Vulnerabilites related to siemens - scalance_x-200_firmware
Vulnerability from fkie_nvd
Published
2019-03-26 22:29
Modified
2024-11-21 04:46
Severity ?
Summary
The monitor barrier of the affected products insufficiently blocks data from being forwarded over the mirror port into the mirrored network. An attacker could use this behavior to transmit malicious packets to systems in the mirrored network, possibly influencing their configuration and runtime behavior.
References
▶ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-557804.pdf | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-557804.pdf | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_x-200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "443B5E7B-A491-4883-9853-A88D3B24E220", "versionEndExcluding": "5.2.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_x-200:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FEF9F9F-4066-483B-BF95-3BA5625284DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_x-300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "076F3DDE-2B70-4F53-9B12-7CE3D9641E7E", "versionEndExcluding": "4.1.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_x-300:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2D0AB50-6F0B-4232-8C8E-1647410D362D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_xp-200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E81AEF3-1F99-4728-B3E1-FFBB22DA64E5", "versionEndExcluding": "4.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_xp-200:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F962FC7-0616-467F-8CCA-ADEA224B5F7B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_xc-200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C098F765-4BA2-4E59-9875-35FB5B83B6EB", "versionEndExcluding": "4.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_xc-200:-:*:*:*:*:*:*:*", "matchCriteriaId": "7719E194-EE3D-4CE8-8C85-CF0D82A553AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_xf-200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB0A1BD9-F58D-4BF4-BF8B-EA8A0A7A1C64", "versionEndExcluding": "4.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_xf-200:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB503096-C528-478C-BD07-019C2CC882E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The monitor barrier of the affected products insufficiently blocks data from being forwarded over the mirror port into the mirrored network. An attacker could use this behavior to transmit malicious packets to systems in the mirrored network, possibly influencing their configuration and runtime behavior." }, { "lang": "es", "value": "La barrera de monitorizaci\u00f3n de los productos afectados bloquea insuficientemente el reenv\u00edo de datos a trav\u00e9s del puerto espejo hacia la red reflejada. Un atacante podr\u00eda utilizar este comportamiento para transmitir paquetes maliciosos a los sistemas de la red en espejo, posiblemente influyendo en su configuraci\u00f3n y comportamiento en tiempo de ejecuci\u00f3n" } ], "id": "CVE-2019-6569", "lastModified": "2024-11-21T04:46:43.123", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-26T22:29:00.833", "references": [ { "source": "productcert@siemens.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-557804.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-557804.pdf" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-440" } ], "source": "productcert@siemens.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2019-08-13 19:15
Modified
2024-11-21 04:20
Severity ?
Summary
A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0), SCALANCE X204RNA (HSR) (All versions), SCALANCE X204RNA (PRP) (All versions), SCALANCE X204RNA EEC (HSR) (All versions), SCALANCE X204RNA EEC (PRP) (All versions), SCALANCE X204RNA EEC (PRP/HSR) (All versions). The device contains a vulnerability that could allow an attacker to trigger a denial-of-service condition by sending large message packages repeatedly to the telnet service. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | scalance_x-200_firmware | * | |
siemens | scalance_x-200 | - | |
siemens | scalance_x-200irt_firmware | * | |
siemens | scalance_x-200irt | - | |
siemens | scalance_x-200rna_firmware | * | |
siemens | scalance_x-200rna | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_x-200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFB6ADA6-1A88-4E78-ACF5-B55CDF413E92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_x-200:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FEF9F9F-4066-483B-BF95-3BA5625284DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_x-200irt_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "602CAF2E-2276-455C-82E5-A05BBFC198C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_x-200irt:-:*:*:*:*:*:*:*", "matchCriteriaId": "94C7BE35-D3A6-488C-BB3D-D17D65DF4B80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_x-200rna_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "282096F4-8422-4261-A446-69FFB0933FC1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_x-200rna:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BCF5B82-0766-4711-90E6-C2A6FACE44EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions \u003c V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions \u003c V5.5.0), SCALANCE X204RNA (HSR) (All versions), SCALANCE X204RNA (PRP) (All versions), SCALANCE X204RNA EEC (HSR) (All versions), SCALANCE X204RNA EEC (PRP) (All versions), SCALANCE X204RNA EEC (PRP/HSR) (All versions). The device contains a vulnerability that could allow an attacker to trigger a denial-of-service condition by sending large message packages repeatedly to the telnet service. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the device." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en la familia de conmutadores SCALANCE X-200 (incluidas las variantes de SIPLUS NET) (Todas las versiones anteriores a la versi\u00f3n V5.2.5), la familia de conmutadores SCALANCE X-200IRT (incluidas las variantes de SIPLUS NET) (Todas las versiones anteriores a la versi\u00f3n V5.5. 