First published: Tue Sep 17 2013(Updated: )
The authentication implementation in the web server on Siemens SCALANCE X-200 switches with firmware before 5.0.0 does not use a sufficient source of entropy for generating values of random numbers, which makes it easier for remote attackers to hijack sessions by predicting a value.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SCALANCE X-200 Firmware | <=4.4 | |
Siemens SCALANCE X-200 Firmware | =4.3 | |
Siemens SCALANCE XC-200 | ||
Siemens SCALANCE X-200RNA | ||
Siemens SCALANCE X200-4P IRT (6GK5200-4AH00-2BA3) | ||
Siemens SCALANCE X201-3P IRT PRO | ||
Siemens SCALANCE X201-3P IRT PRO | ||
Siemens SCALANCE X202-2IRT | ||
Siemens SCALANCE X202-2P IRT | ||
Siemens SCALANCE X202-2P IRT | ||
Siemens Scalance X-200IRT | ||
Siemens Scalance X-200IRT | ||
Siemens Scalance XF-200BA Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5709 has a medium severity level due to its potential to allow remote session hijacking.
To fix CVE-2013-5709, upgrade the firmware of Siemens SCALANCE X-200 switches to version 5.0.0 or later.
CVE-2013-5709 affects Siemens SCALANCE X-200 switches running firmware versions prior to 5.0.0.
Yes, CVE-2013-5709 can be exploited remotely by attackers due to weak random number generation in the authentication process.
The impact of CVE-2013-5709 includes the potential for remote attackers to hijack user sessions.