Multiple vulnerabilities in Siemens SCALANCE XB-200 / XC-200 / XP-200 / XF-200BA / XR-300WG Family



Published: 2024-03-13
Risk Low
Patch available NO
Number of vulnerabilities 2
CVE-ID CVE-2023-44318
CVE-2023-44321
CWE-ID CWE-321
CWE-400
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
SCALANCE XR328-4C WG (28xGE
Hardware solutions / Firmware

DC24V)
Hardware solutions / Firmware

24V)
Hardware solutions / Firmware

AC230V)
Hardware solutions / Firmware

4xGE
Hardware solutions / Firmware

SCALANCE XR328-4C WG (24xFE
Hardware solutions / Firmware

SCALANCE XR326-2C PoE WG (without UL)
Hardware solutions / Firmware

DC 24V)
Hardware solutions / Firmware

AC 230V)
Hardware solutions / Firmware

SCALANCE XR324WG (24 x FE
Hardware solutions / Firmware

SCALANCE XC206-2G PoE (54 V DC)
Hardware solutions / Firmware

SCALANCE XP216 (Ethernet/IP)
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XP208 (Ethernet/IP)
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XC224-4C G (EIP Def.)
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XC216-4C G (EIP Def.)
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XC216-3G PoE (54 V DC)
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XC208G PoE (54 V DC)
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XC208G (EIP def.)
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XC206-2SFP G (EIP DEF.)
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XC206-2G PoE EEC (54 V DC)
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XC206-2 (ST/BFOC)
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XC206-2 (SC)
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XB216 (PN)
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XB216 (E/IP)
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XB213-3LD (SC
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XB213-3 (ST
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XB213-3 (SC
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XB208 (PN)
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XB208 (E/IP)
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XB205-3LD (SC
Hardware solutions / Routers & switches, VoIP, GSM, etc

E/IP)
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XB205-3 (ST
Hardware solutions / Routers & switches, VoIP, GSM, etc

PN)
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XB205-3 (SC
Hardware solutions / Routers & switches, VoIP, GSM, etc

SIPLUS NET SCALANCE XC216-4C
Hardware solutions / Routers & switches, VoIP, GSM, etc

SIPLUS NET SCALANCE XC208
Hardware solutions / Routers & switches, VoIP, GSM, etc

SIPLUS NET SCALANCE XC206-2SFP
Hardware solutions / Routers & switches, VoIP, GSM, etc

SIPLUS NET SCALANCE XC206-2
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XR326-2C PoE WG
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XP216POE EEC
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XP216EEC
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XP216
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XP208PoE EEC
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XP208EEC
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XP208
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XF204-2BA DNA
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XF204-2BA
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XF204 DNA
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XC224-4C G EEC
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XC224-4C G
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XC224
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XC216EEC
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XC216-4C G EEC
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XC216-4C G
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XC216-4C
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XC216-3G PoE
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XC216
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XC208G PoE
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XC208G EEC
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XC208G
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XC208EEC
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XC208
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XC206-2SFP G EEC
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XC206-2SFP G
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XC206-2SFP EEC
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XC206-2SFP
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XC206-2G PoE
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE XF204
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor Siemens

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Use of Hard-coded Cryptographic Key

EUVDB-ID: #VU83416

Risk: Low

CVSSv3.1: 4.5 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:C]

CVE-ID: CVE-2023-44318

CWE-ID: CWE-321 - Use of Hard-coded Cryptographic Key

Exploit availability: No

Description

The vulnerability allows a remote user to compromise the target system.

The vulnerability exists due to the usage a hardcoded key to obfuscate the configuration backup that an administrator can export from the device. A remote administrator can obtain a configuration backup to extract configuration information from the exported file.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