0), SCALANCE X204RNA (HSR) (Todas las versiones), SCALANCE X204RNA (PRP) (Todas las versiones), SCALANCE X204RNA EEC (HSR) (Todas las versiones), SCALANCE X204RNA EEC (PRP) (Todas las versiones), SCALANCE X204RNA EEC (PRP/HSR) (Todas las versiones). El dispositivo contiene una vulnerabilidad que podr\u00eda permitir a un atacante desencadenar una condici\u00f3n de denegaci\u00f3n de servicio mediante el env\u00edo repetido de grandes paquetes de mensajes al servicio telnet. La vulnerabilidad de seguridad podr\u00eda ser explotada por un atacante con acceso de red a los sistemas afectados. La explotaci\u00f3n exitosa no requiere privilegios del sistema ni interacci\u00f3n del usuario. Un atacante podr\u00eda utilizar la vulnerabilidad para comprometer la disponibilidad del dispositivo" } ], "id": "CVE-2019-10942", "lastModified": "2024-11-21T04:20:12.190", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-13T19:15:15.453", "references": [ { "source": "productcert@siemens.com", "tags": [ "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-100232.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-100232.pdf" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "productcert@siemens.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2018-06-14 16:29
Modified
2024-11-21 04:07
Severity ?
Summary
A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.3), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.4.1), SCALANCE X-200RNA switch family (All versions < V3.2.7), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions < V4.1.3). The integrated configuration web server of the affected devices could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link. User interaction is required for a successful exploitation. The user must be logged into the web interface in order for the exploitation to succeed. At the stage of publishing this security advisory no public exploitation is known. The vendor has confirmed the vulnerability and provides mitigations to resolve it.
References
▶ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | http://www.securityfocus.com/bid/104494 | Third Party Advisory, VDB Entry | |
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-480829.pdf | Third Party Advisory, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104494 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-480829.pdf | Third Party Advisory, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | scalance_x300_firmware | * | |
siemens | scalance_x300 | - | |
siemens | scalance_x-200_irt_firmware | * | |
siemens | scalance_x-200_irt | - | |
siemens | scalance_x-200_firmware | * | |
siemens | scalance_x-200 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_x300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42E2C599-41E1-473A-8E05-011C5DE120D1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_x300:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3F6299B-D7E3-4750-B016-7DCBC83C2287", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_x-200_irt_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A7C433F-2FA4-4FA0-8167-152659EB8D35", "versionEndExcluding": "5.4.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_x-200_irt:-:*:*:*:*:*:*:*", "matchCriteriaId": "8503130C-ED23-48E8-8093-83894883EBF2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_x-200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DF2914E-33E6-4036-A971-E6D1711B8E77", "versionEndExcluding": "5.2.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_x-200:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FEF9F9F-4066-483B-BF95-3BA5625284DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions \u003c V5.2.3), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions \u003c V5.4.1), SCALANCE X-200RNA switch family (All versions \u003c V3.2.7), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions \u003c V4.1.3). The integrated configuration web server of the affected devices could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link. User interaction is required for a successful exploitation. The user must be logged into the web interface in order for the exploitation to succeed. At the stage of publishing this security advisory no public exploitation is known. The vendor has confirmed the vulnerability and provides mitigations to resolve it." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en la familia de conmutadores SCALANCE X-200 (incluidas las variantes SIPLUS NET) (todas las versiones anteriores a la versi\u00f3n V5.2.3), familia de conmutadores SCALANCE X-200IRT (incluidas las variantes SIPLUS NET) (todas las versiones anteriores a la versi\u00f3n V5.4.1), Familia de conmutadores SCALANCE X-300 (incluidas las variantes X408 y SIPLUS NET) (Todas las versiones anteriores a la versi\u00f3n V4.1.3). El servidor web de configuraci\u00f3n integrado de los interruptores Scalance X afectados podr\u00eda permitir ataques Cross-Site Scripting (XSS) si los usuarios desprevenidos son enga\u00f1ados para acceder a un enlace malicioso. Se requiere la interacci\u00f3n del usuario para una explotaci\u00f3n exitosa. El usuario debe iniciar sesi\u00f3n en la interfaz web para que la explotaci\u00f3n tenga \u00e9xito. En la etapa de publicaci\u00f3n de este aviso de seguridad no se conoce explotaci\u00f3n p\u00fablica. El proveedor ha confirmado la vulnerabilidad y proporciona mitigaciones para resolverla." } ], "id": "CVE-2018-4848", "lastModified": "2024-11-21T04:07:34.740", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-06-14T16:29:00.490", "references": [ { "source": "productcert@siemens.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104494" }, { "source": "productcert@siemens.com", "tags": [ "Third Party Advisory", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-480829.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104494" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-480829.pdf" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-80" } ], "source": "productcert@siemens.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-06-12 14:29
Modified
2024-11-21 04:46
Severity ?
Summary
A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All Versions < V5.2.4), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions < V4.1.3), SCALANCE X-414-3E (All versions). The affected devices store passwords in a recoverable format. An attacker may extract and recover device passwords from the device configuration. Successful exploitation requires access to a device configuration backup and impacts confidentiality of the stored passwords.
