Siemens Scalance Xf204 vulnerabilities
20 known vulnerabilities affecting siemens/scalance_xf204.
Total CVEs
20
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL4HIGH10MEDIUM6
Vulnerabilities
Page 1 of 1
CVE-2023-44318MEDIUMCVSS 6.9fixed in *2023-11-14
CVE-2023-44318 [MEDIUM] CWE-321 CVE-2023-44318: Affected devices use a hardcoded key to obfuscate the configuration backup that an administrator can
Affected devices use a hardcoded key to obfuscate the configuration backup that an administrator can export from the device. This could allow an authenticated attacker with administrative privileges or an attacker that obtains a configuration backup to extract configuration information from the exported file.
cvelistv5nvd
CVE-2023-44321MEDIUMCVSS 5.1fixed in V4.62023-11-14
CVE-2023-44321 [MEDIUM] CWE-400 CVE-2023-44321: Affected devices do not properly validate the length of inputs when performing certain configuration
Affected devices do not properly validate the length of inputs when performing certain configuration changes in the web interface allowing an authenticated attacker to cause a denial of service condition. The device needs to be restarted for the web interface to become available again.
cvelistv5nvd
CVE-2022-46140HIGHCVSS 7.1fixed in V4.42022-12-13
CVE-2022-46140 [HIGH] CWE-327 CVE-2022-46140: Affected devices use a weak encryption scheme to encrypt the debug zip file. This could allow an aut
Affected devices use a weak encryption scheme to encrypt the debug zip file. This could allow an authenticated attacker to decrypt the contents of the file and retrieve debug information about the system.
cvelistv5nvd
CVE-2022-46143MEDIUMCVSS 5.1fixed in V4.42022-12-13
CVE-2022-46143 [MEDIUM] CWE-1284 CVE-2022-46143: Affected devices do not check the TFTP blocksize correctly. This could allow an authenticated attack
Affected devices do not check the TFTP blocksize correctly. This could allow an authenticated attacker to read from an uninitialized buffer that potentially contains previously allocated data.
cvelistv5nvd
CVE-2022-46142MEDIUMCVSS 5.2fixed in V4.42022-12-13
CVE-2022-46142 [MEDIUM] CWE-257 CVE-2022-46142: Affected devices store the CLI user passwords encrypted in flash memory. Attackers with physical acc
Affected devices store the CLI user passwords encrypted in flash memory. Attackers with physical access to the device could retrieve the file and decrypt the CLI user passwords.
cvelistv5nvd
CVE-2022-31765HIGHCVSS 8.8fixed in V4.42022-10-11
CVE-2022-31765 [HIGH] CWE-862 CVE-2022-31765: Affected devices do not properly authorize the change password function of the web interface.
This
Affected devices do not properly authorize the change password function of the web interface.
This could allow low privileged users to escalate their privileges.
cvelistv5nvd
CVE-2022-40631MEDIUMCVSS 6.1vAll versions < V5.2.52022-10-11
CVE-2022-40631 [MEDIUM] CWE-79 CVE-2022-40631: A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < V5.5.0), SCALANCE X201-3
A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < V5.5.0), SCALANCE X201-3P IRT (All versions < V5.5.0), SCALANCE X201-3P IRT PRO (All versions < V5.5.0), SCALANCE X202-2IRT (All versions < V5.5.0), SCALANCE X202-2P IRT (All versions < V5.5.0), SCALANCE X202-2P IRT PRO (All versions < V5.5.0), SCALANCE X204-2 (All versions <
cvelistv5nvd
CVE-2022-36323HIGHCVSS 7.2fixed in V4.42022-08-10
CVE-2022-36323 [HIGH] CWE-74 CVE-2022-36323: Affected devices do not properly sanitize an input field
Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell.
cvelistv5
CVE-2022-36324HIGHCVSS 7.5fixed in V4.42022-08-10
CVE-2022-36324 [HIGH] CWE-770 CVE-2022-36324: Affected devices do not properly handle the renegotiation of SSL/TLS parameters. This could allow an
Affected devices do not properly handle the renegotiation of SSL/TLS parameters. This could allow an unauthenticated remote attacker to bypass the TCP brute force prevention and lead to a denial of service condition for the duration of the attack.
cvelistv5nvd
CVE-2022-36325MEDIUMCVSS 4.8fixed in V4.42022-08-10
CVE-2022-36325 [MEDIUM] CWE-80 CVE-2022-36325: Affected devices do not properly sanitize data introduced by an user when rendering the web interfac
Affected devices do not properly sanitize data introduced by an user when rendering the web interface. This could allow an authenticated remote attacker with administrative privileges to inject code and lead to a DOM-based XSS.