SCALANCE XR328-4C WG (28xGE: All versions

DC24V): All versions

24V): All versions

AC230V): All versions

4xGE: All versions

SCALANCE XR328-4C WG (24xFE: All versions

SCALANCE XR326-2C PoE WG (without UL): All versions

DC 24V): All versions

AC 230V): All versions

SCALANCE XR324WG (24 x FE: All versions

SCALANCE XC206-2G PoE (54 V DC): All versions

SCALANCE XP216 (Ethernet/IP): All versions

SCALANCE XP208 (Ethernet/IP): All versions

SCALANCE XC224-4C G (EIP Def.): All versions

SCALANCE XC216-4C G (EIP Def.): All versions

SCALANCE XC216-3G PoE (54 V DC): All versions

SCALANCE XC208G PoE (54 V DC): All versions

SCALANCE XC208G (EIP def.): All versions

SCALANCE XC206-2SFP G (EIP DEF.): All versions

SCALANCE XC206-2G PoE EEC (54 V DC): All versions

SCALANCE XC206-2 (ST/BFOC): All versions

SCALANCE XC206-2 (SC): All versions

SCALANCE XB216 (PN): All versions

SCALANCE XB216 (E/IP): All versions

SCALANCE XB213-3LD (SC: All versions

SCALANCE XB213-3 (ST: All versions

SCALANCE XB213-3 (SC: All versions

SCALANCE XB208 (PN): All versions

SCALANCE XB208 (E/IP): All versions

SCALANCE XB205-3LD (SC: All versions

E/IP): All versions

SCALANCE XB205-3 (ST: All versions

PN): All versions

SCALANCE XB205-3 (SC: All versions

SIPLUS NET SCALANCE XC216-4C: All versions

SIPLUS NET SCALANCE XC208: All versions

SIPLUS NET SCALANCE XC206-2SFP: All versions

SIPLUS NET SCALANCE XC206-2: All versions

SCALANCE XR326-2C PoE WG: All versions

SCALANCE XP216POE EEC: All versions

SCALANCE XP216EEC: All versions

SCALANCE XP216: All versions

SCALANCE XP208PoE EEC: All versions

SCALANCE XP208EEC: All versions

SCALANCE XP208: All versions

SCALANCE XF204-2BA DNA: All versions

SCALANCE XF204-2BA: All versions

SCALANCE XF204 DNA: All versions

SCALANCE XC224-4C G EEC: All versions

SCALANCE XC224-4C G: All versions

SCALANCE XC224: All versions

SCALANCE XC216EEC: All versions

SCALANCE XC216-4C G EEC: All versions

SCALANCE XC216-4C G: All versions

SCALANCE XC216-4C: All versions

SCALANCE XC216-3G PoE: All versions

SCALANCE XC216: All versions

SCALANCE XC208G PoE: All versions

SCALANCE XC208G EEC: All versions

SCALANCE XC208G: All versions

SCALANCE XC208EEC: All versions

SCALANCE XC208: All versions

SCALANCE XC206-2SFP G EEC: All versions

SCALANCE XC206-2SFP G: All versions

SCALANCE XC206-2SFP EEC: All versions

SCALANCE XC206-2SFP: All versions

SCALANCE XC206-2G PoE: All versions

SCALANCE XF204: All versions

External links

http://cert-portal.siemens.com/productcert/txt/ssa-353002.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Resource exhaustion

EUVDB-ID: #VU83420

Risk: Low

CVSSv3.1: 2.5 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L/E:U/RL:U/RC:C]

CVE-ID: CVE-2023-44321

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources. A remote administrator can trigger resource exhaustion and perform a denial of service (DoS) attack.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

SCALANCE XR328-4C WG (28xGE: All versions

DC24V): All versions

24V): All versions

AC230V): All versions

4xGE: All versions

SCALANCE XR328-4C WG (24xFE: All versions

SCALANCE XR326-2C PoE WG (without UL): All versions

DC 24V): All versions

AC 230V): All versions

SCALANCE XR324WG (24 x FE: All versions

SCALANCE XC206-2G PoE (54 V DC): All versions

SCALANCE XP216 (Ethernet/IP): All versions

SCALANCE XP208 (Ethernet/IP): All versions

SCALANCE XC224-4C G (EIP Def.): All versions

SCALANCE XC216-4C G (EIP Def.): All versions

SCALANCE XC216-3G PoE (54 V DC): All versions

SCALANCE XC208G PoE (54 V DC): All versions

SCALANCE XC208G (EIP def.): All versions

SCALANCE XC206-2SFP G (EIP DEF.): All versions

SCALANCE XC206-2G PoE EEC (54 V DC): All versions

SCALANCE XC206-2 (ST/BFOC): All versions

SCALANCE XC206-2 (SC): All versions

SCALANCE XB216 (PN): All versions

SCALANCE XB216 (E/IP): All versions

SCALANCE XB213-3LD (SC: All versions

SCALANCE XB213-3 (ST: All versions

SCALANCE XB213-3 (SC: All versions

SCALANCE XB208 (PN): All versions

SCALANCE XB208 (E/IP): All versions

SCALANCE XB205-3LD (SC: All versions

E/IP): All versions

SCALANCE XB205-3 (ST: All versions

PN): All versions

SCALANCE XB205-3 (SC: All versions

SIPLUS NET SCALANCE XC216-4C: All versions

SIPLUS NET SCALANCE XC208: All versions

SIPLUS NET SCALANCE XC206-2SFP: All versions

SIPLUS NET SCALANCE XC206-2: All versions

SCALANCE XR326-2C PoE WG: All versions

SCALANCE XP216POE EEC: All versions

SCALANCE XP216EEC: All versions

SCALANCE XP216: All versions

SCALANCE XP208PoE EEC: All versions

SCALANCE XP208EEC: All versions

SCALANCE XP208: All versions

SCALANCE XF204-2BA DNA: All versions

SCALANCE XF204-2BA: All versions

SCALANCE XF204 DNA: All versions

SCALANCE XC224-4C G EEC: All versions

SCALANCE XC224-4C G: All versions

SCALANCE XC224: All versions

SCALANCE XC216EEC: All versions

SCALANCE XC216-4C G EEC: All versions

SCALANCE XC216-4C G: All versions

SCALANCE XC216-4C: All versions

SCALANCE XC216-3G PoE: All versions

SCALANCE XC216: All versions

SCALANCE XC208G PoE: All versions

SCALANCE XC208G EEC: All versions

SCALANCE XC208G: All versions

SCALANCE XC208EEC: All versions

SCALANCE XC208: All versions

SCALANCE XC206-2SFP G EEC: All versions

SCALANCE XC206-2SFP G: All versions

SCALANCE XC206-2SFP EEC: All versions

SCALANCE XC206-2SFP: All versions

SCALANCE XC206-2G PoE: All versions

SCALANCE XF204: All versions

External links

http://cert-portal.siemens.com/productcert/txt/ssa-353002.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###