Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2012-1802 (GCVE-0-2012-1802)
Vulnerability from cvelistv5 – Published: 2012-04-18 10:00 – Updated: 2024-08-06 19:08- n/a
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T19:08:38.499Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "81032",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/81032"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-04.pdf"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-130874.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-04-11T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the embedded web server on the Siemens Scalance X Industrial Ethernet switch X414-3E before 3.7.1, X308-2M before 3.7.2, X-300EEC before 3.7.2, XR-300 before 3.7.2, and X-300 before 3.7.2 allows remote attackers to cause a denial of service (device reboot) or possibly execute arbitrary code via a malformed URL."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-11-20T10:00:00",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"name": "81032",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/81032"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-04.pdf"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-130874.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2012-1802",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the embedded web server on the Siemens Scalance X Industrial Ethernet switch X414-3E before 3.7.1, X308-2M before 3.7.2, X-300EEC before 3.7.2, XR-300 before 3.7.2, and X-300 before 3.7.2 allows remote attackers to cause a denial of service (device reboot) or possibly execute arbitrary code via a malformed URL."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "81032",
"refsource": "OSVDB",
"url": "http://osvdb.org/81032"
},
{
"name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-04.pdf",
"refsource": "MISC",
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-04.pdf"
},
{
"name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-130874.pdf",
"refsource": "CONFIRM",
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-130874.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2012-1802",
"datePublished": "2012-04-18T10:00:00",
"dateReserved": "2012-03-21T00:00:00",
"dateUpdated": "2024-08-06T19:08:38.499Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:scalance_x414-3e_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.7.0\", \"matchCriteriaId\": \"FB47C02A-0FD8-47A2-93F8-310A5E05E19F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:scalance_x414-3e_firmware:1.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6212D6C3-A68D-41BA-929A-943A157B3BA7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:scalance_x414-3e_firmware:2.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56338A9A-C59D-47D3-9AB4-18C53A75EDD5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:scalance_x414-3e_firmware:2.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"801D7741-8EBB-4A68-A77C-E26C304EB988\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:scalance_x414-3e_firmware:2.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF4AB664-29DD-46F0-B136-8BD458430BD4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:scalance_x414-3e_firmware:2.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB8720F3-21D3-40C1-98A8-90E2EF6BBA52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:scalance_x414-3e_firmware:3.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FFF99DC1-34B7-4AAA-BC33-5763B56EEA1B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:scalance_x414-3e_firmware:3.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"629D65C2-0D61-48BD-9C73-7794AC061756\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:scalance_x414-3e_firmware:3.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DDD5708A-0105-4129-B5A6-DAF0247ABE1F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:scalance_x414-3e_firmware:3.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B349A4F6-1FB0-433B-B512-883E580CFB27\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:siemens:scalance_x414-3e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6645288F-F688-442A-8C56-17536BFAD4BE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:scalance_x308-2m_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.7.0\", \"matchCriteriaId\": \"EC42F509-F58D-4A65-9C31-26F0C7319076\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:scalance_x308-2m_firmware:3.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4020E0F4-E92A-442D-A703-CA8840B8D944\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:scalance_x308-2m_firmware:3.5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58E635A6-1AFF-4A34-87F3-F68571032448\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:scalance_x308-2m_firmware:3.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB1B5735-D3C0-445C-B7D5-A3099D1CE152\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:siemens:scalance_x308-2m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC54911E-C432-48FA-9551-9644422FFE14\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:scalance_x-300eec_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.7.0\", \"matchCriteriaId\": \"6F13D012-86FA-4A41-8D18-94942A270DAA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:scalance_x-300eec_firmware:3.5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB16E154-1E59-438F-9895-47260FDD7230\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:siemens:scalance_x-300eec:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2F32466-A411-4D69-864A-4434D3D5DB54\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:scalance_xr-300_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.7.0\", \"matchCriteriaId\": \"FF530C3C-A126-4F6A-8010-E93352800598\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:scalance_xr-300_firmware:3.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE3F5ED9-F357-430C-B277-B7EC0715A391\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:scalance_xr-300_firmware:3.5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61FF9CF2-14CD-49BF-AC0B-0D2E0EDCF79F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:siemens:scalance_xr-300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"889CF2C0-EE6C-447F-85F1-005730EAD232\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:scalance_x-300_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.7.0\", \"matchCriteriaId\": \"F2000A16-E8A2-4E8E-A90F-4E0F62F3993C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:scalance_x-300_firmware:2.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF93BD72-2893-436D-A514-3C463C1AA428\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:scalance_x-300_firmware:2.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59323828-6A3A-48CD-B98C-64CD65829471\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:scalance_x-300_firmware:3.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8C53B2B-BFFC-47D1-B935-FF85F5A4D3F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:scalance_x-300_firmware:3.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"054C0618-5CA9-43E4-A557-0064B8BB5B63\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:scalance_x-300_firmware:3.5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D5DF242-8FD0-467C-84D1-5207CC15D2D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:scalance_x-300_firmware:3.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B16E873A-5D79-43B8-BB64-66B8079CFCC4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:siemens:scalance_x-300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2D0AB50-6F0B-4232-8C8E-1647410D362D\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Buffer overflow in the embedded web server on the Siemens Scalance X Industrial Ethernet switch X414-3E before 3.7.1, X308-2M before 3.7.2, X-300EEC before 3.7.2, XR-300 before 3.7.2, and X-300 before 3.7.2 allows remote attackers to cause a denial of service (device reboot) or possibly execute arbitrary code via a malformed URL.\"}, {\"lang\": \"es\", \"value\": \"Desbordamiento de b\\u00fafer en el servidor web integrado en el conmutador ethernet industrial Siemens Scalance X X414-3E antes de v3.7.1, X308-2M antes de v3.7.2, X-300EEC antes de v3.7.2, XR-300 antes de v3.7.2, y X-300 antes de v3.7.2 permite a atacantes remotos causar una denegaci\\u00f3n de servicio (reinicio del dispositivo) o posiblemente ejecutar c\\u00f3digo arbitrario a trav\\u00e9s de una direcci\\u00f3n URL incorrecta.\"}]",
"id": "CVE-2012-1802",
"lastModified": "2024-11-21T01:37:48.693",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2012-04-18T10:33:35.450",
"references": "[{\"url\": \"http://osvdb.org/81032\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-130874.pdf\", \"source\": \"cret@cert.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-04.pdf\", \"source\": \"cret@cert.org\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://osvdb.org/81032\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-130874.pdf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-04.pdf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}]",
