Siemens SCALANCE X Switch Devices brute force | CVE-2022-26647
NAME
Siemens SCALANCE X Switch Devices brute force
- Platforms Affected:
Siemens SCALANCE X200-4P IRT (6GK5200-4AH00- 2BA3)
Siemens SCALANCE X200-4P IRT (6GK5200-4AH10- 2BA3)
Siemens SCALANCE X201-3P IRT (6GK5201-3BH00- 2BA3)
Siemens SCALANCE X201-3P IRT (6GK5201-3BH10- 2BA3)
Siemens SCALANCE X201-3P IRT PRO (6GK5201- 3BH00-2BD2)
Siemens SCALANCE X201-3P IRT PRO (6GK5201-3JR10- 2BA6)
Siemens SCALANCE X202-2IRT (6GK5202-2BB00- 2BA3)
Siemens SCALANCE X202-2IRT (6GK5202-2BB10- 2BA3)
Siemens SCALANCE X202-2P IRT (6GK5202-2BH00- 2BA3)
Siemens SCALANCE X202-2P IRT (6GK5202-2BH10- 2BA3)
Siemens SCALANCE X202-2P IRT PRO (6GK5202-2JR00- 2BA6)
Siemens SCALANCE X202-2P IRT PRO (6GK5202-2JR10- 2BA6)
Siemens SCALANCE X204-2 (6GK5204-2BB10-2AA3)
Siemens SCALANCE X204-2FM (6GK5204-2BB11- 2AA3)
Siemens SCALANCE X204-2LD (6GK5204-2BC10- 2AA3)
Siemens SCALANCE X204-2LD TS (6GK5204-2BC10- 2CA2)
Siemens SCALANCE X204-2TS (6GK5204-2BB10- 2CA2)
Siemens SCALANCE X204IRT (6GK5204-0BA00-2BA3)
Siemens SCALANCE X204IRT (6GK5204-0BA10-2BA3)
Siemens SCALANCE X204IRT PRO (6GK5204-0JA00- 2BA6) - Risk Level:
8.8 - Exploitability:
Unproven - Consequences:
Gain Access
DESCRIPTION
Siemens SCALANCE X Switch Devices is vulnerable to a brute force attack, caused by the calculation of session ids and nonces in an insecure manner. By using brute force techniques, a remote attacker could exploit this vulnerability to bypass authentication and gain access to the system.
CVSS 3.0 Information
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Access Vector: Network
- Access Complexity: Low
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
- Remediation Level: Official Fix
MITIGATION
Refer to Siemens Security Advisory SSA-310038 for patch, upgrade or suggested workaround information. See References.
- Reference Link:
https://cert-portal.siemens.com/productcert/pdf/ssa-310038.pdf - Reference Link:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26647
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon using the button below
To keep up to date follow us on the below channels.