Siemens SIPLUS NET SCALANCE X202-2P IRT FIRMWARE 5.5.0

CPE Details

Siemens SIPLUS NET SCALANCE X202-2P IRT FIRMWARE 5.5.0
5.5.0
2022-10-14
11h51 +00:00
2022-10-14
20h00 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:o:siemens:siplus_net_scalance_x202-2p_irt_firmware:5.5.0:*:*:*:*:*:*:*

Informations

Vendor

siemens

Product

siplus_net_scalance_x202-2p_irt_firmware

Version

5.5.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-29054 2023-04-11 09h03 +00:00 A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT PRO (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2P IRT (All versions < V5.5.2), SCALANCE X202-2P IRT PRO (All versions < V5.5.2), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT PRO (All versions < V5.5.2), SCALANCE XF201-3P IRT (All versions < V5.5.2), SCALANCE XF202-2P IRT (All versions < V5.5.2), SCALANCE XF204-2BA IRT (All versions < V5.5.2), SCALANCE XF204IRT (All versions < V5.5.2), SIPLUS NET SCALANCE X202-2P IRT (All versions < V5.5.2). The SSH server on affected devices is configured to offer weak ciphers by default. This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data passed over the connection between legitimate clients and the affected device.
7.4
High