Update B)", tracking: { current_release_date: "2021-09-14T00:00:00.000000Z", generator: { engine: { name: "CISA CSAF Generator", version: "1.0.0", }, }, id: "ICSA-21-012-05", initial_release_date: "2021-01-12T00:00:00.000000Z", revision_history: [ { date: "2021-01-12T00:00:00.000000Z", legacy_version: "Initial", number: "1", summary: "ICSA-21-012-05 Siemens Scalance X Products", }, { date: "2021-02-09T00:00:00.000000Z", legacy_version: "A", number: "2", summary: "ICSA-21-012-05 Siemens SCALANCE X Products (Update A)", }, { date: "2021-09-14T00:00:00.000000Z", legacy_version: "B", number: "3", summary: "ICSA-21-012-05 Siemens SCALANCE X Products (Update B)", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "< V5.2.5", product: { name: "SCALANCE X-200 switch family (incl. SIPLUS NET variants)", product_id: "CSAFPID-0001", }, }, ], category: "product_name", name: "SCALANCE X-200 switch family (incl. SIPLUS NET variants)", }, { branches: [ { category: "product_version_range", name: "< V5.5.0", product: { name: "SCALANCE X-200IRT switch family (incl. SIPLUS NET variants)", product_id: "CSAFPID-0002", }, }, ], category: "product_name", name: "SCALANCE X-200IRT switch family (incl. SIPLUS NET variants)", }, { branches: [ { category: "product_version_range", name: "< V4.1.0", product: { name: "SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)", product_id: "CSAFPID-0003", }, }, ], category: "product_name", name: "SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)", }, ], category: "vendor", name: "Siemens", }, ], }, vulnerabilities: [ { cve: "CVE-2020-15799", cwe: { id: "CWE-306", name: "Missing Authentication for Critical Function", }, notes: [ { category: "summary", text: "The vulnerability could allow an unauthenticated attacker to reboot the device over the network by using special urls from integrated web server of the affected products.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", "CSAFPID-0002", ], }, references: [ { summary: "CVE-2020-15799 - SCALANCE X-200 switch family (incl. SIPLUS NET variants)", url: "https://support.industry.siemens.com/cs/ww/en/view/109801131/", }, { summary: "CVE-2020-15799 - SCALANCE X-200IRT switch family (incl. SIPLUS NET variants)", url: "https://support.industry.siemens.com/cs/ww/en/view/109792534/", }, { summary: "CVE-2020-15799 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-15799.json", }, { category: "external", summary: "web.nvd.nist.gov", url: "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15799", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", }, ], remediations: [ { category: "vendor_fix", details: "Update to V5.2.5 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109801131/", }, { category: "vendor_fix", details: "Update to V5.5.0 or later version", product_ids: [ "CSAFPID-0002", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109792534/", }, { category: "mitigation", details: "Limit network traffic of web servers of Scalance X switches to trusted connections by firewall rules (port 443/tcp).", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", ], }, { category: "mitigation", details: "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", "CSAFPID-0002", ], }, ], title: "CVE-2020-15799", }, { cve: "CVE-2020-15800", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, notes: [ { category: "summary", text: "The webserver of the affected devices contains a vulnerability that may lead to a heap overflow condition. An attacker could cause this condition on the webserver by sending specially crafted requests. This could stop the webserver temporarily.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", ], }, references: [ { summary: "CVE-2020-15800 - SCALANCE X-200 switch family (incl. SIPLUS NET variants)", url: "https://support.industry.siemens.com/cs/ww/en/view/109801131/", }, { summary: "CVE-2020-15800 - SCALANCE X-200IRT switch family (incl. SIPLUS NET variants)", url: "https://support.industry.siemens.com/cs/ww/en/view/109792534/", }, { summary: "CVE-2020-15800 - SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)", url: "https://support.industry.siemens.com/cs/ww/en/view/109773547/", }, { summary: "CVE-2020-15800 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-15800.json", }, { category: "external", summary: "web.nvd.nist.gov", url: "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15800", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", }, ], remediations: [ { category: "vendor_fix", details: "Update to V5.2.5 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109801131/", }, { category: "vendor_fix", details: "Update to V5.5.0 or later version", product_ids: [ "CSAFPID-0002", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109792534/", }, { category: "vendor_fix", details: "Update to V4.1.0 or later version", product_ids: [ "CSAFPID-0003", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109773547/", }, { category: "mitigation", details: "Limit network traffic of web servers of Scalance X switches to trusted connections by firewall rules (port 443/tcp).", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", ], }, { category: "mitigation", details: "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", ], }, ], title: "CVE-2020-15800", }, { cve: "CVE-2020-25226", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, notes: [ { category: "summary", text: "The web server of the affected devices contains a vulnerability that may lead to a buffer overflow condition. An attacker could cause this condition on the webserver by sending a specially crafted request. The webserver could stop and not recover anymore.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", "CSAFPID-0002", ], }, references: [ { summary: "CVE-2020-25226 - SCALANCE X-200 switch family (incl. SIPLUS NET variants)", url: "https://support.industry.siemens.com/cs/ww/en/view/109801131/", }, { summary: "CVE-2020-25226 - SCALANCE X-200IRT switch family (incl. SIPLUS NET variants)", url: "https://support.industry.siemens.com/cs/ww/en/view/109792534/", }, { summary: "CVE-2020-25226 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-25226.json", }, { category: "external", summary: "web.nvd.nist.gov", url: "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25226", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", }, ], remediations: [ { category: "vendor_fix", details: "Update to V5.2.5 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109801131/", }, { category: "vendor_fix", details: "Update to V5.5.0 or later version", product_ids: [ "CSAFPID-0002", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109792534/", }, { category: "mitigation", details: "Limit network traffic of web servers of Scalance X switches to trusted connections by firewall rules (port 443/tcp).", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", ], }, { category: "mitigation", details: "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", "CSAFPID-0002", ], }, ], title: "CVE-2020-25226", }, ], }
