First published: Tue Aug 13 2019(Updated: )
A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0), SCALANCE X204RNA (HSR) (All versions), SCALANCE X204RNA (PRP) (All versions), SCALANCE X204RNA EEC (HSR) (All versions), SCALANCE X204RNA EEC (PRP) (All versions), SCALANCE X204RNA EEC (PRP/HSR) (All versions). The device contains a vulnerability that could allow an attacker to trigger a denial-of-service condition by sending large message packages repeatedly to the telnet service. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the device.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Scalance X-200 Firmware | ||
Siemens SCALANCE X-200 | ||
Siemens Scalance X-200irt Firmware | ||
Siemens Scalance X-200irt | ||
Siemens Scalance X-200rna Firmware | ||
Siemens Scalance X-200rna |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2019-10942.
The severity level of CVE-2019-10942 is high.
The Siemens products affected by this vulnerability include SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0), SCALANCE X204RNA (HSR) (All versions), SCALANCE X204RNA (PRP) (All versions), SCALANCE X204RNA.
The solution for CVE-2019-10942 is to update the affected Siemens products to version V5.2.5 or higher.
More information about CVE-2019-10942 can be found at the Siemens ProductCERT website: https://cert-portal.siemens.com/productcert/pdf/ssa-100232.pdf