"sourceIdentifier": "cret@cert.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2012-1802\",\"sourceIdentifier\":\"cret@cert.org\",\"published\":\"2012-04-18T10:33:35.450\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer overflow in the embedded web server on the Siemens Scalance X Industrial Ethernet switch X414-3E before 3.7.1, X308-2M before 3.7.2, X-300EEC before 3.7.2, XR-300 before 3.7.2, and X-300 before 3.7.2 allows remote attackers to cause a denial of service (device reboot) or possibly execute arbitrary code via a malformed URL.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de b\u00fafer en el servidor web integrado en el conmutador ethernet industrial Siemens Scalance X X414-3E antes de v3.7.1, X308-2M antes de v3.7.2, X-300EEC antes de v3.7.2, XR-300 antes de v3.7.2, y X-300 antes de v3.7.2 permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio del dispositivo) o posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de una direcci\u00f3n URL incorrecta.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:scalance_x414-3e_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.7.0\",\"matchCriteriaId\":\"FB47C02A-0FD8-47A2-93F8-310A5E05E19F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:scalance_x414-3e_firmware:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6212D6C3-A68D-41BA-929A-943A157B3BA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:scalance_x414-3e_firmware:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56338A9A-C59D-47D3-9AB4-18C53A75EDD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:scalance_x414-3e_firmware:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"801D7741-8EBB-4A68-A77C-E26C304EB988\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:scalance_x414-3e_firmware:2.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF4AB664-29DD-46F0-B136-8BD458430BD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:scalance_x414-3e_firmware:2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB8720F3-21D3-40C1-98A8-90E2EF6BBA52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:scalance_x414-3e_firmware:3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFF99DC1-34B7-4AAA-BC33-5763B56EEA1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:scalance_x414-3e_firmware:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"629D65C2-0D61-48BD-9C73-7794AC061756\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:scalance_x414-3e_firmware:3.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDD5708A-0105-4129-B5A6-DAF0247ABE1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:scalance_x414-3e_firmware:3.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B349A4F6-1FB0-433B-B512-883E580CFB27\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:siemens:scalance_x414-3e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6645288F-F688-442A-8C56-17536BFAD4BE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:scalance_x308-2m_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.7.0\",\"matchCriteriaId\":\"EC42F509-F58D-4A65-9C31-26F0C7319076\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:scalance_x308-2m_firmware:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4020E0F4-E92A-442D-A703-CA8840B8D944\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:scalance_x308-2m_firmware:3.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58E635A6-1AFF-4A34-87F3-F68571032448\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:scalance_x308-2m_firmware:3.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB1B5735-D3C0-445C-B7D5-A3099D1CE152\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:siemens:scalance_x308-2m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC54911E-C432-48FA-9551-9644422FFE14\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:scalance_x-300eec_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.7.0\",\"matchCriteriaId\":\"6F13D012-86FA-4A41-8D18-94942A270DAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:scalance_x-300eec_firmware:3.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB16E154-1E59-438F-9895-47260FDD7230\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:siemens:scalance_x-300eec:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2F32466-A411-4D69-864A-4434D3D5DB54\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:scalance_xr-300_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.7.0\",\"matchCriteriaId\":\"FF530C3C-A126-4F6A-8010-E93352800598\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:scalance_xr-300_firmware:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE3F5ED9-F357-430C-B277-B7EC0715A391\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:scalance_xr-300_firmware:3.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61FF9CF2-14CD-49BF-AC0B-0D2E0EDCF79F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:siemens:scalance_xr-300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"889CF2C0-EE6C-447F-85F1-005730EAD232\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:scalance_x-300_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.7.0\",\"matchCriteriaId\":\"F2000A16-E8A2-4E8E-A90F-4E0F62F3993C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:scalance_x-300_firmware:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF93BD72-2893-436D-A514-3C463C1AA428\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:scalance_x-300_firmware:2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59323828-6A3A-48CD-B98C-64CD65829471\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:scalance_x-300_firmware:3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8C53B2B-BFFC-47D1-B935-FF85F5A4D3F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:scalance_x-300_firmware:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"054C0618-5CA9-43E4-A557-0064B8BB5B63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:scalance_x-300_firmware:3.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D5DF242-8FD0-467C-84D1-5207CC15D2D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:scalance_x-300_firmware:3.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B16E873A-5D79-43B8-BB64-66B8079CFCC4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:siemens:scalance_x-300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2D0AB50-6F0B-4232-8C8E-1647410D362D\"}]}]}],\"references\":[{\"url\":\"http://osvdb.org/81032\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-130874.pdf\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-04.pdf\",\"source\":\"cret@cert.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://osvdb.org/81032\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-130874.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-04.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]}]}}"
}
}
VAR-201204-0127
Vulnerability from variot - Updated: 2023-12-18 13:30Buffer overflow in the embedded web server on the Siemens Scalance X Industrial Ethernet switch X414-3E before 3.7.1, X308-2M before 3.7.2, X-300EEC before 3.7.2, XR-300 before 3.7.2, and X-300 before 3.7.2 allows remote attackers to cause a denial of service (device reboot) or possibly execute arbitrary code via a malformed URL. Siemens Scalance X Switches is a switch device developed by Siemens. Siemens Scalance X Switches has security vulnerabilities that can be exploited by malicious users for denial of service attacks. When the embedded WEB server processes the HTTP request, there is an error, and the attacker sends a specially made request to the management WEB interface to restart the device. The following modules are affected by this vulnerability: * Scalance X414-3E Scalance X308-2M Scalance X-300EEC Scalance XR-300 Scalance X-300. Successfully exploiting this issue allows an attacker to reboot the affected device, denying service to legitimate users. The following versions are vulnerable: Scalance X414-3E running firmware versions prior to 3.7.1 Scalance X switches running firmware versions prior to 3.7.2. ----------------------------------------------------------------------
Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch
TITLE: Siemens Scalance X Switches HTTP Request Handling Denial of Service
SECUNIA ADVISORY ID: SA48730
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48730/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48730
RELEASE DATE: 2012-04-06
DISCUSS ADVISORY: http://secunia.com/advisories/48730/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/48730/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=48730
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A vulnerability has been reported in Siemens Scalance X Switches, which can be exploited by malicious people to cause a DoS (Denial of Service).
Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
PROVIDED AND/OR DISCOVERED BY: The vendor credits J\xfcrgen Bilberger, Daimler TSS GmbH.
ORIGINAL ADVISORY: Siemens SSA-130874: http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-130874.pdf
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201204-0127",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "scalance xr-300",
"scope": "eq",
"trust": 1.8,
"vendor": "siemens",
"version": "3.5.0"
},
{
"model": "scalance x-300",
"scope": "eq",
"trust": 1.8,
"vendor": "siemens",
"version": "3.5.1"
},
{
"model": "scalance x-300",
"scope": "eq",
"trust": 1.8,
"vendor": "siemens",
"version": "3.0.0"
},
{
"model": "scalance x-300",
"scope": "eq",
"trust": 1.8,
"vendor": "siemens",
"version": "2.3.1"
},
{
"model": "scalance x-300",
"scope": "eq",
"trust": 1.8,
"vendor": "siemens",
"version": "3.5.0"
},
{
"model": "scalance x-300",
"scope": "eq",
"trust": 1.8,
"vendor": "siemens",
"version": "2.2.0"
},
{
"model": "scalance x-300",
"scope": "eq",
"trust": 1.8,
"vendor": "siemens",
"version": "3.3.1"
},
{
"model": "scalance x414-3e",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": "2.3.2"
},
{
"model": "scalance x414-3e",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": "3.4.0"
},
{
"model": "scalance x414-3e",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": null
},
{
"model": "scalance x308-2m",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": "3.5.2"
},
{
"model": "scalance x-300eec",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": null
},
{
"model": "scalance x-300eec",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": "3.5.0"
},
{
"model": "scalance x308-2m",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": "3.5.0"
},
{
"model": "scalance x414-3e",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": "3.0.0"
},
{
"model": "scalance x414-3e",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": "1.2.2"
},
{
"model": "scalance xr-300",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": "3.1.1"
},
{
"model": "scalance x308-2m",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": null
},
{
"model": "scalance x414-3e",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": "2.1.1"
},
{
"model": "scalance x414-3e",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": "3.3.0"
},
{
"model": "scalance xr-300",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": null
},
{
"model": "scalance x-300",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": null
},
{
"model": "scalance x414-3e",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": "2.2.0"
},
{
"model": "scalance x414-3e",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": "3.0.2"
},
{
"model": "scalance x308-2m",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": "3.1.1"
},
{
"model": "scalance x414-3e",
"scope": "eq",
"trust": 1.2,
"vendor": "siemens",
"version": "2.3.3"
},
{
"model": "scalance x414-3e",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "3.7.1"
},
{
"model": "scalance x-300",
"scope": "lte",
"trust": 1.0,
"vendor": "siemens",
"version": "3.7.0"
},
{
"model": "scalance x-300eec",
"scope": "lte",
"trust": 1.0,
"vendor": "siemens",
"version": "3.7.0"
},
{
"model": "scalance x308-2m",
"scope": "lte",
"trust": 1.0,
"vendor": "siemens",
"version": "3.7.0"
},
{
"model": "scalance xr-300",
"scope": "lte",
"trust": 1.0,
"vendor": "siemens",
"version": "3.7.0"
},
{
"model": "scalance x414-3e",
"scope": "lte",
"trust": 1.0,
"vendor": "siemens",
"version": "3.7.0"
},
{
"model": "scalance xr-300",
"scope": "eq",
"trust": 0.8,
"vendor": "siemens",
"version": "3.7.0"
},
{
"model": "scalance x-300",
"scope": "eq",
"trust": 0.8,
"vendor": "siemens",
"version": "3.7.0"
},
{
"model": "scalance x-300eec",
"scope": "eq",
"trust": 0.8,
"vendor": "siemens",
"version": "3.7.0"
},
{
"model": "scalance x-300",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "scalance x-300",
"scope": "lt",
"trust": 0.8,
"vendor": "siemens",
"version": "3.7.2"
},
{
"model": "scalance x-300eec",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "scalance x-300eec",
"scope": "lt",
"trust": 0.8,
"vendor": "siemens",
"version": "3.7.2"
},
{
"model": "scalance x308-2m",
"scope": "lt",
"trust": 0.8,
"vendor": "siemens",
"version": "3.7.2"
},
{
"model": "scalance x308-2m industrial ethernet",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "scalance x414-3e industrial ethernet",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "scalance xr-300",
"scope": null,
"trust": 0.8,
"vendor": "siemens",
"version": null
},
{
"model": "scalance xr-300",
"scope": "lt",
"trust": 0.8,
"vendor": "siemens",
"version": "3.7.2"
},
{
"model": "scalance series switches",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "x-300"
},
{
"model": "scalance series switches",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "x-400"
},
{
"model": "scalance xr-300",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "0"
},
{
"model": "scalance x414-3e",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "0"
},
{
"model": "scalance x308-2m",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "0"
},
{
"model": "scalance x-300eec",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "0"
},
{
"model": "scalance",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "x-3000"
},
{
"model": "scalance series switches null",
"scope": "eq",
"trust": 0.2,
"vendor": "siemens",
"version": "x-300*"
},
{
"model": "scalance series switches null",
"scope": "eq",
"trust": 0.2,
"vendor": "siemens",
"version": "x-400*"
},
{
"model": "scalance x414-3e",
"scope": "eq",
"trust": 0.2,
"vendor": "siemens",
"version": "3.7.0"
},
{
"model": "scalance x308-2m",
"scope": "eq",
"trust": 0.2,
"vendor": "siemens",
"version": "3.7.0"
},
{
"model": "scalance x308-2m",
"scope": "lt",
"trust": 0.2,
"vendor": "siemens",
"version": "3.7.1"
},
{
"model": "scalance x-300eec",
"scope": "lt",
"trust": 0.2,
"vendor": "siemens",
"version": "3.7.1"
},
{
"model": "scalance xr-300",
"scope": "lt",
"trust": 0.2,
"vendor": "siemens",
"version": "3.7.0"
},
{
"model": "scalance",
"scope": "eq",
"trust": 0.2,
"vendor": "siemens",
"version": "x-300\u003c3.7.1"
}
],
"sources": [
{
"db": "IVD",
"id": "a6db81e2-1f6c-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "f0d1cbe0-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2012-1799"
},
{
"db": "BID",
"id": "52933"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002098"
},
{
"db": "NVD",
"id": "CVE-2012-1802"
},
{
"db": "CNNVD",
"id": "CNNVD-201204-112"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:2.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:2.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:3.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:3.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.7.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:3.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:2.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:3.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:2.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_x414-3e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x308-2m_firmware:3.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x308-2m_firmware:3.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x308-2m_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.7.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x308-2m_firmware:3.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_x308-2m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x-300eec_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.7.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x-300eec_firmware:3.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_x-300eec:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_xr-300_firmware:3.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_xr-300_firmware:3.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_xr-300_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_xr-300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x-300_firmware:2.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x-300_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.7.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x-300_firmware:3.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x-300_firmware:3.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x-300_firmware:3.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x-300_firmware:3.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x-300_firmware:2.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_x-300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2012-1802"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "J??rgen Bilberger, Daimler TSS GmbH",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201204-112"
}
],
"trust": 0.6
},
