gsd-2019-13933
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
A vulnerability has been identified in SCALANCE X204RNA (HSR), SCALANCE X204RNA (PRP), SCALANCE X204RNA EEC (HSR), SCALANCE X204RNA EEC (PRP), SCALANCE X204RNA EEC (PRP/HSR), SCALANCE X302-7 EEC (230V), SCALANCE X302-7 EEC (230V, coated), SCALANCE X302-7 EEC (24V), SCALANCE X302-7 EEC (24V, coated), SCALANCE X302-7 EEC (2x 230V), SCALANCE X302-7 EEC (2x 230V, coated), SCALANCE X302-7 EEC (2x 24V), SCALANCE X302-7 EEC (2x 24V, coated), SCALANCE X304-2FE, SCALANCE X306-1LD FE, SCALANCE X307-2 EEC (230V), SCALANCE X307-2 EEC (230V, coated), SCALANCE X307-2 EEC (24V), SCALANCE X307-2 EEC (24V, coated), SCALANCE X307-2 EEC (2x 230V), SCALANCE X307-2 EEC (2x 230V, coated), SCALANCE X307-2 EEC (2x 24V), SCALANCE X307-2 EEC (2x 24V, coated), SCALANCE X307-3, SCALANCE X307-3, SCALANCE X307-3LD, SCALANCE X307-3LD, SCALANCE X308-2, SCALANCE X308-2, SCALANCE X308-2LD, SCALANCE X308-2LD, SCALANCE X308-2LH, SCALANCE X308-2LH, SCALANCE X308-2LH+, SCALANCE X308-2LH+, SCALANCE X308-2M, SCALANCE X308-2M, SCALANCE X308-2M PoE, SCALANCE X308-2M PoE, SCALANCE X308-2M TS, SCALANCE X308-2M TS, SCALANCE X310, SCALANCE X310, SCALANCE X310FE, SCALANCE X310FE, SCALANCE X320-1 FE, SCALANCE X320-1-2LD FE, SCALANCE X408-2, SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M TS (24V), SCALANCE XR324-12M TS (24V), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M PoE (230V, ports on front), SCALANCE XR324-4M PoE (230V, ports on rear), SCALANCE XR324-4M PoE (24V, ports on front), SCALANCE XR324-4M PoE (24V, ports on rear), SCALANCE XR324-4M PoE TS (24V, ports on front), SIPLUS NET SCALANCE X308-2. Affected devices contain a vulnerability that allows an unauthenticated attacker to violate access-control rules. The vulnerability can be triggered by sending GET request to specific uniform resource locator on the web configuration interface of the device. The security vulnerability could be exploited by an attacker with network access to the affected systems. An attacker could use the vulnerability to obtain sensitive information or change the device configuration. At the time of advisory publication no public exploitation of this security vulnerability was known.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2019-13933", "description": "A vulnerability has been identified in SCALANCE X-200RNA switch family (All versions), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions \u003c V4.1.3). Affected devices contain a vulnerability that allows an unauthenticated attacker to violate access-control rules. The vulnerability can be triggered by sending GET request to specific uniform resource locator on the web configuration interface of the device. The security vulnerability could be exploited by an attacker with network access to the affected systems. An attacker could use the vulnerability to obtain sensitive information or change the device configuration. At the time of advisory publication no public exploitation of this security vulnerability was known.", "id": "GSD-2019-13933" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-13933" ], "details": "A vulnerability has been identified in SCALANCE X204RNA (HSR), SCALANCE X204RNA (PRP), SCALANCE X204RNA EEC (HSR), SCALANCE X204RNA EEC (PRP), SCALANCE X204RNA EEC (PRP/HSR), SCALANCE X302-7 EEC (230V), SCALANCE X302-7 EEC (230V, coated), SCALANCE X302-7 EEC (24V), SCALANCE X302-7 EEC (24V, coated), SCALANCE X302-7 EEC (2x 230V), SCALANCE X302-7 EEC (2x 230V, coated), SCALANCE X302-7 EEC (2x 24V), SCALANCE X302-7 EEC (2x 24V, coated), SCALANCE X304-2FE, SCALANCE X306-1LD FE, SCALANCE X307-2 EEC (230V), SCALANCE X307-2 EEC (230V, coated), SCALANCE X307-2 EEC (24V), SCALANCE X307-2 EEC (24V, coated), SCALANCE X307-2 EEC (2x 230V), SCALANCE X307-2 EEC (2x 230V, coated), SCALANCE X307-2 EEC (2x 24V), SCALANCE X307-2 EEC (2x 24V, coated), SCALANCE X307-3, SCALANCE X307-3, SCALANCE X307-3LD, SCALANCE X307-3LD, SCALANCE X308-2, SCALANCE X308-2, SCALANCE X308-2LD, SCALANCE X308-2LD, SCALANCE X308-2LH, SCALANCE X308-2LH, SCALANCE X308-2LH+, SCALANCE X308-2LH+, SCALANCE X308-2M, SCALANCE X308-2M, SCALANCE X308-2M PoE, SCALANCE X308-2M PoE, SCALANCE X308-2M TS, SCALANCE X308-2M TS, SCALANCE X310, SCALANCE X310, SCALANCE X310FE, SCALANCE X310FE, SCALANCE X320-1 FE, SCALANCE X320-1-2LD FE, SCALANCE X408-2, SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M TS (24V), SCALANCE XR324-12M TS (24V), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M PoE (230V, ports on front), SCALANCE XR324-4M PoE (230V, ports on rear), SCALANCE XR324-4M PoE (24V, ports on front), SCALANCE XR324-4M PoE (24V, ports on rear), SCALANCE XR324-4M PoE TS (24V, ports on front), SIPLUS NET SCALANCE X308-2. Affected devices contain a vulnerability that allows an unauthenticated attacker to violate access-control rules. The vulnerability can be triggered by sending GET request to specific uniform resource locator on the web configuration interface of the device. The security vulnerability could be exploited by an attacker with network access to the affected systems. An attacker could use the vulnerability to obtain sensitive information or change the device configuration. At the time of advisory publication no public exploitation of this security vulnerability was known.", "id": "GSD-2019-13933", "modified": "2023-12-13T01:23:41.173275Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-13933", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SCALANCE X204RNA (HSR)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.2.7" } ] } }, { "product_name": "SCALANCE