First published: Fri May 24 2013(Updated: )
A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (Versions < V5.0.0 for CVE-2013-3633 and versions < V4.5.0 for CVE-2013-3634), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.1.0). The user privileges for the web interface are only enforced on client side and not properly verified on server side. Therefore, an attacker is able to execute privileged commands using an unprivileged account.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
siemens SCALANCE x200irt firmware | <=5.0.0 | |
Siemens SCALANCE X200-4P IRT (6GK5200-4AH00-2BA3) | ||
Siemens SCALANCE X201-3P IRT PRO | ||
Siemens SCALANCE X201-3P IRT PRO | ||
Siemens SCALANCE X202-2IRT | ||
Siemens SCALANCE X202-2P IRT | ||
Siemens SCALANCE X202-2P IRT | ||
Siemens Scalance X-200IRT | ||
Siemens Scalance X-200IRT | ||
Siemens SCALANCE XF204IRT (6GK5204-0BA00-2BF2) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3633 is classified as a medium severity vulnerability.
To fix CVE-2013-3633, upgrade the SCALANCE X-200 switch family to versions V5.0.0 or higher.
CVE-2013-3633 affects the SCALANCE X-200 switch family and SCALANCE X-200IRT switch family with specific version limitations.
CVE-2013-3633 is a web interface privilege escalation vulnerability.
There are no specific public exploits known for CVE-2013-3633, but the vulnerability poses risks due to its potential for unauthorized access.