"cve": "CVE-2012-1802",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 7.8,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2012-1802",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": null,
"accessVector": null,
"authentication": null,
"author": "IVD",
"availabilityImpact": null,
"baseScore": null,
"confidentialityImpact": null,
"exploitabilityScore": null,
"id": "a6db81e2-1f6c-11e6-abef-000c29c66e3d",
"impactScore": null,
"integrityImpact": null,
"severity": null,
"trust": 0.2,
"vectorString": null,
"version": "unknown"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "f0d1cbe0-2353-11e6-abef-000c29c66e3d",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-55083",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2012-1802",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201204-112",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "a6db81e2-1f6c-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "IVD",
"id": "f0d1cbe0-2353-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-55083",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "a6db81e2-1f6c-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "f0d1cbe0-2353-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-55083"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002098"
},
{
"db": "NVD",
"id": "CVE-2012-1802"
},
{
"db": "CNNVD",
"id": "CNNVD-201204-112"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer overflow in the embedded web server on the Siemens Scalance X Industrial Ethernet switch X414-3E before 3.7.1, X308-2M before 3.7.2, X-300EEC before 3.7.2, XR-300 before 3.7.2, and X-300 before 3.7.2 allows remote attackers to cause a denial of service (device reboot) or possibly execute arbitrary code via a malformed URL. Siemens Scalance X Switches is a switch device developed by Siemens. Siemens Scalance X Switches has security vulnerabilities that can be exploited by malicious users for denial of service attacks. When the embedded WEB server processes the HTTP request, there is an error, and the attacker sends a specially made request to the management WEB interface to restart the device. The following modules are affected by this vulnerability: * Scalance X414-3E* Scalance X308-2M* Scalance X-300EEC* Scalance XR-300* Scalance X-300. \nSuccessfully exploiting this issue allows an attacker to reboot the affected device, denying service to legitimate users. \nThe following versions are vulnerable:\nScalance X414-3E running firmware versions prior to 3.7.1\nScalance X switches running firmware versions prior to 3.7.2. ----------------------------------------------------------------------\n\nBecome a PSI 3.0 beta tester!\nTest-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. \nDownload it here!\nhttp://secunia.com/psi_30_beta_launch\n\n----------------------------------------------------------------------\n\nTITLE:\nSiemens Scalance X Switches HTTP Request Handling Denial of Service\n\nSECUNIA ADVISORY ID:\nSA48730\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/48730/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48730\n\nRELEASE DATE:\n2012-04-06\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/48730/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/48730/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48730\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in Siemens Scalance X Switches,\nwhich can be exploited by malicious people to cause a DoS (Denial of\nService). \n\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits J\\xfcrgen Bilberger, Daimler TSS GmbH. \n\nORIGINAL ADVISORY:\nSiemens SSA-130874:\nhttp://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-130874.pdf\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2012-1802"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002098"
},
{
"db": "CNVD",
"id": "CNVD-2012-1799"
},
{
"db": "BID",
"id": "52933"
},
{
"db": "IVD",
"id": "a6db81e2-1f6c-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "f0d1cbe0-2353-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-55083"
},
{
"db": "PACKETSTORM",
"id": "111661"
}
],
"trust": 2.97
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2012-1802",
"trust": 3.0
},
{
"db": "ICS CERT",
"id": "ICSA-12-102-04",
"trust": 2.8
},
{
"db": "SIEMENS",
"id": "SSA-130874",
"trust": 2.1
},
{
"db": "OSVDB",
"id": "81032",
"trust": 1.1
},
{
"db": "BID",
"id": "52933",
"trust": 1.0
},
{
"db": "CNNVD",
"id": "CNNVD-201204-112",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2012-1799",
"trust": 0.8
},
{
"db": "SECUNIA",
"id": "48730",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002098",
"trust": 0.8
},
{
"db": "IVD",
"id": "A6DB81E2-1F6C-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "IVD",
"id": "F0D1CBE0-2353-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-55083",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "111661",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "a6db81e2-1f6c-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "f0d1cbe0-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2012-1799"
},
{
"db": "VULHUB",
"id": "VHN-55083"
},
{
"db": "BID",
"id": "52933"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002098"
},
{
"db": "PACKETSTORM",
"id": "111661"
},
{
"db": "NVD",
"id": "CVE-2012-1802"
},
{
"db": "CNNVD",
"id": "CNNVD-201204-112"
}
]
},
"id": "VAR-201204-0127",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "a6db81e2-1f6c-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "f0d1cbe0-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2012-1799"
},
{
"db": "VULHUB",
"id": "VHN-55083"
}
],
"trust": 1.8393097666666667
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.4
}
],
"sources": [
{
"db": "IVD",
"id": "a6db81e2-1f6c-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "f0d1cbe0-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2012-1799"
}
]
},
"last_update_date": "2023-12-18T13:30:01.301000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "SSA-130874",
"trust": 0.8,
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-130874.pdf"
},
{
"title": "\u30b7\u30fc\u30e1\u30f3\u30b9\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u30d1\u30fc\u30c8\u30ca\u30fc",
"trust": 0.8,
"url": "http://www.automation.siemens.com/automation/jp/ja/solutionpartner/pages/default.aspx"
},
{
"title": "\u30b7\u30fc\u30e1\u30f3\u30b9\u30fb\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e",
"trust": 0.8,
"url": "http://www.siemens.com/entry/jp/ja/"
},
{
"title": "Siemens Scalance X Switches HTTP Request Handling Denial of Service Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/15472"
},
{
"title": "wV372002_fuer_XR324_und_FPGA",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=42985"
},
{
"title": "wV372002_fuer_XR308-2M_und_FPGA",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=42984"
},
{
"title": "cV371013",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=42983"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2012-1799"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002098"
},
{
"db": "CNNVD",
"id": "CNNVD-201204-112"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-55083"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002098"
},
{
"db": "NVD",
"id": "CVE-2012-1802"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.8,
"url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-102-04.pdf"
},
{
"trust": 2.1,
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-130874.pdf"
},
{
"trust": 1.1,
"url": "http://osvdb.org/81032"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1802"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1802"
},
{
"trust": 0.7,
"url": "http://secunia.com/advisories/48730/"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/52933"
},
{
"trust": 0.3,
"url": "http://www.automation.siemens.com/mcms/industrial-communication/en/ie/ie_switches_media-converters/pages/ie_switches_media-converters.aspx"
},
{
"trust": 0.1,
"url": "http://secunia.com/psi_30_beta_launch"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_intelligence/"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/personal/"
},
{
"trust": 0.1,
"url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48730"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/48730/#comments"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2012-1799"
},
{
"db": "VULHUB",
"id": "VHN-55083"
},
{
"db": "BID",
"id": "52933"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002098"
},
{
"db": "PACKETSTORM",
"id": "111661"
},
{
"db": "NVD",
"id": "CVE-2012-1802"
},
{
"db": "CNNVD",
"id": "CNNVD-201204-112"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "a6db81e2-1f6c-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "f0d1cbe0-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2012-1799"
},
{
"db": "VULHUB",
"id": "VHN-55083"
},
{
"db": "BID",