X204RNA (PRP)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.2.7" } ] } }, { "product_name": "SCALANCE X204RNA EEC (HSR)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.2.7" } ] } }, { "product_name": "SCALANCE X204RNA EEC (PRP)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.2.7" } ] } }, { "product_name": "SCALANCE X204RNA EEC (PRP/HSR)", "version": { "version_data": [ { "version_value": "All versions \u003c V3.2.7" } ] } }, { "product_name": "SCALANCE X302-7 EEC (230V)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X302-7 EEC (230V, coated)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X302-7 EEC (24V)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X302-7 EEC (24V, coated)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X302-7 EEC (2x 230V)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X302-7 EEC (2x 230V, coated)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X302-7 EEC (2x 24V)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X302-7 EEC (2x 24V, coated)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X304-2FE", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X306-1LD FE", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X307-2 EEC (230V)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X307-2 EEC (230V, coated)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X307-2 EEC (24V)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X307-2 EEC (24V, coated)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X307-2 EEC (2x 230V)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X307-2 EEC (2x 230V, coated)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X307-2 EEC (2x 24V)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X307-2 EEC (2x 24V, coated)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X307-3", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X307-3", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X307-3LD", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X307-3LD", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X308-2", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X308-2", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X308-2LD", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X308-2LD", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X308-2LH", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X308-2LH", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X308-2LH+", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X308-2LH+", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X308-2M", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X308-2M", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X308-2M PoE", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X308-2M PoE", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X308-2M TS", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X308-2M TS", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X310", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X310", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X310FE", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X310FE", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X320-1 FE", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X320-1-2LD FE", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE X408-2", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-12M (230V, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-12M (230V, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-12M (230V, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-12M (230V, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-12M (24V, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-12M (24V, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-12M (24V, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-12M (24V, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-12M TS (24V)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-12M TS (24V)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (24V, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (24V, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (24V, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (24V, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (2x 24V, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (2x 24V, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M PoE (230V, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M PoE (230V, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M PoE (24V, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M PoE (24V, ports on rear)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SCALANCE XR324-4M PoE TS (24V, ports on front)", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } }, { "product_name": "SIPLUS NET SCALANCE X308-2", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1.3" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SCALANCE X204RNA (HSR), SCALANCE X204RNA (PRP), SCALANCE X204RNA EEC (HSR), SCALANCE X204RNA EEC (PRP), SCALANCE X204RNA EEC (PRP/HSR), SCALANCE X302-7 EEC (230V), SCALANCE X302-7 EEC (230V, coated), SCALANCE X302-7 EEC (24V), SCALANCE X302-7 EEC (24V, coated), SCALANCE X302-7 EEC (2x 230V), SCALANCE X302-7 EEC (2x 230V, coated), SCALANCE X302-7 EEC (2x 24V), SCALANCE X302-7 EEC (2x 24V, coated), SCALANCE X304-2FE, SCALANCE X306-1LD FE, SCALANCE X307-2 EEC (230V), SCALANCE X307-2 EEC (230V, coated), SCALANCE X307-2 EEC (24V), SCALANCE X307-2 EEC (24V, coated), SCALANCE X307-2 EEC (2x 230V), SCALANCE X307-2 EEC (2x 230V, coated), SCALANCE X307-2 EEC (2x 