References
▶ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-646841.pdf | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-646841.pdf | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | scalance_x-200_firmware | * | |
siemens | scalance_x-200 | - | |
siemens | scalance_x-200irt_firmware | * | |
siemens | scalance_x-200irt | - | |
siemens | scalance_x-300_firmware | * | |
siemens | scalance_x-300 | - | |
siemens | scalance_x-414-3e_firmware | * | |
siemens | scalance_x-414-3e | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_x-200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "443B5E7B-A491-4883-9853-A88D3B24E220", "versionEndExcluding": "5.2.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_x-200:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FEF9F9F-4066-483B-BF95-3BA5625284DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_x-200irt_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "602CAF2E-2276-455C-82E5-A05BBFC198C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_x-200irt:-:*:*:*:*:*:*:*", "matchCriteriaId": "94C7BE35-D3A6-488C-BB3D-D17D65DF4B80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_x-300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F2C50BB-CC63-40BE-A5F0-0F0C342586CA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_x-300:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2D0AB50-6F0B-4232-8C8E-1647410D362D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_x-414-3e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9B3E06E-8822-406C-907A-40AE328B311C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_x-414-3e:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE7762EE-1253-4A4B-81CF-1A6423135AB6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All Versions \u003c V5.2.4), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions \u003c V5.5.0), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions \u003c V4.1.3), SCALANCE X-414-3E (All versions). The affected devices store passwords in a recoverable format. An attacker may extract and recover device passwords from the device configuration. Successful exploitation requires access to a device configuration backup and impacts confidentiality of the stored passwords." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en la familia de switches SCALANCE X-200 (incluidas las variantes SIPLUS NET) (Todas las versiones anteriores a V5.2.4), familia de switches SCALANCE X-200IRT (incluidas las variantes SIPLUS NET) (Todas las versiones anteriores a V5.5.0), familia de switches SCALANCE X-300 (incluyendo X408 y las variantes SIPLUS NET) (Todas las versiones anteriores a V4.1.3), SCALANCE X-414-3E (Todas las versiones). Los dispositivos afectados almacenan contrase\u00f1as en un formato recuperable. Un atacante puede extraer y recuperar contrase\u00f1as de dispositivos desde la configuraci\u00f3n del dispositivo. La explotaci\u00f3n exitosa requiere acceso a una copia de seguridad de la configuraci\u00f3n del dispositivo e impacta la confidencialidad de las contrase\u00f1as almacenadas. En el momento de la publicaci\u00f3n del aviso no se conoc\u00eda la explotaci\u00f3n p\u00fablica de esta vulnerabilidad de seguridad" } ], "id": "CVE-2019-6567", "lastModified": "2024-11-21T04:46:42.633", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-12T14:29:04.820", "references": [ { "source": "productcert@siemens.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-646841.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-646841.pdf" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-257" } ], "source": "productcert@siemens.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2019-6569 (GCVE-0-2019-6569)
Vulnerability from cvelistv5
Published
2019-03-26 21:12
Modified
2024-08-04 20:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-440 - Expected Behavior Violation
Summary
The monitor barrier of the affected products insufficiently blocks data from being forwarded over the mirror port into the mirrored network. An attacker could use this behavior to transmit malicious packets to systems in the mirrored network, possibly influencing their configuration and runtime behavior.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:23:22.201Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-557804.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SCALANCE X204-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "product": "SCALANCE X204-2FM", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "product": "SCALANCE X204-2LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "product": "SCALANCE X204-2LD TS", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "product": "SCALANCE X204-2TS", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "product": "SCALANCE X206-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "product": "SCALANCE X206-1LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "product": "SCALANCE X208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "product": "SCALANCE X208PRO", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "product": "SCALANCE X212-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "product": "SCALANCE X212-2LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "product": "SCALANCE X216", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "product": "SCALANCE X224", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "product": "SCALANCE X302-7 EEC (230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X302-7 EEC (230V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X302-7 EEC (24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X302-7 EEC (24V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X302-7 EEC (2x 230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X302-7 EEC (2x 230V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X302-7 EEC (2x 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X302-7 EEC (2x 24V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X304-2FE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X306-1LD FE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X307-2 