ICSA-21-012-05
Vulnerability from csaf_cisa
Notes
{ document: { acknowledgments: [ { organization: "Siemens", summary: "reporting these vulnerabilities to CISA", }, ], category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Disclosure is not limited", tlp: { label: "WHITE", url: "https://us-cert.cisa.gov/tlp/", }, }, lang: "en-US", notes: [ { category: "general", text: "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", title: "CISA Disclaimer", }, { category: "legal_disclaimer", text: "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", title: "Legal Notice", }, { category: "summary", text: "Successful exploitation of these vulnerabilities could cause denial-of-service conditions and further impact the system through heap and buffer overflows.", title: "Risk evaluation", }, { category: "other", text: "Critical Manufacturing", title: "Critical infrastructure sectors", }, { category: "other", text: "Worldwide", title: "Countries/areas deployed", }, { category: "other", text: "Germany", title: "Company headquarters location", }, { category: "general", text: "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:", title: "Recommended Practices", }, { category: "general", text: "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", title: "Recommended Practices", }, { category: "general", text: "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", title: "Recommended Practices", }, { category: "general", text: "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", title: "Additional Resources", }, { category: "other", text: "No known public exploits specifically target these vulnerabilities.", title: "Exploitability", }, ], publisher: { category: "coordinator", contact_details: "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", name: "CISA", namespace: "https://www.cisa.gov/", }, references: [ { category: "external", summary: "SSA-139628: Vulnerabilities in Web Server for Scalance X Products - CSAF Version", url: "https://cert-portal.siemens.com/productcert/csaf/ssa-139628.json", }, { category: "self", summary: "ICS Advisory ICSA-21-012-05 JSON", url: "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-012-05.json", }, { category: "self", summary: "ICS Advisory ICSA-21-012-05 Web Version", url: "https://www.cisa.gov/news-events/ics-advisories/icsa-21-012-05", }, { category: "external", summary: "Recommended Practices", url: "https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-10-301-01", }, { category: "external", summary: "Recommended Practices", url: "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf", }, { category: "external", summary: "Recommended Practices", url: "https://us-cert.cisa.gov/ics/tips/ICS-TIP-12-146-01B", }, { category: "external", summary: "SSA-139628: Vulnerabilities in Web Server for Scalance X Products - PDF Version", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf", }, { category: "external", summary: "SSA-139628: Vulnerabilities in Web Server for Scalance X Products - TXT Version", url: "https://cert-portal.siemens.com/productcert/txt/ssa-139628.txt", }, ], title: "Siemens SCALANCE X Products (Update B)", tracking: { current_release_date: "2021-09-14T00:00:00.000000Z", generator: { engine: { name: "CISA CSAF Generator", version: "1.0.0", }, }, id: "ICSA-21-012-05", initial_release_date: "2021-01-12T00:00:00.000000Z", revision_history: [ { date: "2021-01-12T00:00:00.000000Z", legacy_version: "Initial", number: "1", summary: "ICSA-21-012-05 Siemens Scalance X Products", }, { date: "2021-02-09T00:00:00.000000Z", legacy_version: "A", number: "2", summary: "ICSA-21-012-05 Siemens SCALANCE X Products (Update A)", }, { date: "2021-09-14T00:00:00.000000Z", legacy_version: "B", number: "3", summary: "ICSA-21-012-05 Siemens SCALANCE X Products (Update B)", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "< V5.2.5", product: { name: "SCALANCE X-200 switch family (incl. SIPLUS NET variants)", product_id: "CSAFPID-0001", }, }, ], category: "product_name", name: "SCALANCE X-200 switch family (incl. SIPLUS NET variants)", }, { branches: [ { category: "product_version_range", name: "< V5.5.0", product: { name: "SCALANCE X-200IRT switch family (incl. SIPLUS NET variants)", product_id: "CSAFPID-0002", }, }, ], category: "product_name", name: "SCALANCE X-200IRT switch family (incl. SIPLUS NET variants)", }, { branches: [ { category: "product_version_range", name: "< V4.1.0", product: { name: "SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)", product_id: "CSAFPID-0003", }, }, ], category: "product_name", name: "SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)", }, ], category: "vendor", name: "Siemens", }, ], }, vulnerabilities: [ { cve: "CVE-2020-15799", cwe: { id: "CWE-306", name: "Missing Authentication for Critical Function", }, notes: [ { category: "summary", text: "The vulnerability could allow an unauthenticated attacker to reboot the device over the network by using special urls from integrated web server of the affected products.