cvelistv5nvd
CVE-2022-26647CRITICALCVSS 9.8vAll versions < V5.2.62022-07-12
CVE-2022-26647 [CRITICAL] CWE-330 CVE-2022-26647: A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < V5.5.2), SCALANCE X201-3
A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT PRO (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2P IRT (All versions < V5.5.2), SCALANCE X202-2P IRT PRO (All vers
cvelistv5nvd
CVE-2022-26649HIGHCVSS 7.5vAll versions < V5.2.62022-07-12
CVE-2022-26649 [HIGH] CWE-120 CVE-2022-26649: A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < V5.5.2), SCALANCE X201-3
A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT PRO (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2P IRT (All versions < V5.5.2), SCALANCE X202-2P IRT PRO (All versions
cvelistv5nvd
CVE-2022-26648HIGHCVSS 7.5vAll versions < V5.2.62022-07-12
CVE-2022-26648 [HIGH] CWE-120 CVE-2022-26648: A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < V5.5.2), SCALANCE X201-3
A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT PRO (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2P IRT (All versions < V5.5.2), SCALANCE X202-2P IRT PRO (All versions
cvelistv5nvd
CVE-2020-28400HIGHCVSS 8.7fixed in V5.2.5fixed in V4.32021-07-13
CVE-2020-28400 [HIGH] CWE-770 CVE-2020-28400: Affected devices contain a vulnerability that allows an unauthenticated attacker to trigger a denial
Affected devices contain a vulnerability that allows an unauthenticated attacker to trigger a denial of service condition. The vulnerability can be triggered if a large amount of DCP reset packets are sent to the device.
cvelistv5nvd
CVE-2021-25668CRITICALCVSS 9.8vAll versions < V5.2.52021-04-22
CVE-2021-25668 [CRITICAL] CWE-122 CVE-2021-25668: A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < 5.5.1), SCALANCE X201-3P
A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < 5.5.1), SCALANCE X201-3P IRT (All versions < 5.5.1), SCALANCE X201-3P IRT PRO (All versions < 5.5.1), SCALANCE X202-2 IRT (All versions < 5.5.1), SCALANCE X202-2P IRT (incl. SIPLUS NET variant) (All versions < 5.5.1), SCALANCE X202-2P IRT PRO (All versions < 5.5.1), SCALAN
cvelistv5nvd
CVE-2021-25669CRITICALCVSS 9.8vAll versions < V5.2.52021-04-22
CVE-2021-25669 [CRITICAL] CWE-121 CVE-2021-25669: A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < 5.5.1), SCALANCE X201-3P
A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < 5.5.1), SCALANCE X201-3P IRT (All versions < 5.5.1), SCALANCE X201-3P IRT PRO (All versions < 5.5.1), SCALANCE X202-2 IRT (All versions < 5.5.1), SCALANCE X202-2P IRT (incl. SIPLUS NET variant) (All versions < 5.5.1), SCALANCE X202-2P IRT PRO (All versions < 5.5.1), SCALAN
cvelistv5nvd
CVE-2019-19301HIGHCVSS 7.5vAll versions < V5.2.52020-04-14
CVE-2019-19301 [HIGH] CWE-400 CVE-2019-19301: A vulnerability has been identified in SCALANCE X200-4P IRT, SCALANCE X201-3P IRT, SCALANCE X201-3P
A vulnerability has been identified in SCALANCE X200-4P IRT, SCALANCE X201-3P IRT, SCALANCE X201-3P IRT PRO, SCALANCE X202-2IRT, SCALANCE X202-2P IRT, SCALANCE X202-2P IRT PRO, SCALANCE X204-2, SCALANCE X204-2FM, SCALANCE X204-2LD, SCALANCE X204-2LD TS, SCALANCE X204-2TS, SCALANCE X204IRT, SCALANCE X204IRT PRO, SCALANCE X206-1, SCALANCE X206-1LD, SCALA
cvelistv5nvd
CVE-2019-13946HIGHCVSS 7.5vAll versions < V5.2.52020-02-11
CVE-2019-13946 [HIGH] CWE-400 CVE-2019-13946: Profinet-IO (PNIO) stack versions prior V06.00 do not properly limit
internal resource allocation wh
Profinet-IO (PNIO) stack versions prior V06.00 do not properly limit
internal resource allocation when multiple legitimate diagnostic package
requests are sent to the DCE-RPC interface.
This could lead to a denial of service condition due to lack of memory
for devices that include a vulnerable version of the stack.
The security vulnerability could be
cvelistv5nvd
CVE-2019-6569CRITICALCVSS 9.1vAll versions < V5.2.6vAll versions < V4.12019-03-26
CVE-2019-6569 [CRITICAL] CWE-440 CVE-2019-6569: The monitor barrier of the affected products insufficiently blocks data from being forwarded over th
The monitor barrier of the affected products insufficiently blocks data from being forwarded over the mirror port into the mirrored network. An attacker could use this behavior to transmit malicious packets to systems in the mirrored network, possibly influencing their configuration and runtime behavior.
cvelistv5nvd
CVE-2017-12736HIGHCVSS 8.8≥ V3.0, < V3.0.22017-12-26
CVE-2017-12736 [HIGH] CWE-1188 CVE-2017-12736: After initial configuration, the Ruggedcom Discovery Protocol (RCDP) is still able to write to the d
After initial configuration, the Ruggedcom Discovery Protocol (RCDP) is still able to write to the device under certain conditions.
This could allow an attacker located in the adjacent network of the targeted device to perform unauthorized administrative actions.
cvelistv5nvd