EEC (230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X307-2 EEC (230V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X307-2 EEC (24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X307-2 EEC (24V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X307-2 EEC (2x 230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X307-2 EEC (2x 230V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X307-2 EEC (2x 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X307-2 EEC (2x 24V, coated)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X307-3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X307-3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X307-3LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X307-3LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X308-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X308-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X308-2LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X308-2LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X308-2LH", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X308-2LH", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X308-2LH+", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X308-2LH+", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X308-2M", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X308-2M", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X308-2M PoE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X308-2M PoE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X308-2M TS", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X308-2M TS", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X310", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X310", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X310FE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X310FE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X320-1 FE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X320-1-2LD FE", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X408-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XB205-3 (SC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XB205-3 (SC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XB205-3 (ST/BFOC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XB205-3 (ST/BFOC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XB205-3LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XB205-3LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XB208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XB208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XB213-3 (SC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XB213-3 (SC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XB213-3 (ST/BFOC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XB213-3 (ST/BFOC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XB213-3LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XB213-3LD", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XB216", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XB216", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XC206-2 (SC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XC206-2 (ST/BFOC)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XC206-2SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XC206-2SFP EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XC206-2SFP G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XC206-2SFP G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XC206-2SFP G EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XC208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XC208EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XC208G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XC208G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XC208G EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XC216", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XC216-4C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XC216-4C G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XC216-4C G (EIP Def.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XC216-4C G EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XC216EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XC224", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XC224-4C G", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XC224-4C G (EIP Def.)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XC224-4C G EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XF204", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "product": "SCALANCE XF204", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XF204 DNA", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XF204-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "product": "SCALANCE XF204-2BA", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XF204-2BA DNA", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XF206-1", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "product": "SCALANCE XF208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.6" } ] }, { "product": "SCALANCE XP208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XP208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XP208EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XP208PoE EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XP216", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XP216", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XP216EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XP216POE EEC", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XR324-12M (230V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-12M (230V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-12M (230V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-12M (230V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-12M (24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-12M (24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-12M (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-12M (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-12M TS (24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-12M TS (24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-4M EEC (24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-4M