Siemens SCALANCE X300 Firmware 2.2.0

CPE Details

Siemens SCALANCE X300 Firmware 2.2.0
2.2.0
2018-11-01
19h44 +00:00
2021-05-25
13h37 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:o:siemens:scalance_x300_firmware:2.2.0:*:*:*:*:*:*:*

Informations

Vendor

siemens

Product

scalance_x300_firmware

Version

2.2.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2021-29998 2021-04-13 14h16 +00:00 An issue was discovered in Wind River VxWorks before 6.5. There is a possible heap overflow in dhcp client.
9.8
Critical
CVE-2018-13807 2018-09-12 14h00 +00:00 A vulnerability has been identified in SCALANCE X300 (All versions < V4.0.0), SCALANCE X408 (All versions < V4.0.0), SCALANCE X414 (All versions). The web interface on port 443/tcp could allow an attacker to cause a Denial-of-Service condition by sending specially crafted packets to the web server. The device will automatically reboot, impacting network availability for other devices. An attacker must have network access to port 443/tcp to exploit the vulnerability. Neither valid credentials nor interaction by a legitimate user is required to exploit the vulnerability. There is no confidentiality or integrity impact, only availability is temporarily impacted. This vulnerability could be triggered by publicly available tools.
8.6
High
CVE-2018-4848 2018-06-13 22h00 +00:00 A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.3), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.4.1), SCALANCE X-200RNA switch family (All versions < V3.2.7), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions < V4.1.3). The integrated configuration web server of the affected devices could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link. User interaction is required for a successful exploitation. The user must be logged into the web interface in order for the exploitation to succeed. At the stage of publishing this security advisory no public exploitation is known. The vendor has confirmed the vulnerability and provides mitigations to resolve it.
6.1
Medium
CVE-2017-2681 2017-05-11 08h00 +00:00 Specially crafted PROFINET DCP packets sent on a local Ethernet segment (Layer 2) to an affected product could cause a denial of service condition of that product. Human interaction is required to recover the system. PROFIBUS interfaces are not affected.
7.1
High
CVE-2017-2680 2017-05-10 23h00 +00:00 Specially crafted PROFINET DCP broadcast packets could cause a denial of service condition of affected products on a local Ethernet segment (Layer 2). Human interaction is required to recover the systems. PROFIBUS interfaces are not affected.
7.1
High