CWE
79 80
Advisory Published
Updated

CVE-2022-25756: XSS

First published: Tue Apr 12 2022(Updated: )

A vulnerability has been identified in SCALANCE X302-7 EEC (230V), SCALANCE X302-7 EEC (230V, coated), SCALANCE X302-7 EEC (24V), SCALANCE X302-7 EEC (24V, coated), SCALANCE X302-7 EEC (2x 230V), SCALANCE X302-7 EEC (2x 230V, coated), SCALANCE X302-7 EEC (2x 24V), SCALANCE X302-7 EEC (2x 24V, coated), SCALANCE X304-2FE, SCALANCE X306-1LD FE, SCALANCE X307-2 EEC (230V), SCALANCE X307-2 EEC (230V, coated), SCALANCE X307-2 EEC (24V), SCALANCE X307-2 EEC (24V, coated), SCALANCE X307-2 EEC (2x 230V), SCALANCE X307-2 EEC (2x 230V, coated), SCALANCE X307-2 EEC (2x 24V), SCALANCE X307-2 EEC (2x 24V, coated), SCALANCE X307-3, SCALANCE X307-3, SCALANCE X307-3LD, SCALANCE X307-3LD, SCALANCE X308-2, SCALANCE X308-2, SCALANCE X308-2LD, SCALANCE X308-2LD, SCALANCE X308-2LH, SCALANCE X308-2LH, SCALANCE X308-2LH+, SCALANCE X308-2LH+, SCALANCE X308-2M, SCALANCE X308-2M, SCALANCE X308-2M PoE, SCALANCE X308-2M PoE, SCALANCE X308-2M TS, SCALANCE X308-2M TS, SCALANCE X310, SCALANCE X310, SCALANCE X310FE, SCALANCE X310FE, SCALANCE X320-1 FE, SCALANCE X320-1-2LD FE, SCALANCE X408-2, SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M TS (24V), SCALANCE XR324-12M TS (24V), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M PoE (230V, ports on front), SCALANCE XR324-4M PoE (230V, ports on rear), SCALANCE XR324-4M PoE (24V, ports on front), SCALANCE XR324-4M PoE (24V, ports on rear), SCALANCE XR324-4M PoE TS (24V, ports on front), SIPLUS NET SCALANCE X308-2. The integrated web server could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link. This can be used by an attacker to trigger a malicious request on the affected device.

Credit: productcert@siemens.com

Affected SoftwareAffected VersionHow to fix
Siemens Scalance X302-7eec Firmware<4.1.4
Siemens SCALANCE X302-7EEC
Siemens Scalance X304-2fe Firmware<4.1.4
Siemens Scalance X304-2fe
Siemens Scalance X306-1ldfe Firmware<4.1.4
Siemens Scalance X306-1ldfe
Siemens Scalance X307-2eec Firmware<4.1.4
Siemens Scalance X307-2eec
Siemens Scalance X307-3 Firmware<4.1.4
Siemens Scalance X307-3
Siemens Scalance X307-3ld Firmware<4.1.4
Siemens Scalance X307-3ld
Siemens Scalance X308-2 Firmware<4.1.4
Siemens Scalance X308-2
Siemens Scalance X308-2ld Firmware<4.1.4
Siemens Scalance X308-2ld
Siemens Scalance X308-2lh Firmware<4.1.4
Siemens Scalance X308-2lh
Siemens Scalance X308-2lh\+ Firmware<4.1.4
Siemens Scalance X308-2lh\+
Siemens Scalance X308-2m Firmware<4.1.4
Siemens Scalance X308-2m
Siemens Scalance X308-2m Poe Firmware
Siemens Scalance X308-2m Poe
Siemens Scalance X308-2m Ts Firmware<4.1.4
Siemens Scalance X308-2m Ts
Siemens Scalance X310 Firmware<4.1.4
Siemens Scalance X310
Siemens Scalance X310fe Firmware<4.1.4
Siemens Scalance X310fe
Siemens Scalance X320-1fe Firmware<4.1.4
Siemens Scalance X320-1fe
Siemens Scalance X320-1-2ldfe Firmware<4.1.4
Siemens Scalance X320-1-2ldfe
Siemens Scalance X408-2 Firmware<4.1.4
Siemens Scalance X408-2
Siemens Scalance Xr324-4m Eec Firmware<4.1.4
Siemens Scalance Xr324-4m Eec
Siemens Scalance Xr324-4m Poe Firmware<4.1.4
Siemens Scalance Xr324-4m Poe
Siemens Scalance Xr324-4m Poe Ts Firmware<4.1.4
Siemens Scalance Xr324-4m Poe Ts
Siemens Scalance Xr324-12m Firmware<4.1.4
Siemens Scalance Xr324-12m
Siemens Scalance Xr324-12m Ts Firmware<4.1.4
Siemens Scalance Xr324-12m Ts
Siemens Siplus Net Scalance X308-2 Firmware<4.1.4
Siemens Siplus Net Scalance X308-2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID for this vulnerability?

    The vulnerability ID for this vulnerability is CVE-2022-25756.

  • What is the severity of CVE-2022-25756?

    The severity of CVE-2022-25756 is medium with a severity value of 6.1.

  • Which software products are affected by CVE-2022-25756?

    The vulnerability affects Siemens SCALANCE X302-7 EEC (230V), SCALANCE X302-7 EEC (230V, coated), SCALANCE X302-7 EEC (24V), SCALANCE X302-7 EEC (24V, coated), SCALANCE X302-7 EEC (2x 230V), SCALANCE X302-7 EEC (2x 230V, coated), SCALANCE X302-7 EEC (2x 24V), SCALANCE X302-7 EEC (2x 24V, coated), and other related software products.

  • What is the recommended solution for CVE-2022-25756?

    Apply the latest firmware update provided by Siemens to patch the vulnerability.

  • Where can I find more information about CVE-2022-25756?

    You can find more information about CVE-2022-25756 in the official Siemens product security advisory at the following link: [Siemens Product Security Advisory](https://cert-portal.siemens.com/productcert/pdf/ssa-836527.pdf).

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203