24V), SCALANCE X307-2 EEC (2x 24V, coated), SCALANCE X307-3, SCALANCE X307-3, SCALANCE X307-3LD, SCALANCE X307-3LD, SCALANCE X308-2, SCALANCE X308-2, SCALANCE X308-2LD, SCALANCE X308-2LD, SCALANCE X308-2LH, SCALANCE X308-2LH, SCALANCE X308-2LH+, SCALANCE X308-2LH+, SCALANCE X308-2M, SCALANCE X308-2M, SCALANCE X308-2M PoE, SCALANCE X308-2M PoE, SCALANCE X308-2M TS, SCALANCE X308-2M TS, SCALANCE X310, SCALANCE X310, SCALANCE X310FE, SCALANCE X310FE, SCALANCE X320-1 FE, SCALANCE X320-1-2LD FE, SCALANCE X408-2, SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M TS (24V), SCALANCE XR324-12M TS (24V), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M PoE (230V, ports on front), SCALANCE XR324-4M PoE (230V, ports on rear), SCALANCE XR324-4M PoE (24V, ports on front), SCALANCE XR324-4M PoE (24V, ports on rear), SCALANCE XR324-4M PoE TS (24V, ports on front), SIPLUS NET SCALANCE X308-2. Affected devices contain a vulnerability that allows an unauthenticated attacker to violate access-control rules. The vulnerability can be triggered by sending GET request to specific uniform resource locator on the web configuration interface of the device. The security vulnerability could be exploited by an attacker with network access to the affected systems. An attacker could use the vulnerability to obtain sensitive information or change the device configuration. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-306: Missing Authentication for Critical Function" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-443566.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-443566.pdf" }, { "name": "https://www.us-cert.gov/ics/advisories/icsa-20-014-03", "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-014-03" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_x-200rna_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_x-200rna:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_x204rna_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_x204rna:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_x-300_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.1.3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_x-300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_xr-300wg_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.1.3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_xr-300wg:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_xr-300_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.1.3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_xr-300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_x408-2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.1.3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_x408-2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:siplus_net_csm_1277_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.1.3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:siplus_net_csm_1277:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-13933" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A vulnerability has been identified in SCALANCE X204RNA (HSR), SCALANCE X204RNA (PRP), SCALANCE X204RNA EEC (HSR), SCALANCE X204RNA EEC (PRP), SCALANCE X204RNA EEC (PRP/HSR), SCALANCE X302-7 EEC (230V), SCALANCE X302-7 EEC (230V, coated), SCALANCE X302-7 EEC (24V), SCALANCE X302-7 EEC (24V, coated), SCALANCE X302-7 EEC (2x 230V), SCALANCE X302-7 EEC (2x 230V, coated), SCALANCE X302-7 EEC (2x 24V), SCALANCE X302-7 EEC (2x 24V, coated), SCALANCE X304-2FE, SCALANCE X306-1LD FE, SCALANCE X307-2 EEC (230V), SCALANCE X307-2 EEC (230V, coated), SCALANCE X307-2 EEC (24V), SCALANCE X307-2 EEC (24V, coated), SCALANCE X307-2 EEC (2x 230V), SCALANCE X307-2 EEC (2x 230V, coated), SCALANCE X307-2 EEC (2x 24V), SCALANCE X307-2 EEC (2x 24V, coated), SCALANCE X307-3, SCALANCE X307-3, SCALANCE X307-3LD, SCALANCE X307-3LD, SCALANCE X308-2, SCALANCE X308-2, SCALANCE X308-2LD, SCALANCE X308-2LD, SCALANCE X308-2LH, SCALANCE X308-2LH, SCALANCE X308-2LH+, SCALANCE X308-2LH+, SCALANCE X308-2M, SCALANCE X308-2M, SCALANCE X308-2M PoE, SCALANCE X308-2M PoE, SCALANCE X308-2M TS, SCALANCE X308-2M TS, SCALANCE X310, SCALANCE X310, SCALANCE X310FE, SCALANCE X310FE, SCALANCE X320-1 FE, SCALANCE X320-1-2LD FE, SCALANCE X408-2, SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M TS (24V), SCALANCE XR324-12M TS (24V), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M PoE (230V, ports on front), SCALANCE XR324-4M PoE (230V, ports on rear), SCALANCE XR324-4M PoE (24V, ports on front), SCALANCE XR324-4M PoE (24V, ports on rear), SCALANCE XR324-4M PoE TS (24V, ports on front), SIPLUS NET SCALANCE X308-2. Affected devices contain a vulnerability that allows an unauthenticated attacker to violate access-control rules. The vulnerability can be triggered by sending GET request to specific uniform resource locator on the web configuration interface of the device. The security vulnerability could be exploited by an attacker with network access to the affected systems. An attacker could use the vulnerability to obtain sensitive information or change the device configuration. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-306" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-443566.pdf", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-443566.pdf" }, { "name": "https://www.us-cert.gov/ics/advisories/icsa-20-014-03", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-014-03" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.7 } }, "lastModifiedDate": "2022-12-13T17:15Z", "publishedDate": "2020-01-16T16:15Z" } } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.