"id": "52933"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002098"
},
{
"db": "PACKETSTORM",
"id": "111661"
},
{
"db": "NVD",
"id": "CVE-2012-1802"
},
{
"db": "CNNVD",
"id": "CNNVD-201204-112"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2012-04-10T00:00:00",
"db": "IVD",
"id": "a6db81e2-1f6c-11e6-abef-000c29c66e3d"
},
{
"date": "2012-04-11T00:00:00",
"db": "IVD",
"id": "f0d1cbe0-2353-11e6-abef-000c29c66e3d"
},
{
"date": "2012-04-10T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-1799"
},
{
"date": "2012-04-18T00:00:00",
"db": "VULHUB",
"id": "VHN-55083"
},
{
"date": "2012-04-09T00:00:00",
"db": "BID",
"id": "52933"
},
{
"date": "2012-04-19T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-002098"
},
{
"date": "2012-04-09T05:27:09",
"db": "PACKETSTORM",
"id": "111661"
},
{
"date": "2012-04-18T10:33:35.450000",
"db": "NVD",
"id": "CVE-2012-1802"
},
{
"date": "2012-04-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201204-112"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2012-04-10T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-1799"
},
{
"date": "2012-11-20T00:00:00",
"db": "VULHUB",
"id": "VHN-55083"
},
{
"date": "2015-03-19T09:22:00",
"db": "BID",
"id": "52933"
},
{
"date": "2012-04-19T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-002098"
},
{
"date": "2012-11-20T04:44:08.140000",
"db": "NVD",
"id": "CVE-2012-1802"
},
{
"date": "2012-04-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201204-112"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201204-112"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens Scalance X Industrial Ethernet Buffer overflow vulnerability in switch",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2012-002098"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer overflow",
"sources": [
{
"db": "IVD",
"id": "f0d1cbe0-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNNVD",
"id": "CNNVD-201204-112"
}
],
"trust": 0.8
}
}
GSD-2012-1802
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2012-1802",
"description": "Buffer overflow in the embedded web server on the Siemens Scalance X Industrial Ethernet switch X414-3E before 3.7.1, X308-2M before 3.7.2, X-300EEC before 3.7.2, XR-300 before 3.7.2, and X-300 before 3.7.2 allows remote attackers to cause a denial of service (device reboot) or possibly execute arbitrary code via a malformed URL.",
"id": "GSD-2012-1802"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2012-1802"
],
"details": "Buffer overflow in the embedded web server on the Siemens Scalance X Industrial Ethernet switch X414-3E before 3.7.1, X308-2M before 3.7.2, X-300EEC before 3.7.2, XR-300 before 3.7.2, and X-300 before 3.7.2 allows remote attackers to cause a denial of service (device reboot) or possibly execute arbitrary code via a malformed URL.",
"id": "GSD-2012-1802",
"modified": "2023-12-13T01:20:18.100408Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2012-1802",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the embedded web server on the Siemens Scalance X Industrial Ethernet switch X414-3E before 3.7.1, X308-2M before 3.7.2, X-300EEC before 3.7.2, XR-300 before 3.7.2, and X-300 before 3.7.2 allows remote attackers to cause a denial of service (device reboot) or possibly execute arbitrary code via a malformed URL."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "81032",
"refsource": "OSVDB",
"url": "http://osvdb.org/81032"
},
{
"name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-04.pdf",
"refsource": "MISC",
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-04.pdf"
},
{
"name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-130874.pdf",
"refsource": "CONFIRM",
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-130874.pdf"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:2.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:2.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:3.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:3.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.7.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:3.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:2.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:3.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:2.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_x414-3e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x308-2m_firmware:3.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x308-2m_firmware:3.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x308-2m_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.7.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x308-2m_firmware:3.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_x308-2m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x-300eec_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.7.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x-300eec_firmware:3.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_x-300eec:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_xr-300_firmware:3.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_xr-300_firmware:3.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_xr-300_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.7.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_xr-300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x-300_firmware:2.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x-300_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.7.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x-300_firmware:3.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x-300_firmware:3.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x-300_firmware:3.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x-300_firmware:3.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:scalance_x-300_firmware:2.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_x-300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2012-1802"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Buffer overflow in the embedded web server on the Siemens Scalance X Industrial Ethernet switch X414-3E before 3.7.1, X308-2M before 3.7.2, X-300EEC before 3.7.2, XR-300 before 3.7.2, and X-300 before 3.7.2 allows remote attackers to cause a denial of service (device reboot) or possibly execute arbitrary code via a malformed URL."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-130874.pdf",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-130874.pdf"
},
{
"name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-04.pdf",
"refsource": "MISC",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-04.pdf"
},
{
"name": "81032",
"refsource": "OSVDB",
"tags": [],
"url": "http://osvdb.org/81032"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2012-11-20T04:44Z",
"publishedDate": "2012-04-18T10:33Z"
}
}
}
ICSA-12-102-04
Vulnerability from csaf_cisa - Published: 2012-01-13 07:00 - Updated: 2025-06-06 21:45Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks: Do not click web links or open attachments in unsolicited email messages. Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams. Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-12-102-04 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2012/icsa-12-102-04.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-12-102-04 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-12-102-04"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014"
}
],
"title": "Siemens Scalance X Buffer Overflow Vulnerability",
"tracking": {
"current_release_date": "2025-06-06T21:45:07.306451Z",
"generator": {
"date": "2025-06-06T21:45:07.306386Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-12-102-04",
"initial_release_date": "2012-01-13T07:00:00.000000Z",
"revision_history": [
{
"date": "2012-01-13T07:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "Initial Publication"
},
{
"date": "2025-06-06T21:45:07.306451Z",
"legacy_version": "CSAF Conversion",
"number": "2",
