Siemens Scalance S627-2m Firmware 4.0.1.1

CPE Details

Siemens Scalance S627-2m Firmware 4.0.1.1
4.0.1.1
2019-01-09
19h28 +00:00
2021-05-19
13h59 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:o:siemens:scalance_s627-2m_firmware:4.0.1.1:*:*:*:*:*:*:*

Informations

Vendor

siemens

Product

scalance_s627-2m_firmware

Version

4.0.1.1

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2019-6585 2020-03-10 18h16 +00:00 A vulnerability has been identified in SCALANCE S602 (All versions >= V3.0 and < V4.1), SCALANCE S612 (All versions >= V3.0 and < V4.1), SCALANCE S623 (All versions >= V3.0 and < V4.1), SCALANCE S627-2M (All versions >= V3.0 and < V4.1). The integrated configuration web server of the affected devices could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link. User interaction is required for a successful exploitation. The user must be logged into the web interface in order for the exploitation to succeed.
6.1
Medium
CVE-2019-13925 2020-02-11 14h36 +00:00 A vulnerability has been identified in SCALANCE S602 (All versions >= V3.0 and < V4.1), SCALANCE S612 (All versions >= V3.0 and < V4.1), SCALANCE S623 (All versions >= V3.0 and < V4.1), SCALANCE S627-2M (All versions >= V3.0 and < V4.1). Specially crafted packets sent to port 443/tcp of affected devices could cause a Denial-of-Service condition of the web server.
7.5
High
CVE-2019-13926 2020-02-11 14h36 +00:00 A vulnerability has been identified in SCALANCE S602 (All versions >= V3.0 and < V4.1), SCALANCE S612 (All versions >= V3.0 and < V4.1), SCALANCE S623 (All versions >= V3.0 and < V4.1), SCALANCE S627-2M (All versions >= V3.0 and < V4.1). Specially crafted packets sent to port 443/tcp of affected devices could cause a Denial-of-Service condition of the web server. A cold reboot is required to restore the functionality of the device.
7.5
High