Vulnerability identifier: #VU24311
Vulnerability risk: High
CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-306
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
SCALANCE X-200RNA
Hardware solutions /
Routers & switches, VoIP, GSM, etc
SCALANCE X-300
Hardware solutions /
Routers & switches, VoIP, GSM, etc
SCALANCE X-408
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Vendor: Siemens
Description
The vulnerability allows a remote attacker to violate access-control rules.
The vulnerability exists due to the affected system contains an authentication bypass vulnerability. A remote attacker can send a specially crafted GET request to specific uniform resource locator on the web configuration interface of the device and obtain sensitive information or change the device configuration.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
SCALANCE X-200RNA: All versions
SCALANCE X-300: All versions
SCALANCE X-408: All versions
External links
http://ics-cert.us-cert.gov/advisories/icsa-20-014-03
http://cert-portal.siemens.com/productcert/pdf/ssa-443566.pdf
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.