"summary": "Advisory converted into a CSAF"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Siemens Scalance X414-3E: vers:all/*",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "Scalance X414-3E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Siemens Scalance X308-2M: vers:all/*",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "Scalance X308-2M"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Siemens Scalance X-300EEC: vers:all/*",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "Scalance X-300EEC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Siemens Scalance XR-300: vers:all/*",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "Scalance XR-300"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Siemens Scalance X-300: vers:all/*",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "Scalance X-300"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-1802",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "Buffer overflow in the embedded web server on the Siemens Scalance X Industrial Ethernet switch X414-3E before 3.7.1, X308-2M before 3.7.2, X-300EEC before 3.7.2, XR-300 before 3.7.2, and X-300 before 3.7.2 allows remote attackers to cause a denial of service (device reboot) or possibly execute arbitrary code via a malformed URL.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Siemens has produced firmware updates that resolve this vulnerability for the listed hardware platforms. Siemens strongly recommends installing the updates as soon as possible. Download the appropriate update from the following links: Firmware Update Location (Scalance X414-3E) Firmware Update Location (Scalance X308-2M, X-300EEC, XR-300, X-300) an overview over the Operational Guidelines for Industrial Security with the cell protection concept (http://www.industry.siemens.com/topics/global/en/industrial-security/Documents/operational_guidelines_industrial_security_en.pdf)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "http://www.industry.siemens.com/topics/global/en/industrial-security/Documents/operational_guidelines_industrial_security_en.pdf"
},
{
"category": "mitigation",
"details": "Information about industrial security by Siemens (http://www.siemens.com/industrialsecurity)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "http://www.siemens.com/industrialsecurity"
},
{
"category": "mitigation",
"details": "Recommended security practices by US-CERT For further inquiries on vulnerabilities in Siemens products and solutions, please contact the Siemens Product CERT.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "The Siemens Security Advisory is available at (https://cert-portal.siemens.com/productcert/pdf/ssa-130874.pdf).",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-130874.pdf"
}
],
"scores": [
{
"cvss_v2": {
"baseScore": 7.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
]
}
]
}
SSA-130874
Vulnerability from csaf_siemens - Published: 2012-04-05 00:00 - Updated: 2026-02-10 00:00Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "The embedded web server on affected devices contains a buffer overflow vulnerability. This could allow remote attackers to cause a denial of service (device reboot) or possibly execute arbitrary code via a malformed URL.\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-130874: Buffer Overflow Vulnerability in SCALANCE X Switches - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-130874.html"
},
{
"category": "self",
"summary": "SSA-130874: Buffer Overflow Vulnerability in SCALANCE X Switches - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-130874.json"
}
],
"title": "SSA-130874: Buffer Overflow Vulnerability in SCALANCE X Switches",
"tracking": {
"current_release_date": "2026-02-10T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-130874",
"initial_release_date": "2012-04-05T00:00:00Z",
"revision_history": [
{
"date": "2012-04-05T00:00:00Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Publication Date"
},
{
"date": "2020-02-10T00:00:00Z",
"legacy_version": "1.3",
"number": "4",
"summary": "SIPLUS devices now explicitly mentioned in the list of affected products"
},
{
"date": "2026-02-10T00:00:00Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Used CVE ID (CVE-2012-1802) instead of the deprecated SVE ID (SVE-2012-0002); Corrected CVSS vector and added mitigation information; Updated SSA to current data model and support of csaf"
}
],
"status": "interim",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3)",
"product_id": "1",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-3GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3)",
"product_id": "2",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-3EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3)",
"product_id": "3",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-1GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3)",
"product_id": "4",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-1EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3)",
"product_id": "5",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-4GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3)",
"product_id": "6",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-4EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3)",
"product_id": "7",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-2GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3)",
"product_id": "8",
"product_identification_helper": {
"model_numbers": [
"6GK5302-7GD00-2EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X304-2FE (6GK5304-2BD00-2AA3)",
"product_id": "9",
"product_identification_helper": {
"model_numbers": [
"6GK5304-2BD00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X304-2FE (6GK5304-2BD00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3)",
"product_id": "10",
"product_identification_helper": {
"model_numbers": [
"6GK5306-1BF00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3)",
"product_id": "11",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-3GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3)",
"product_id": "12",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-3EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3)",
"product_id": "13",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-1GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3)",
"product_id": "14",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-1EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3)",
"product_id": "15",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-4GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3)",
"product_id": "16",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-4EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3)",
"product_id": "17",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-2GA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3)",
"product_id": "18",
"product_identification_helper": {
"model_numbers": [
"6GK5307-2FD00-2EA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X307-3 (6GK5307-3BL00-2AA3)",
"product_id": "19",
"product_identification_helper": {
"model_numbers": [
"6GK5307-3BL00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-3 (6GK5307-3BL00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X307-3 (6GK5307-3BL10-2AA3)",
"product_id": "20",
"product_identification_helper": {
"model_numbers": [
"6GK5307-3BL10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-3 (6GK5307-3BL10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X307-3LD (6GK5307-3BM00-2AA3)",
"product_id": "21",
"product_identification_helper": {
"model_numbers": [
"6GK5307-3BM00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-3LD (6GK5307-3BM00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X307-3LD (6GK5307-3BM10-2AA3)",
"product_id": "22",
"product_identification_helper": {
"model_numbers": [
"6GK5307-3BM10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X307-3LD (6GK5307-3BM10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X308-2 (6GK5308-2FL00-2AA3)",
"product_id": "23",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FL00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2 (6GK5308-2FL00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X308-2 RD (inkl. SIPLUS variants)",
"product_id": "24"
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2 RD (inkl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X308-2LD (6GK5308-2FM00-2AA3)",
"product_id": "25",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FM00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LD (6GK5308-2FM00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X308-2LD (6GK5308-2FM10-2AA3)",
"product_id": "26",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FM10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LD (6GK5308-2FM10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X308-2LH (6GK5308-2FN00-2AA3)",
"product_id": "27",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FN00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LH (6GK5308-2FN00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X308-2LH (6GK5308-2FN10-2AA3)",
"product_id": "28",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FN10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LH (6GK5308-2FN10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3)",
"product_id": "29",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FP00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3)",
"product_id": "30",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2FP10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X308-2M (6GK5308-2GG00-2AA2)",
"product_id": "31",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2GG00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M (6GK5308-2GG00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X308-2M (6GK5308-2GG10-2AA2)",
