First published: Tue Feb 11 2020(Updated: )
A vulnerability has been identified in SCALANCE S602 (All versions >= V3.0 and < V4.1), SCALANCE S612 (All versions >= V3.0 and < V4.1), SCALANCE S623 (All versions >= V3.0 and < V4.1), SCALANCE S627-2M (All versions >= V3.0 and < V4.1). Specially crafted packets sent to port 443/tcp of affected devices could cause a Denial-of-Service condition of the web server.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Scalance S602 Firmware | >=3.0<4.1 | |
Siemens SCALANCE S602 | ||
Siemens Scalance S612 Firmware | >=3.0<4.1 | |
Siemens SCALANCE S612 | ||
Siemens Scalance S623 Firmware | >=3.0<4.1 | |
Siemens SCALANCE S623 | ||
Siemens Scalance S627-2m Firmware | >=3.0<4.1 | |
Siemens SCALANCE S627-2M |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-13925.
The severity level of CVE-2019-13925 is high with a score of 7.5.
SCALANCE S602 (versions >= V3.0 and < V4.1), SCALANCE S612 (versions >= V3.0 and < V4.1), SCALANCE S623 (versions >= V3.0 and < V4.1), and SCALANCE S627-2M (versions >= V3.0 and < V4.1) are affected by CVE-2019-13925.
To fix CVE-2019-13925, Siemens has released firmware updates for affected devices. Refer to the Siemens Security Advisory for more information and update instructions.
You can find more information about CVE-2019-13925 in the Siemens Security Advisory and the US-CERT advisory.