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", "CSAFPID-0002", ], }, references: [ { summary: "CVE-2020-15799 - SCALANCE X-200 switch family (incl. SIPLUS NET variants)", url: "https://support.industry.siemens.com/cs/ww/en/view/109801131/", }, { summary: "CVE-2020-15799 - SCALANCE X-200IRT switch family (incl. SIPLUS NET variants)", url: "https://support.industry.siemens.com/cs/ww/en/view/109792534/", }, { summary: "CVE-2020-15799 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-15799.json", }, { category: "external", summary: "web.nvd.nist.gov", url: "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15799", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", }, ], remediations: [ { category: "vendor_fix", details: "Update to V5.2.5 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109801131/", }, { category: "vendor_fix", details: "Update to V5.5.0 or later version", product_ids: [ "CSAFPID-0002", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109792534/", }, { category: "mitigation", details: "Limit network traffic of web servers of Scalance X switches to trusted connections by firewall rules (port 443/tcp).", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", ], }, { category: "mitigation", details: "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", "CSAFPID-0002", ], }, ], title: "CVE-2020-15799", }, { cve: "CVE-2020-15800", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, notes: [ { category: "summary", text: "The webserver of the affected devices contains a vulnerability that may lead to a heap overflow condition. An attacker could cause this condition on the webserver by sending specially crafted requests. This could stop the webserver temporarily.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", ], }, references: [ { summary: "CVE-2020-15800 - SCALANCE X-200 switch family (incl. SIPLUS NET variants)", url: "https://support.industry.siemens.com/cs/ww/en/view/109801131/", }, { summary: "CVE-2020-15800 - SCALANCE X-200IRT switch family (incl. SIPLUS NET variants)", url: "https://support.industry.siemens.com/cs/ww/en/view/109792534/", }, { summary: "CVE-2020-15800 - SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)", url: "https://support.industry.siemens.com/cs/ww/en/view/109773547/", }, { summary: "CVE-2020-15800 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-15800.json", }, { category: "external", summary: "web.nvd.nist.gov", url: "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15800", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", }, ], remediations: [ { category: "vendor_fix", details: "Update to V5.2.5 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109801131/", }, { category: "vendor_fix", details: "Update to V5.5.0 or later version", product_ids: [ "CSAFPID-0002", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109792534/", }, { category: "vendor_fix", details: "Update to V4.1.0 or later version", product_ids: [ "CSAFPID-0003", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109773547/", }, { category: "mitigation", details: "Limit network traffic of web servers of Scalance X switches to trusted connections by firewall rules (port 443/tcp).", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", ], }, { category: "mitigation", details: "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", ], }, ], title: "CVE-2020-15800", }, { cve: "CVE-2020-25226", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, notes: [ { category: "summary", text: "The web server of the affected devices contains a vulnerability that may lead to a buffer overflow condition. An attacker could cause this condition on the webserver by sending a specially crafted request. The webserver could stop and not recover anymore.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", "CSAFPID-0002", ], }, references: [ { summary: "CVE-2020-25226 - SCALANCE X-200 switch family (incl. SIPLUS NET variants)", url: "https://support.industry.siemens.com/cs/ww/en/view/109801131/", }, { summary: "CVE-2020-25226 - SCALANCE X-200IRT switch family (incl. SIPLUS NET variants)", url: "https://support.industry.siemens.com/cs/ww/en/view/109792534/", }, { summary: "CVE-2020-25226 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-25226.json", }, { category: "external", summary: "web.nvd.nist.gov", url: "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25226", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", }, ], remediations: [ { category: "vendor_fix", details: "Update to V5.2.5 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109801131/", }, { category: "vendor_fix", details: "Update to V5.5.0 or later version", product_ids: [ "CSAFPID-0002", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109792534/", }, { category: "mitigation", details: "Limit network traffic of web servers of Scalance X switches to trusted connections by firewall rules (port 443/tcp).", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", ], }, { category: "mitigation", details: "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", "CSAFPID-0002", ], }, ], title: "CVE-2020-25226", }, ], }
fkie_cve-2020-25226
Vulnerability from fkie_nvd
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_x200-4pirt_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "43B261ED-08C4-4A0D-8BAC-221006AB6F93", versionEndExcluding: "5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_x200-4pirt:-:*:*:*:*:*:*:*", matchCriteriaId: "8FDCB432-1AD0-4BF1-839F-8091D9871831", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_x201-3pirt_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "53F56390-77CB-42D5-A603-5FB29EE5DAA5", versionEndExcluding: "5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_x201-3pirt:-:*:*:*:*:*:*:*", matchCriteriaId: "47498977-D642-4864-BB94-4CE077EDEB82", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_x202-2irt_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "666FACCE-89EB-4E5D-A718-F1D4945F7DF4", versionEndExcluding: "5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_x202-2irt:-:*:*:*:*:*:*:*", matchCriteriaId: "A8B1D979-038F-42F4-AB7D-E0664D051B4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_x202-2pirt_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B79AD48F-2B99-4BE5-B3D7-440E2D3BC699", versionEndExcluding: "5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_x202-2pirt:-:*:*:*:*:*:*:*", matchCriteriaId: "D7819B14-7E93-4D0F-AAD5-049BE3B36D07", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_x202-2pirt_siplus_net_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CD18B3BE-E98D-46D1-AA10-89EB89BAFFEB", versionEndExcluding: "5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_x202-2pirt_siplus_net:-:*:*:*:*:*:*:*", matchCriteriaId: "DABC3436-E04E-4B6C-9EF4-47B08C57B166", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_x204irt_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0C94D093-9D17-47C9-A7F6-28FF241BF874", versionEndExcluding: "5.