Siemens SCALANCE X200 IRT

CPE Details

Siemens SCALANCE X200 IRT
-
2022-03-02
18h26 +00:00
2022-11-09
16h50 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:h:siemens:scalance_x200_irt:-:*:*:*:*:*:*:*

Informations

Vendor

siemens

Product

scalance_x200_irt

Version

-

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2018-4842 2018-06-13 22h00 +00:00 A vulnerability has been identified in SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.4.1), SCALANCE X-200RNA switch family (All versions < V3.2.7), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions < V4.1.3). A remote, authenticated attacker with access to the configuration web server could be able to store script code on the web site, if the HRP redundancy option is set. This code could be executed in the web browser of victims visiting this web site (XSS), affecting its confidentiality, integrity and availability. User interaction is required for successful exploitation, as the user needs to visit the manipulated web site. At the stage of publishing this security advisory no public exploitation is known. The vendor has confirmed the vulnerability and provides mitigations to resolve it.
4.8
Moyen
CVE-2017-2681 2017-05-11 08h00 +00:00 Specially crafted PROFINET DCP packets sent on a local Ethernet segment (Layer 2) to an affected product could cause a denial of service condition of that product. Human interaction is required to recover the system. PROFIBUS interfaces are not affected.
7.1
Haute
CVE-2017-2680 2017-05-10 23h00 +00:00 Specially crafted PROFINET DCP broadcast packets could cause a denial of service condition of affected products on a local Ethernet segment (Layer 2). Human interaction is required to recover the systems. PROFIBUS interfaces are not affected.
7.1
Haute