var-202101-0138
Vulnerability from variot
A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0). The vulnerability could allow an unauthenticated attacker to reboot the device over the network by using special urls from integrated web server of the affected products. SCALANCE X-200 and SCALANCE X-200IRT A vulnerability exists in the switch family regarding the lack of authentication for critical features.Denial of service (DoS) It may be put into a state. SCALANCE X is a switch used to connect industrial components, such as programmable logic controllers (plc) or human machine interfaces (HMIs)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0138", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance xp216eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xb213-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xp216 \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x202-2pirt siplus net", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance xc216-4c g eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204-2ba dna", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc206-2g poe", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xb205-3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc206-2sfp g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf201-3p irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x200-4pirt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance xc208g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x310", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf202-2p irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xp208eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x308-2lh\\+", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc208g poe", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc208", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x308-2", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x308-2m", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2g poe eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x308-2lh", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2sfp eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc208eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc224", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc216-4c g \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x310fe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp208 \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xp208", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x307-3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x201-3pirt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance x204irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance xb208", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x202-2pirt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance xp216poe eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xp216", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xb205-3ld", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x308-2ld", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x202-2irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance x320-3ldfe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc216", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc216-4c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc224-4c g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc206-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc224-4c g eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc216eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x307-3ld", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xb213-3ld", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc206-2sfp g \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc208g eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204 dna", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf206-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204-2ba irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc206-2sfp", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf208", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xp208poe eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x308-2m ts", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc216-4c g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xb216", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc208g \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x320-1fe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2sfp g eec", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xc224-4c g \\", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x307-3ld", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x201-3pirt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x200-4pirt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x202-2pirt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x204irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "siplus net scalance x202-2pirt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x308-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x202-2irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x308-2ld", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x307-3", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x-200irt switch family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance switch family", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x-200" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02596" }, { "db": "JVNDB", "id": "JVNDB-2020-015540" }, { "db": "NVD", "id": "CVE-2020-15799" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens reported these vulnerabilities to CISA.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-856" } ], "trust": 0.6 }, "cve": "CVE-2020-15799", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2020-15799", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2021-02596", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2020-15799", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-15799", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-15799", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2020-15799", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2021-02596", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202101-856", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02596" }, { "db": "JVNDB", "id": "JVNDB-2020-015540" }, { "db": "CNNVD", "id": "CNNVD-202101-856" }, { "db": "NVD", "id": "CVE-2020-15799" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions \u003c V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions \u003c V5.5.0). The vulnerability could allow an unauthenticated attacker to reboot the device over the network by using special urls from integrated web server of the affected products. SCALANCE X-200 and SCALANCE X-200IRT A vulnerability exists in the switch family regarding the lack of authentication for critical features.Denial of service (DoS) It may be put into a state. SCALANCE X is a switch used to connect industrial components, such as programmable logic controllers (plc) or human machine interfaces (HMIs)", "sources": [ { "db": "NVD", "id": "CVE-2020-15799" }, { "db": "JVNDB", "id": "JVNDB-2020-015540" }, { "db": "CNVD", "id": "CNVD-2021-02596" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-15799", "trust": 3.0 }, { "db": "SIEMENS", "id": "SSA-139628", "trust": 2.2 }, { "db": "JVNDB", "id": "JVNDB-2020-015540", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-02596", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-21-012-05", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0127", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202101-856", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02596" }, { "db": "JVNDB", "id": "JVNDB-2020-015540" }, { "db": "CNNVD", "id": "CNNVD-202101-856" }, { "db": "NVD", "id": "CVE-2020-15799" } ] }, "id": "VAR-202101-0138", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-02596" } ], "trust": 1.2641418511111109 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02596" } ] }, "last_update_date": "2024-11-23T19:39:47.719000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-139628", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf" }, { "title": "Patch for Scalance X Products key function certification missing vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/244024" }, { "title": "Multiple Siemens SCALANCE Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139366" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02596" }, { "db": "JVNDB", "id": "JVNDB-2020-015540" }, { "db": "CNNVD", "id": "CNNVD-202101-856" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.0 }, { "problemtype": "Lack of authentication for important features (CWE-306) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015540" }, { "db": "NVD", "id": "CVE-2020-15799" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-15799" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-05" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0127/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-02596" }, { "db": "JVNDB", "id": "JVNDB-2020-015540" }, { "db": "CNNVD", "id": "CNNVD-202101-856" }, { "db": "NVD", "id": "CVE-2020-15799" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-02596" }, { "db": "JVNDB", "id": "JVNDB-2020-015540" }, { "db": "CNNVD", "id": "CNNVD-202101-856" }, { "db": "NVD", "id": "CVE-2020-15799" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-13T00:00:00", "db": "CNVD", "id": "CNVD-2021-02596" }, { "date": "2021-10-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-015540" }, { "date": "2021-01-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-856" }, { "date": "2021-01-12T21:15:16.370000", "db": "NVD", "id": "CVE-2020-15799" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-02-04T00:00:00", "db": "CNVD", "id": "CNVD-2021-02596" }, { "date": "2021-10-04T05:21:00", "db": "JVNDB", "id": "JVNDB-2020-015540" }, { "date": "2021-09-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-856" }, { "date": "2024-11-21T05:06:12.267000", "db": "NVD", "id": "CVE-2020-15799" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-856" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SCALANCE\u00a0X-200\u00a0 and \u00a0SCALANCE\u00a0X-200IRT\u00a0 Vulnerability in lack of authentication for critical features in the switch family", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015540" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-856" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.