EEC (24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-4M EEC (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-4M EEC (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-4M EEC (2x 24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-4M EEC (2x 24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-4M EEC (2x 24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-4M EEC (2x 24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-4M PoE (230V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-4M PoE (230V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-4M PoE (230V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-4M PoE (230V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-4M PoE (24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-4M PoE (24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-4M PoE (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-4M PoE (24V, ports on rear)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-4M PoE TS (24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324-4M PoE TS (24V, ports on front)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE XR324WG (24 X FE, DC 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XR324WG (24 x FE, AC 230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XR328-4C WG (28xGE, AC 230V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XR328-4C WG (28xGE, DC 24V)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SIPLUS NET SCALANCE X308-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SIPLUS NET SCALANCE XC206-2", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SIPLUS NET SCALANCE XC206-2SFP", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SIPLUS NET SCALANCE XC208", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SIPLUS NET SCALANCE XC216-4C", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] } ], "datePublic": "2019-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "The monitor barrier of the affected products insufficiently blocks data from being forwarded over the mirror port into the mirrored network. An attacker could use this behavior to transmit malicious packets to systems in the mirrored network, possibly influencing their configuration and runtime behavior." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-440", "description": "CWE-440: Expected Behavior Violation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-12T10:06:21", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-557804.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-6569", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SCALANCE X204-2", "version": { "version_data": [ { "version_value": "All versions \u003c V5.2.6" } ] } }, { "product_name": "SCALANCE X204-2FM", "version": { "version_data": [ { "version_value": "All versions \u003c V5.2.6" } ] } }, { "product_name": "SCALANCE X204-2LD", "version": { "version_data": [ { "version_value": "All versions \u003c V5.2.6" } ] } }, { "product_name": "SCALANCE X204-2LD TS", "version": { "version_data": [ { "version_value": "All versions \u003c V5.2.6" } ] } }, { "product_name": "SCALANCE X204-2TS", "version": { "version_data": [ { "version_value": "All versions \u003c V5.2.6" } ] } }, { "product_name": "SCALANCE X206-1", "version": { "version_data": [ { "version_value": "All versions \u003c V5.2.6" } ] } }, { "product_name": "SCALANCE X206-1LD", "version": { "version_data": [ { "version_value": "All versions \u003c V5.2.6" } ] } }, { "product_name": "SCALANCE X208", "version": { "version_data": [ { "version_value": "All versions \u003c V5.2.6" } ] } }, { "product_name": "SCALANCE X208PRO", "version": { "version_data": [ { "version_value": "All versions \u003c V5.2.6" } ] } }, { "product_name": "SCALANCE X212-2", "version": { "version_data": [ { "version_value": "All versions \u003c V5.2.6" } ] } }, { "product_name": "SCALANCE X212-2LD", "version": { "version_data": [ { "version_value": "All versions \u003c V5.2.6" } ] } }, { "product_name": "SCALANCE X216", "version": { "version_data": [ { "version_value": "All versions \u003c V5.2.6" } ] } }, { "product_name": "SCALANCE X224", "version": { "version_data": [ { "version_value": "All versions \u003c V5.2.6" } ] } }, { "product_name": "SCALANCE X302-7 EEC (230V)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X302-7 EEC (230V, coated)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X302-7 EEC (24V)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X302-7 EEC (24V, coated)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X302-7 EEC (2x 230V)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X302-7 EEC (2x 230V, coated)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X302-7 EEC (2x 24V)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X302-7 EEC (2x 24V, coated)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X304-2FE", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X306-1LD FE", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X307-2 EEC (230V)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X307-2 EEC (230V, coated)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X307-2 EEC (24V)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X307-2 EEC (24V, coated)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X307-2 EEC (2x 230V)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X307-2 EEC (2x 230V, coated)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X307-2 EEC (2x 24V)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X307-2 EEC (2x 24V, coated)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X307-3", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X307-3", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X307-3LD", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X307-3LD", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X308-2", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X308-2", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X308-2LD", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X308-2LD", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X308-2LH", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X308-2LH", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X308-2LH+", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X308-2LH+", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X308-2M", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X308-2M", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X308-2M