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_x204irt:-:*:*:*:*:*:*:*", matchCriteriaId: "6716DCDE-BD3F-4BA2-A66A-A0C14C6A3C15", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_x307-3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9676DB10-982D-445F-9779-B39AE720AF2F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_x307-3:-:*:*:*:*:*:*:*", matchCriteriaId: "55EF0738-C9EF-4E4B-A7E7-ECC1B5F0678A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_x307-3ld_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "48D3EB09-6069-4289-A61E-C15B044EA2E2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_x307-3ld:-:*:*:*:*:*:*:*", matchCriteriaId: "7737F0C2-43FC-4330-88F2-9B08BA5B35D7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_x308-2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F045D6B1-459B-46F0-86DF-F9AA3CCEA9BD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_x308-2:-:*:*:*:*:*:*:*", matchCriteriaId: "6CCED3E4-38EF-4645-B25C-4F2C3D4E091C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_x308-2ld_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "40A1A5F9-4971-4E9D-BBE7-5A0357C56213", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_x308-2ld:-:*:*:*:*:*:*:*", matchCriteriaId: "FE1909FA-C8C6-46BE-83C6-2635D36FE69B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_x308-2lh_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8F53C74B-2154-417E-ACFE-01F0BACD3F15", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_x308-2lh:-:*:*:*:*:*:*:*", matchCriteriaId: "6DDBD94D-5312-4A54-AF76-D9DF791C0292", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_x308-2lh\\+_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D76A2268-5397-466C-98B5-01B46B4840A1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_x308-2lh\\+:-:*:*:*:*:*:*:*", matchCriteriaId: "85153EED-C677-495D-A6BB-72365DE1ED3F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_x308-2m_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2F8888A7-3285-4ACA-A5AD-2B0578050C4C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_x308-2m:-:*:*:*:*:*:*:*", matchCriteriaId: "AC54911E-C432-48FA-9551-9644422FFE14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_x308-2m_ts_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A2C12934-E79C-41A4-B023-BADD7D68CB55", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_x308-2m_ts:-:*:*:*:*:*:*:*", matchCriteriaId: "DFCCB68C-A58D-4543-A11F-721B01FFBBA4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_x310_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D288227C-69C1-4248-AB4A-51F44A41FDEA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_x310:-:*:*:*:*:*:*:*", matchCriteriaId: "7FE3716E-1C0A-4B72-809A-8318E5853FB1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_x310fe_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "27F765CD-B8A9-45B6-BA3C-C569FF0F8FF0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_x310fe:-:*:*:*:*:*:*:*", matchCriteriaId: "8FB34E83-83A3-45C3-B040-D8910971D439", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_x320-1fe_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "91EDD23A-1DBD-4117-9396-89ADBC705B3A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_x320-1fe:-:*:*:*:*:*:*:*", matchCriteriaId: "CC54880F-CBF4-4772-A4FB-B07D97287D44", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_x320-3ldfe_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AF07B014-1BA3-477E-A405-5DB35F68126A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_x320-3ldfe:-:*:*:*:*:*:*:*", matchCriteriaId: "80502856-7617-4ED9-A103-681021131EE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xb205-3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7178F049-8E48-4175-AE8C-818128205D33", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xb205-3:-:*:*:*:*:*:*:*", matchCriteriaId: "B9F9F101-6042-4D11-98CE-16A996023B38", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xb205-3ld_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D7327CDF-EF0D-443B-A822-D69669C3B80C", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xb205-3ld:-:*:*:*:*:*:*:*", matchCriteriaId: "18DC9125-FC41-4BAB-9638-C42DEF40235B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xb208_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C7DDB0D1-21AC-43AC-9DDF-C6D89D3F1AA1", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xb208:-:*:*:*:*:*:*:*", matchCriteriaId: "5C19D54A-8070-4EC6-9B30-B1B04A8BDABD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xb213-3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7FAB9D2E-94BC-4C90-ADF3-27FB34FC23A9", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xb213-3:-:*:*:*:*:*:*:*", matchCriteriaId: "1FF67A06-D93B-4E4E-A639-29E0E49654FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xb213-3ld_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3003D9C7-A979-4289-AADD-190A55434F31", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xb213-3ld:-:*:*:*:*:*:*:*", matchCriteriaId: "0EFCF766-E1D3-4BD5-A70C-3A824B7D45DF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xb216_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1A0E6F26-15BE-4586-8ACD-1DAF9492A7D7", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xb216:-:*:*:*:*:*:*:*", matchCriteriaId: "72EC10EB-0679-4AFE-ABC3-C58A68A0C4DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xc206-2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ED3A29A7-F1B0-4A2C-AB63-6E4A57A6864D", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xc206-2:-:*:*:*:*:*:*:*", matchCriteriaId: "49C5CBD8-9799-4EBA-8297-EAE04F43DDD5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xc206-2g_poe__firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4EFEB827-71F1-4DDF-B156-949AF8E39A34", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xc206-2g_poe_:-:*:*:*:*:*:*:*", matchCriteriaId: "39310380-7D17-46C5-B91A-DFDF602D56A5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xc206-2g_poe_eec_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1B191270-07F7-4173-833A-7F4929F643BF", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xc206-2g_poe_eec:-:*:*:*:*:*:*:*", matchCriteriaId: "0C21EC27-F0A8-4DCA-88AD-92D07477B5AD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xc206-2sfp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FC590D4F-C818-4CD8-A8E9-E2A951E5D768", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xc206-2sfp:-:*:*:*:*:*:*:*", matchCriteriaId: "804E37AB-9EE4-4931-A874-4FBD427252D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xc206-2sfp_eec_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6AABE919-D289-43CB-A285-3212E630B313", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xc206-2sfp_eec:-:*:*:*:*:*:*:*", matchCriteriaId: "CC286693-55D6-4949-8164-262EB6C022C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xc206-2sfp_g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CA08C94B-BE44-49D1-AB10-7512F65D6DF1", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xc206-2sfp_g:-:*:*:*:*:*:*:*", matchCriteriaId: "BC7B235D-0141-46E5-9057-2203555AE58A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xc206-2sfp_g_\\(e\\/ip\\)_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "578CE1DA-BA53-4EA5-AB2D-4670321DDF81", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xc206-2sfp_g_\\(e\\/ip\\):-:*:*:*:*:*:*:*", matchCriteriaId: "CB6B6ED1-7057-4240-B1C9-660173BF1A6A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xc206-2sfp_g_eec_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DFEA3FDE-9575-4E9B-BE5F-6BEB005381D8", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xc206-2sfp_g_eec:-:*:*:*:*:*:*:*", matchCriteriaId: "6F7D1CCD-4DFD-4037-9BDC-65466D639456", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xc208_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5FC77B9E-9081-44E0-82AF-0411940B0684", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xc208:-:*:*:*:*:*:*:*", matchCriteriaId: "E6A2B708-309D-4BE5-BAEE-7AE035A2ADD1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xc208eec_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ED6AD6D3-75AC-4C7E-9471-8288FB7AABA4", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xc208eec:-:*:*:*:*:*:*:*", matchCriteriaId: "B6550B2D-4B8E-414C-B4CB-7B12D6D4EA4A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xc208g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D51DCE8E-2E29-4969-A26B-A1A10220CA83", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xc208g:-:*:*:*:*:*:*:*", matchCriteriaId: "8E922B78-7951-4115-8985-D824F6DDE41B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xc208g_\\(e\\/ip\\)_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F4F3FB17-F6E8-4BB1-B910-C9F03B936C32", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xc208g_\\(e\\/ip\\):-:*:*:*:*:*:*:*", matchCriteriaId: "62852B4B-AF5A-4967-AFC2-14CEC2F6972C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xc208g_eec_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DF97E576-EBD2-4F1F-BE8F-4254D134565B", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xc208g_eec:-:*:*:*:*:*:*:*", matchCriteriaId: "9CCF0CEF-2E48-472E-9BDE-6E63F4CEA467", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xc208g_poe_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0378595B-379F-4775-B5D9-CCAC4042F635", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xc208g_poe:-:*:*:*:*:*:*:*", matchCriteriaId: "585424EB-F9AB-45FB-B5C5-78FE45E3341A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xc216_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8A03BBB2-9650-4C8A-A137-0C8AC6CDAD66", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xc216:-:*:*:*:*:*:*:*", matchCriteriaId: "4ABC0D8D-4F32-487F-835C-DADAB647EC21", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xc216-4c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6BCD1CF2-F24A-4C47-9C88-340E67C77871", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xc216-4c:-:*:*:*:*:*:*:*", matchCriteriaId: "7668BC0B-A47A-4E05-9933-51CD43F3B7BA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xc216-4c_g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4DAD438B-DABE-4B9A-9CDB-9BAC16313F0F", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xc216-4c_g:-:*:*:*:*:*:*:*", matchCriteriaId: "78645734-50C1-4331-9FC4-AC8A8679B6AF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xc216-4c_g_\\(e\\/ip\\)_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E1F3FE19-E279-4280-8F67-0C085B083E10", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xc216-4c_g_\\(e\\/ip\\):-:*:*:*:*:*:*:*", matchCriteriaId: "22B8B758-9781-474E-93C3-17DDDF263CC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xc216-4c_g_eec_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ED7BCCB2-CE77-45A3-A6E1-D591894847C7", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xc216-4c_g_eec:-:*:*:*:*:*:*:*", matchCriteriaId: "323CEAEA-8122-43A5-BB87-97C7133FF510", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xc216eec_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E7C43419-B7AA-40EB-A40D-840F975BE2EC", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xc216eec:-:*:*:*:*:*:*:*", matchCriteriaId: "6BE498F8-A9D8-4A92-90CE-21BA30234947", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xc224-4c_g__firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "580A5BD5-2E8E-4801-BFE8-7476088F4214", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xc224-4c_g_:-:*:*:*:*:*:*:*", matchCriteriaId: "E7806CF9-4DA5-4090-84BD-D098C5FB1178", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xc224-4c_g_\\(e\\/ip\\)_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FFAC6598-DDAC-4873-9545-39B0EF21D478", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xc224-4c_g_\\(e\\/ip\\):-:*:*:*:*:*:*:*", matchCriteriaId: "EE4E3630-DB15-46EA-B320-E4E457240B9F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xc224-4c_g_eec_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "561064E3-FC05-4028-B75D-4D2519FEFD24", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xc224-4c_g_eec:-:*:*:*:*:*:*:*", matchCriteriaId: "0B0A02C9-A7CB-4CB3-B5DC-5FEE20A59208", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xc224__firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4303ED83-6610-458F-BEE9-B99BA31DD962", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xc224_:-:*:*:*:*:*:*:*", matchCriteriaId: "39AB9EB3-0F05-41C2-A32F-27B6D0C9C039", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xf201-3p_irt_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "475E5069-C120-4D49-AB9D-D3C3F94BD093", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xf201-3p_irt:-:*:*:*:*:*:*:*", matchCriteriaId: "41614C70-97B4-44C8-A441-530A413A26F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xf202-2p_irt_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "274E5C49-CA32-44D2-A864-C99A48CAA869", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xf202-2p_irt:-:*:*:*:*:*:*:*", matchCriteriaId: "6751FB7D-C72C-4321-B535-5880FE696FC3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xf204_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8CD13707-1164-415E-9083-7946D151F1FC", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xf204:-:*:*:*:*:*:*:*", matchCriteriaId: "0F1AE867-67B4-4871-BF56-88017533A737", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xf204-2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3A09FF2D-F369-47B5-AEE4-A862BEDD9851", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xf204-2:-:*:*:*:*:*:*:*", matchCriteriaId: "69285324-4C0B-4BDC-B60D-F653679DD52D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xf204-2ba_dna_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0BBC3005-41D0-4BA0-A146-E48E612CAF58", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xf204-2ba_dna:-:*:*:*:*:*:*:*", matchCriteriaId: "FAF28152-D6CA-4D20-BDF1-1EF4B7D10429", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xf204-2ba_irt_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "85B917B7-81E1-4419-B493-1D321027017E", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xf204-2ba_irt:-:*:*:*:*:*:*:*", matchCriteriaId: "99E6AFAA-B903-47BB-B0F3-7650B039C0FB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xf204_dna_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FCBEE10A-7E96-4239-AE6C-5FA9A6A32196", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xf204_dna:-:*:*:*:*:*:*:*", matchCriteriaId: "70D62F13-AD59-435E-851A-87A0A6E2FA3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xf204irt_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "42288C48-A2AA-4AA1-B5A2-F83C5A3689AE", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xf204irt:-:*:*:*:*:*:*:*", matchCriteriaId: "57E5489B-277A-4D02-B4AB-4DB65969EED2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xf206-1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CFCDC84E-0695-409A-844B-D24024CC33F2", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xf206-1:-:*:*:*:*:*:*:*", matchCriteriaId: "2B40D2EB-5C69-47FA-801B-DC48407D418C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xf208_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A1DB6C03-71BF-4359-834B-384E78910E64", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xf208:-:*:*:*:*:*:*:*", matchCriteriaId: "898613B2-4A9D-44B9-A3FC-4347A2AD7CAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xp208_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8082D4C1-C59E-43B6-B11F-C814ACD00321", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xp208:-:*:*:*:*:*:*:*", matchCriteriaId: "24C7FB09-D247-48F0-B87C-6A478BDC0A5A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xp208_\\(eip\\)_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "34349AEF-170F-432F-8D64-347F08536D3A", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xp208_\\(eip\\):-:*:*:*:*:*:*:*", matchCriteriaId: "17BD41C2-2398-4A03-9C5F-43AEF424261E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xp208eec_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EACF7493-4FE6-4902-9EE7-76F1B4AB118A", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xp208eec:-:*:*:*:*:*:*:*", matchCriteriaId: "2B313A4C-D3E7-4964-BA51-3401546B36C5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xp208poe_eec_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3237051D-0342-4DB8-B4A1-40A3B33A67BB", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xp208poe_eec:-:*:*:*:*:*:*:*", matchCriteriaId: "D6E888EA-73A7-42B8-A617-621CF192F2A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xp216_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4969C410-25DF-4BFA-9125-53D63B33691B", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xp216:-:*:*:*:*:*:*:*", matchCriteriaId: "67E4D039-5BF8-469B-A6FE-A391A6D1BDA4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xp216_\\(eip\\)_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B4A2ED6E-6632-4DD9-A359-73EB28BB306B", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xp216_\\(eip\\):-:*:*:*:*:*:*:*", matchCriteriaId: "33D044BD-12AD-42C9-B01C-957BEC6C6790", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xp216eec_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3B54DF8C-BB5A-46AF-862D-DC8E984A05AB", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xp216eec:-:*:*:*:*:*:*:*", matchCriteriaId: "12512EC4-FB7D-420F-9A8A-547562BE1B49", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_xp216poe_eec_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6FF74FFD-81C8-4E63-8B7B-AEBD98AB34F7", versionEndExcluding: "5.2.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_xp216poe_eec:-:*:*:*:*:*:*:*", matchCriteriaId: "C9BACE8C-6C69-4BC4-8F5B-1C74FA7EB339", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0). The web server of the affected devices contains a vulnerability that may lead to a buffer overflow condition. An attacker could cause this condition on the webserver by sending a specially crafted request. The webserver could stop and not recover anymore.", }, { lang: "es", value: "Se ha identificado una vulnerabilidad en la familia de switches SCALANCE X-200 (incluyendo Variantes SIPLUS NET) (Todas las versiones anteriores a la versiónV5.2.5), familia de switches SCALANCE X-200IRT (incluyendo Variantes SIPLUS NET) (Todas las versiones anteriores a la versiónV5.5.0). El servidor web de los dispositivos afectados contiene una vulnerabilidad que puede conllevar una condición de desbordamiento del búfer. Un atacante podría causar esta condición en el servidor web enviando una petición especialmente diseñada. El servidor web podría detenerse y no recuperarse más", }, ], id: "CVE-2020-25226", lastModified: "2024-11-21T05:17:42.257", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-01-12T21:15:16.543", references: [ { source: "productcert@siemens.com", tags: [ "Vendor Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf", }, ], sourceIdentifier: "productcert@siemens.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-122", }, ], source: "productcert@siemens.com", type: "Primary", }, { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Secondary", }, ], }
gsd-2020-25226
Vulnerability from gsd
