First published: Tue Feb 11 2020(Updated: )
A vulnerability has been identified in SCALANCE S602 (All versions >= V3.0 and < V4.1), SCALANCE S612 (All versions >= V3.0 and < V4.1), SCALANCE S623 (All versions >= V3.0 and < V4.1), SCALANCE S627-2M (All versions >= V3.0 and < V4.1). Specially crafted packets sent to port 443/tcp of affected devices could cause a Denial-of-Service condition of the web server. A cold reboot is required to restore the functionality of the device.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Scalance S602 Firmware | >=3.0<4.1 | |
Siemens SCALANCE S602 | ||
Siemens Scalance S612 Firmware | >=3.0<4.1 | |
Siemens SCALANCE S612 | ||
Siemens Scalance S623 Firmware | >=3.0<4.1 | |
Siemens SCALANCE S623 | ||
Siemens Scalance S627-2m Firmware | >=3.0<4.1 | |
Siemens SCALANCE S627-2M |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2019-13926.
The SCALANCE S602, SCALANCE S612, SCALANCE S623, and SCALANCE S627-2M devices with firmware versions >= V3.0 and < V4.1 are affected by this vulnerability.
The severity rating of this vulnerability is high with a CVSS score of 7.5.
This vulnerability can be exploited by sending specially crafted packets to port 443/tcp of the affected devices.
Siemens has released firmware updates to address this vulnerability. Please refer to the product advisories for more information.