PoE", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X308-2M PoE", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X308-2M TS", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X308-2M TS", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X310", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X310", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X310FE", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X310FE", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X320-1 FE", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X320-1-2LD FE", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X408-2", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XB205-3 (SC)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XB205-3 (SC)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XB205-3 (ST/BFOC)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XB205-3 (ST/BFOC)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XB205-3LD", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XB205-3LD", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XB208", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XB208", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XB213-3 (SC)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XB213-3 (SC)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XB213-3 (ST/BFOC)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XB213-3 (ST/BFOC)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XB213-3LD", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XB213-3LD", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XB216", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XB216", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XC206-2 (SC)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XC206-2 (ST/BFOC)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XC206-2SFP", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XC206-2SFP EEC", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XC206-2SFP G", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XC206-2SFP G", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XC206-2SFP G EEC", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XC208", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XC208EEC", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XC208G", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XC208G", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XC208G EEC", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XC216", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XC216-4C", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XC216-4C G", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XC216-4C G (EIP Def.)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XC216-4C G EEC", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XC216EEC", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XC224", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XC224-4C G", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XC224-4C G (EIP Def.)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XC224-4C G EEC", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XF204", "version": { "version_data": [ { "version_value": "All versions \u003c V5.2.6" } ] } }, { "product_name": "SCALANCE XF204", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XF204 DNA", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XF204-2", "version": { "version_data": [ { "version_value": "All versions \u003c V5.2.6" } ] } }, { "product_name": "SCALANCE XF204-2BA", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XF204-2BA DNA", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XF206-1", "version": { "version_data": [ { "version_value": "All versions \u003c V5.2.6" } ] } }, { "product_name": "SCALANCE XF208", "version": { "version_data": [ { "version_value": "All versions \u003c V5.2.6" } ] } }, { "product_name": "SCALANCE XP208", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XP208", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XP208EEC", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XP208PoE EEC", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XP216", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XP216", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XP216EEC", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XP216POE EEC", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XR324-12M (230V, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-12M (230V, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-12M (230V, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-12M (230V, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-12M (24V, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-12M (24V, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-12M (24V, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-12M (24V, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-12M TS (24V)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-12M TS (24V)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (24V, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (24V, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (24V, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (24V, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (2x 24V, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (2x 24V, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M PoE (230V, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M PoE (230V, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M PoE (230V, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M PoE (230V, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M PoE (24V, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M PoE (24V, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M PoE (24V, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M PoE (24V, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M PoE TS (24V, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M PoE TS (24V, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324WG (24 X FE, DC 24V)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XR324WG (24 x FE, AC 230V)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XR328-4C WG (28xGE, AC 230V)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XR328-4C WG (28xGE, DC 24V)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SIPLUS NET SCALANCE X308-2", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SIPLUS NET SCALANCE XC206-2", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SIPLUS NET SCALANCE XC206-2SFP", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SIPLUS NET SCALANCE XC208", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SIPLUS NET SCALANCE XC216-4C", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The monitor barrier of the affected products insufficiently blocks data from being forwarded over the mirror port into the mirrored network. An attacker could use this behavior to transmit malicious packets to systems in the mirrored network, possibly influencing their configuration and runtime behavior." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-440: Expected Behavior Violation" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-557804.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-557804.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-6569", "datePublished": "2019-03-26T21:12:43", "dateReserved": "2019-01-22T00:00:00", "dateUpdated": "2024-08-04T20:23:22.201Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-4848 (GCVE-0-2018-4848)
Vulnerability from cvelistv5
Published
2018-06-14 00:00
Modified
2024-08-05 05:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-80 - Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
Summary
A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.3), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.4.1), SCALANCE X-200RNA switch family (All versions < V3.2.7), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions < V4.1.3). The integrated configuration web server of the affected devices could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link. User interaction is required for a successful exploitation. The user must be logged into the web interface in order for the exploitation to succeed. At the stage of publishing this security advisory no public exploitation is known. The vendor has confirmed the vulnerability and provides mitigations to resolve it.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Siemens | SCALANCE X-200 switch family (incl. SIPLUS NET variants) |
Version: All versions < V5.2.3 |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:18:26.424Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "104494", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104494" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-480829.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SCALANCE X-200 switch family (incl. SIPLUS NET variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.3" } ] }, { "product": "SCALANCE X-200IRT switch family (incl. SIPLUS NET variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.4.1" } ] }, { "product": "SCALANCE X-200RNA switch family", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.2.7" } ] }, { "product": "SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] } ], "datePublic": "2018-06-12T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions \u003c V5.2.3), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions \u003c V5.4.1), SCALANCE X-200RNA switch family (All versions \u003c V3.2.7), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions \u003c V4.1.3). The integrated configuration web server of the affected devices could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link. User interaction is required for a successful exploitation. The user must be logged into the web interface in order for the exploitation to succeed. At the stage of publishing this security advisory no public exploitation is known. The vendor has confirmed the vulnerability and provides mitigations to resolve it." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-80", "description": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-13T00:00:00", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "name": "104494", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/104494" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-480829.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2018-4848", "datePublished": "2018-06-14T00:00:00", "dateReserved": "2018-01-02T00:00:00", "dateUpdated": "2024-08-05T05:18:26.424Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-10942 (GCVE-0-2019-10942)
Vulnerability from cvelistv5
Published
2019-08-13 18:55
Modified
2024-08-04 22:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-400 - Uncontrolled Resource Consumption
Summary
A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0), SCALANCE X204RNA (HSR) (All versions), SCALANCE X204RNA (PRP) (All versions), SCALANCE X204RNA EEC (HSR) (All versions), SCALANCE X204RNA EEC (PRP) (All versions), SCALANCE X204RNA EEC (PRP/HSR) (All versions). The device contains a vulnerability that could allow an attacker to trigger a denial-of-service condition by sending large message packages repeatedly to the telnet service. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the device.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Siemens | SCALANCE X-200 switch family (incl. SIPLUS NET variants) |
Version: All versions < V5.2.5 |
