#VU24311 Missing Authentication for Critical Function


Published: 2020-01-15

Vulnerability identifier: #VU24311

Vulnerability risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-13933

CWE-ID: CWE-306

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
SCALANCE X-200RNA
Hardware solutions / Routers & switches, VoIP, GSM, etc
SCALANCE X-300
Hardware solutions / Routers & switches, VoIP, GSM, etc
SCALANCE X-408
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor: Siemens

Description

The vulnerability allows a remote attacker to violate access-control rules.

The vulnerability exists due to the affected system contains an authentication bypass vulnerability. A remote attacker can send a specially crafted GET request to specific uniform resource locator on the web configuration interface of the device and obtain sensitive information or change the device configuration.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

SCALANCE X-200RNA: All versions

SCALANCE X-300: All versions

SCALANCE X-408: All versions


External links
http://ics-cert.us-cert.gov/advisories/icsa-20-014-03
http://cert-portal.siemens.com/productcert/pdf/ssa-443566.pdf


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability