First published: Tue Dec 13 2022(Updated: )
A vulnerability has been identified in SCALANCE X204RNA (HSR) (All versions < V3.2.7), SCALANCE X204RNA (PRP) (All versions < V3.2.7), SCALANCE X204RNA EEC (HSR) (All versions < V3.2.7), SCALANCE X204RNA EEC (PRP) (All versions < V3.2.7), SCALANCE X204RNA EEC (PRP/HSR) (All versions < V3.2.7). The affected products are vulnerable to an "Exposure of Sensitive Information to an Unauthorized Actor" vulnerability by leaking sensitive data in the HTTP Referer.
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Siemens 6GK5204-0BA00-2GF2 | <3.2.7 | |
Siemens 6GK5204-0BA00-2GF2 | ||
All of | ||
Siemens 6GK5204-0BA00-2KB2 | <3.2.7 | |
Siemens 6GK5204-0BA00-2KB2 Firmware | ||
All of | ||
Siemens 6GK5204-0BS00-2NA3 | <3.2.7 | |
Siemens 6GK5204-0BS00-2NA3 Firmware | ||
All of | ||
Siemens 6GK5204-0BS00-3LA3 | <3.2.7 | |
Siemens 6GK5204-0BS00-3LA3 Firmware | ||
All of | ||
Siemens 6GK5204-0BS00-3PA3 | <3.2.7 | |
Siemens 6GK5204-0BS00-3PA3 Firmware | ||
Siemens 6GK5204-0BA00-2GF2 | <3.2.7 | |
Siemens 6GK5204-0BA00-2GF2 | ||
Siemens 6GK5204-0BA00-2KB2 | <3.2.7 | |
Siemens 6GK5204-0BA00-2KB2 Firmware | ||
Siemens 6GK5204-0BS00-2NA3 | <3.2.7 | |
Siemens 6GK5204-0BS00-2NA3 Firmware | ||
Siemens 6GK5204-0BS00-3LA3 | <3.2.7 | |
Siemens 6GK5204-0BS00-3LA3 Firmware | ||
Siemens 6GK5204-0BS00-3PA3 | <3.2.7 | |
Siemens 6GK5204-0BS00-3PA3 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-46355 is not explicitly stated but it affects multiple versions of Siemens SCALANCE devices.
To fix CVE-2022-46355, update the affected SCALANCE devices to version 3.2.7 or later.
CVE-2022-46355 affects all versions of SCALANCE X204RNA devices prior to version 3.2.7.
Yes, a patch in the form of a firmware update to version 3.2.7 is available to mitigate CVE-2022-46355.
CVE-2022-46355 impacts functionality related to network redundancy protocols in the affected SCALANCE devices.