{ GSD: { alias: "CVE-2020-25226", description: "A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0). The web server of the affected devices contains a vulnerability that may lead to a buffer overflow condition. An attacker could cause this condition on the webserver by sending a specially crafted request. The webserver could stop and not recover anymore.", id: "GSD-2020-25226", }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2020-25226", ], details: "A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0). The web server of the affected devices contains a vulnerability that may lead to a buffer overflow condition. An attacker could cause this condition on the webserver by sending a specially crafted request. The webserver could stop and not recover anymore.", id: "GSD-2020-25226", modified: "2023-12-13T01:21:56.880246Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "productcert@siemens.com", ID: "CVE-2020-25226", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "SCALANCE X-200 switch family (incl. SIPLUS NET variants)", version: { version_data: [ { version_value: "All versions < V5.2.5", }, ], }, }, { product_name: "SCALANCE X-200IRT switch family (incl. SIPLUS NET variants)", version: { version_data: [ { version_value: "All versions < V5.5.0", }, ], }, }, ], }, vendor_name: "Siemens", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0). The web server of the affected devices contains a vulnerability that may lead to a buffer overflow condition. An attacker could cause this condition on the webserver by sending a specially crafted request. The webserver could stop and not recover anymore.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-122: Heap-based Buffer Overflow", }, ], }, ], }, references: { reference_data: [ { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf", refsource: "MISC", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_x200-4pirt_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.5.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_x200-4pirt:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_x201-3pirt_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.5.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_x201-3pirt:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_x202-2irt_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.5.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_x202-2irt:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_x202-2pirt_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.5.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_x202-2pirt:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_x202-2pirt_siplus_net_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.5.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_x202-2pirt_siplus_net:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_x204irt_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.5.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_x204irt:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_x307-3_firmware:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_x307-3:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_x307-3ld_firmware:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_x307-3ld:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_x308-2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_x308-2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_x308-2ld_firmware:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_x308-2ld:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_x308-2lh_firmware:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_x308-2lh:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_x308-2lh\\+_firmware:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_x308-2lh\\+:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_x308-2m_firmware:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_x308-2m:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_x308-2m_ts_firmware:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_x308-2m_ts:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_x310_firmware:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_x310:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_x310fe_firmware:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_x310fe:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_x320-1fe_firmware:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_x320-1fe:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_x320-3ldfe_firmware:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_x320-3ldfe:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xb205-3_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xb205-3:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xb205-3ld_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xb205-3ld:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xb208_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xb208:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xb213-3_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xb213-3:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xb213-3ld_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xb213-3ld:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xb216_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xb216:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xc206-2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xc206-2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xc206-2g_poe__firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xc206-2g_poe_:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xc206-2g_poe_eec_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xc206-2g_poe_eec:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xc206-2sfp_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xc206-2sfp:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xc206-2sfp_eec_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xc206-2sfp_eec:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xc206-2sfp_g_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xc206-2sfp_g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xc206-2sfp_g_\\(e\\/ip\\)_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xc206-2sfp_g_\\(e\\/ip\\):-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xc206-2sfp_g_eec_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xc206-2sfp_g_eec:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xc208_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xc208:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xc208eec_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xc208eec:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xc208g_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xc208g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xc208g_\\(e\\/ip\\)_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xc208g_\\(e\\/ip\\):-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xc208g_eec_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xc208g_eec:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xc208g_poe_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xc208g_poe:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xc216_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xc216:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xc216-4c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xc216-4c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xc216-4c_g_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xc216-4c_g:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xc216-4c_g_\\(e\\/ip\\)_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xc216-4c_g_\\(e\\/ip\\):-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xc216-4c_g_eec_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xc216-4c_g_eec:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xc216eec_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xc216eec:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xc224-4c_g__firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xc224-4c_g_:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xc224-4c_g_\\(e\\/ip\\)_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xc224-4c_g_\\(e\\/ip\\):-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xc224-4c_g_eec_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xc224-4c_g_eec:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xc224__firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xc224_:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xf201-3p_irt_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xf201-3p_irt:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xf202-2p_irt_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xf202-2p_irt:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xf204_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xf204:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xf204-2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xf204-2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xf204-2ba_dna_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xf204-2ba_dna:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xf204-2ba_irt_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xf204-2ba_irt:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xf204_dna_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xf204_dna:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xf204irt_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xf204irt:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xf206-1_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xf206-1:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xf208_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xf208:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xp208_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xp208:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xp208_\\(eip\\)_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xp208_\\(eip\\):-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xp208eec_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xp208eec:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xp208poe_eec_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xp208poe_eec:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xp216_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xp216:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xp216_\\(eip\\)_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xp216_\\(eip\\):-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xp216eec_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xp216eec:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:siemens:scalance_xp216poe_eec_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.2.5", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:siemens:scalance_xp216poe_eec:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "productcert@siemens.com", ID: "CVE-2020-25226", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0). The web server of the affected devices contains a vulnerability that may lead to a buffer overflow condition. An attacker could cause this condition on the webserver by sending a specially crafted request. The webserver could stop and not recover anymore.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-122", }, ], }, ], }, references: { reference_data: [ { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf", refsource: "MISC", tags: [ "Vendor Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, }, }, lastModifiedDate: "2022-07-28T17:13Z", publishedDate: "2021-01-12T21:15Z", }, }, }
ghsa-p724-hcmr-xf8c
Vulnerability from github
A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions). The web server of the affected devices contains a vulnerability that may lead to a buffer overflow condition. An attacker could cause this condition on the webserver by sending a specially crafted request. The webserver could stop and not recover anymore.
{ affected: [], aliases: [ "CVE-2020-25226", ], database_specific: { cwe_ids: [ "CWE-122", "CWE-787", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2021-01-12T21:15:00Z", severity: "CRITICAL", }, details: "A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions). The web server of the affected devices contains a vulnerability that may lead to a buffer overflow condition. An attacker could cause this condition on the webserver by sending a specially crafted request. The webserver could stop and not recover anymore.", id: "GHSA-p724-hcmr-xf8c", modified: "2022-07-29T00:00:24Z", published: "2022-05-24T17:38:31Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-25226", }, { type: "WEB", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.