|||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:40:15.308Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-100232.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SCALANCE X-200 switch family (incl. SIPLUS NET variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2.5" } ] }, { "product": "SCALANCE X-200IRT switch family (incl. SIPLUS NET variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.0" } ] }, { "product": "SCALANCE X204RNA (HSR)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "SCALANCE X204RNA (PRP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "SCALANCE X204RNA EEC (HSR)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "SCALANCE X204RNA EEC (PRP)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "SCALANCE X204RNA EEC (PRP/HSR)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions \u003c V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions \u003c V5.5.0), SCALANCE X204RNA (HSR) (All versions), SCALANCE X204RNA (PRP) (All versions), SCALANCE X204RNA EEC (HSR) (All versions), SCALANCE X204RNA EEC (PRP) (All versions), SCALANCE X204RNA EEC (PRP/HSR) (All versions). The device contains a vulnerability that could allow an attacker to trigger a denial-of-service condition by sending large message packages repeatedly to the telnet service. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the device." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-09T15:16:32", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-100232.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-10942", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SCALANCE X-200 switch family (incl. SIPLUS NET variants)", "version": { "version_data": [ { "version_value": "All versions \u003c V5.2.5" } ] } }, { "product_name": "SCALANCE X-200IRT switch family (incl. SIPLUS NET variants)", "version": { "version_data": [ { "version_value": "All versions \u003c V5.5.0" } ] } }, { "product_name": "SCALANCE X204RNA (HSR)", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "SCALANCE X204RNA (PRP)", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "SCALANCE X204RNA EEC (HSR)", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "SCALANCE X204RNA EEC (PRP)", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "SCALANCE X204RNA EEC (PRP/HSR)", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions \u003c V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions \u003c V5.5.0), SCALANCE X204RNA (HSR) (All versions), SCALANCE X204RNA (PRP) (All versions), SCALANCE X204RNA EEC (HSR) (All versions), SCALANCE X204RNA EEC (PRP) (All versions), SCALANCE X204RNA EEC (PRP/HSR) (All versions). The device contains a vulnerability that could allow an attacker to trigger a denial-of-service condition by sending large message packages repeatedly to the telnet service. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the device." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400: Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-100232.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-100232.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-10942", "datePublished": "2019-08-13T18:55:57", "dateReserved": "2019-04-08T00:00:00", "dateUpdated": "2024-08-04T22:40:15.308Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-6567 (GCVE-0-2019-6567)
Vulnerability from cvelistv5
Published
2019-06-12 13:47
Modified
2024-08-04 20:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-257 - Storing Passwords in a Recoverable Format
Summary
A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All Versions < V5.2.4), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions < V4.1.3), SCALANCE X-414-3E (All versions). The affected devices store passwords in a recoverable format. An attacker may extract and recover device passwords from the device configuration. Successful exploitation requires access to a device configuration backup and impacts confidentiality of the stored passwords.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Siemens | SCALANCE X-200 switch family (incl. SIPLUS NET variants) |
Version: All Versions < V5.2.4 |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:23:22.108Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-646841.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SCALANCE X-200 switch family (incl. SIPLUS NET variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All Versions \u003c V5.2.4" } ] }, { "product": "SCALANCE X-200IRT switch family (incl. SIPLUS NET variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.5.0" } ] }, { "product": "SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1.3" } ] }, { "product": "SCALANCE X-414-3E", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All Versions \u003c V5.2.4), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions \u003c V5.5.0), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions \u003c V4.1.3), SCALANCE X-414-3E (All versions). The affected devices store passwords in a recoverable format. An attacker may extract and recover device passwords from the device configuration. Successful exploitation requires access to a device configuration backup and impacts confidentiality of the stored passwords." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-257", "description": "CWE-257: Storing Passwords in a Recoverable Format", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-09T15:38:17", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-646841.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-6567", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SCALANCE X-200 switch family (incl. SIPLUS NET variants)", "version": { "version_data": [ { "version_value": "All Versions \u003c V5.2.4" } ] } }, { "product_name": "SCALANCE X-200IRT switch family (incl. SIPLUS NET variants)", "version": { "version_data": [ { "version_value": "All versions \u003c V5.5.0" } ] } }, { "product_name": "SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X-414-3E", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All Versions \u003c V5.2.4), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions \u003c V5.5.0), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions \u003c V4.1.3), SCALANCE X-414-3E (All versions). The affected devices store passwords in a recoverable format. An attacker may extract and recover device passwords from the device configuration. Successful exploitation requires access to a device configuration backup and impacts confidentiality of the stored passwords." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-257: Storing Passwords in a Recoverable Format" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-646841.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-646841.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-6567", "datePublished": "2019-06-12T13:47:56", "dateReserved": "2019-01-22T00:00:00", "dateUpdated": "2024-08-04T20:23:22.108Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }