First published: Thu Aug 01 2013(Updated: )
Siemens Scalance W7xx devices with firmware before 4.5.4 use the same hardcoded X.509 certificate across different customers' installations, which makes it easier for remote attackers to conduct man-in-the-middle attacks against SSL sessions by leveraging the certificate's trust relationship.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Scalance W700 Firmware | <=4.4.0 | |
Siemens Scalance w744-1pro | ||
Siemens Scalance w744-1pro | ||
Siemens Scalance w746-1pro | ||
Siemens Scalance w746-1pro | ||
Siemens Scalance w747-1rr | ||
Siemens Scalance w747-1rr | ||
Siemens Scalance w784-1rr | ||
Siemens Scalance w784-1rr | ||
Siemens Scalance w786-1pro | ||
Siemens Scalance W786-2RR | ||
Siemens Scalance W786-2RR | ||
Siemens Scalance W786 | ||
Siemens Scalance W788-1 | ||
Siemens Scalance W788-1 | ||
Siemens Scalance W788-2 Pro | ||
Siemens Scalance w788-2rr |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4651 is considered a high-severity vulnerability due to its potential for man-in-the-middle attacks.
To fix CVE-2013-4651, update the firmware of the affected Siemens Scalance W7xx devices to version 4.5.4 or later.
CVE-2013-4651 affects multiple Siemens Scalance W7xx devices running firmware versions prior to 4.5.4.
CVE-2013-4651 can be exploited to conduct man-in-the-middle attacks on SSL sessions.
Yes, CVE-2013-4651 may allow attackers to intercept and manipulate communications, leading to unauthorized access.