"product_id": "32",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2GG10-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M (6GK5308-2GG10-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2)",
"product_id": "33",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2QG00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2)",
"product_id": "34",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2QG10-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X308-2M TS (6GK5308-2GG00-2CA2)",
"product_id": "35",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2GG00-2CA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M TS (6GK5308-2GG00-2CA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X308-2M TS (6GK5308-2GG10-2CA2)",
"product_id": "36",
"product_identification_helper": {
"model_numbers": [
"6GK5308-2GG10-2CA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X308-2M TS (6GK5308-2GG10-2CA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X310 (6GK5310-0FA00-2AA3)",
"product_id": "37",
"product_identification_helper": {
"model_numbers": [
"6GK5310-0FA00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X310 (6GK5310-0FA00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X310 (6GK5310-0FA10-2AA3)",
"product_id": "38",
"product_identification_helper": {
"model_numbers": [
"6GK5310-0FA10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X310 (6GK5310-0FA10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X310FE (6GK5310-0BA00-2AA3)",
"product_id": "39",
"product_identification_helper": {
"model_numbers": [
"6GK5310-0BA00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X310FE (6GK5310-0BA00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X310FE (6GK5310-0BA10-2AA3)",
"product_id": "40",
"product_identification_helper": {
"model_numbers": [
"6GK5310-0BA10-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X310FE (6GK5310-0BA10-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X320-1 FE (6GK5320-1BD00-2AA3)",
"product_id": "41",
"product_identification_helper": {
"model_numbers": [
"6GK5320-1BD00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X320-1 FE (6GK5320-1BD00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3)",
"product_id": "42",
"product_identification_helper": {
"model_numbers": [
"6GK5320-3BF00-2AA3"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE X408-2 (6GK5408-2FD00-2AA2)",
"product_id": "43",
"product_identification_helper": {
"model_numbers": [
"6GK5408-2FD00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X408-2 (6GK5408-2FD00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.1",
"product": {
"name": "SCALANCE X414-3E (6GK5414-3FC00-2AA2)",
"product_id": "44",
"product_identification_helper": {
"model_numbers": [
"6GK5414-3FC00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE X414-3E (6GK5414-3FC00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2)",
"product_id": "45",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG00-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2)",
"product_id": "46",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG10-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2)",
"product_id": "47",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG00-3HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2)",
"product_id": "48",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG10-3HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2)",
"product_id": "49",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG00-1AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2)",
"product_id": "50",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG10-1AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2)",
"product_id": "51",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG00-1HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2)",
"product_id": "52",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG10-1HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2)",
"product_id": "53",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG00-1CR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2)",
"product_id": "54",
"product_identification_helper": {
"model_numbers": [
"6GK5324-0GG10-1CR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2)",
"product_id": "55",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-3ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2)",
"product_id": "56",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-3ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2)",
"product_id": "57",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-3JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2)",
"product_id": "58",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-3JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2)",
"product_id": "59",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-1ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2)",
"product_id": "60",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-1ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2)",
"product_id": "61",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-1JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2)",
"product_id": "62",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-1JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2)",
"product_id": "63",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-4ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2)",
"product_id": "64",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-4ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2)",
"product_id": "65",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-4JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2)",
"product_id": "66",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-4JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2)",
"product_id": "67",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-2ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2)",
"product_id": "68",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-2ER2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2)",
"product_id": "69",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG00-2JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2)",
"product_id": "70",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4GG10-2JR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2)",
"product_id": "71",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG00-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG10-3AR2)",
"product_id": "72",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG10-3AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG10-3AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2)",
"product_id": "73",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG00-3HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG10-3HR2)",
"product_id": "74",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG10-3HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG10-3HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2)",
"product_id": "75",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG00-1AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG10-1AR2)",
"product_id": "76",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG10-1AR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG10-1AR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2)",
"product_id": "77",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG00-1HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG10-1HR2)",
"product_id": "78",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG10-1HR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG10-1HR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2)",
"product_id": "79",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG00-1CR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.7.2",
"product": {
"name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG10-1CR2)",
"product_id": "80",
"product_identification_helper": {
"model_numbers": [
"6GK5324-4QG10-1CR2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG10-1CR2)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-1802",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The embedded web server on affected devices contains a buffer overflow vulnerability. This could allow remote attackers to cause a denial of service (device reboot) or possibly execute arbitrary code via a malformed URL.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"39",
"40",
"41",
"42",
"43",
"44",
"45",
"46",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59",
"60",
"61",
"62",
"63",
"64",
"65",
"66",
"67",
"68",
"69",
"70",
"71",
"72",
"73",
"74",
"75",
"76",
"77",
"78",
"79",
"80"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict access to the administrative web interface",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"39",
"40",
"41",
"42",
"43",
"44",
"45",
"46",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59",
"60",
"61",
"62",
"63",
"64",
"65",
"66",
"67",
"68",
"69",
"70",
"71",
"72",
"73",
"74",
"75",
"76",
"77",
"78",
"79",
"80"
]
},
{
"category": "vendor_fix",
"details": "Update to V3.7.1 or later version",
"product_ids": [
"44"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109747276/"
},
{
"category": "vendor_fix",
"details": "Update to V3.7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"39",
"40",
"41",
"42",
"43",
"45",
"46",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59",
"60",
"61",
"62",
"63",
"64",
"65",
"66",
"67",
"68",
"69",
"70",
"71",
"72",
"73",
"74",
"75",
"76",
"77",
"78",
"79",
"80"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/59868786/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"39",
"40",
"41",
"42",
"43",
"44",
"45",
"46",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59",
"60",
"61",
"62",
"63",
"64",
"65",
"66",
"67",
"68",
"69",
"70",
"71",
"72",
"73",
"74",
"75",
"76",
"77",
"78",
"79",
"80"
]
}
],
"title": "CVE-2012-1802"
}
]
}
FKIE_CVE-2012-1802
Vulnerability from fkie_nvd - Published: 2012-04-18 10:33 - Updated: 2025-04-11 00:51{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB47C02A-0FD8-47A2-93F8-310A5E05E19F",
"versionEndIncluding": "3.7.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6212D6C3-A68D-41BA-929A-943A157B3BA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "56338A9A-C59D-47D3-9AB4-18C53A75EDD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "801D7741-8EBB-4A68-A77C-E26C304EB988",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EF4AB664-29DD-46F0-B136-8BD458430BD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DB8720F3-21D3-40C1-98A8-90E2EF6BBA52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FFF99DC1-34B7-4AAA-BC33-5763B56EEA1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "629D65C2-0D61-48BD-9C73-7794AC061756",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:3.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DDD5708A-0105-4129-B5A6-DAF0247ABE1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:scalance_x414-3e_firmware:3.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B349A4F6-1FB0-433B-B512-883E580CFB27",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:scalance_x414-3e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6645288F-F688-442A-8C56-17536BFAD4BE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:siemens:scalance_x308-2m_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EC42F509-F58D-4A65-9C31-26F0C7319076",
"versionEndIncluding": "3.7.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:scalance_x308-2m_firmware:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4020E0F4-E92A-442D-A703-CA8840B8D944",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:scalance_x308-2m_firmware:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "58E635A6-1AFF-4A34-87F3-F68571032448",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:scalance_x308-2m_firmware:3.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BB1B5735-D3C0-445C-B7D5-A3099D1CE152",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:scalance_x308-2m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC54911E-C432-48FA-9551-9644422FFE14",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:siemens:scalance_x-300eec_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6F13D012-86FA-4A41-8D18-94942A270DAA",
"versionEndIncluding": "3.7.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:scalance_x-300eec_firmware:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BB16E154-1E59-438F-9895-47260FDD7230",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:scalance_x-300eec:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2F32466-A411-4D69-864A-4434D3D5DB54",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:siemens:scalance_xr-300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FF530C3C-A126-4F6A-8010-E93352800598",
"versionEndIncluding": "3.7.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:scalance_xr-300_firmware:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AE3F5ED9-F357-430C-B277-B7EC0715A391",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:scalance_xr-300_firmware:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "61FF9CF2-14CD-49BF-AC0B-0D2E0EDCF79F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:scalance_xr-300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "889CF2C0-EE6C-447F-85F1-005730EAD232",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:siemens:scalance_x-300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2000A16-E8A2-4E8E-A90F-4E0F62F3993C",
"versionEndIncluding": "3.7.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:scalance_x-300_firmware:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AF93BD72-2893-436D-A514-3C463C1AA428",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:scalance_x-300_firmware:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "59323828-6A3A-48CD-B98C-64CD65829471",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:scalance_x-300_firmware:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C8C53B2B-BFFC-47D1-B935-FF85F5A4D3F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:scalance_x-300_firmware:3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "054C0618-5CA9-43E4-A557-0064B8BB5B63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:scalance_x-300_firmware:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6D5DF242-8FD0-467C-84D1-5207CC15D2D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:scalance_x-300_firmware:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B16E873A-5D79-43B8-BB64-66B8079CFCC4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:scalance_x-300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2D0AB50-6F0B-4232-8C8E-1647410D362D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the embedded web server on the Siemens Scalance X Industrial Ethernet switch X414-3E before 3.7.1, X308-2M before 3.7.2, X-300EEC before 3.7.2, XR-300 before 3.7.2, and X-300 before 3.7.2 allows remote attackers to cause a denial of service (device reboot) or possibly execute arbitrary code via a malformed URL."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer en el servidor web integrado en el conmutador ethernet industrial Siemens Scalance X X414-3E antes de v3.7.1, X308-2M antes de v3.7.2, X-300EEC antes de v3.7.2, XR-300 antes de v3.7.2, y X-300 antes de v3.7.2 permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio del dispositivo) o posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de una direcci\u00f3n URL incorrecta."
}
],
"id": "CVE-2012-1802",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-04-18T10:33:35.450",
"references": [
{
"source": "cret@cert.org",
"url": "http://osvdb.org/81032"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-130874.pdf"
},
{
"source": "cret@cert.org",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-04.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/81032"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-130874.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-04.pdf"
}
],
"sourceIdentifier": "cret@cert.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-45R8-2CQP-RWRJ
Vulnerability from github – Published: 2022-05-17 05:18 – Updated: 2022-05-17 05:18Buffer overflow in the embedded web server on the Siemens Scalance X Industrial Ethernet switch X414-3E before 3.7.1, X308-2M before 3.7.2, X-300EEC before 3.7.2, XR-300 before 3.7.2, and X-300 before 3.7.2 allows remote attackers to cause a denial of service (device reboot) or possibly execute arbitrary code via a malformed URL.
{
"affected": [],
"aliases": [
"CVE-2012-1802"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2012-04-18T10:33:00Z",
"severity": "HIGH"
},
"details": "Buffer overflow in the embedded web server on the Siemens Scalance X Industrial Ethernet switch X414-3E before 3.7.1, X308-2M before 3.7.2, X-300EEC before 3.7.2, XR-300 before 3.7.2, and X-300 before 3.7.2 allows remote attackers to cause a denial of service (device reboot) or possibly execute arbitrary code via a malformed URL.",
"id": "GHSA-45r8-2cqp-rwrj",
"modified": "2022-05-17T05:18:43Z",
"published": "2022-05-17T05:18:43Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1802"
},
{
"type": "WEB",
"url": "http://osvdb.org/81032"
},
{
"type": "WEB",
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-130874.pdf"
},
{
"type": "WEB",
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-04.pdf"
}
],
"schema_version": "1.4.0",
"severity": []
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.