First published: Tue May 09 2023(Updated: )
A vulnerability has been identified in SCALANCE LPE9403 (All versions < V2.1). A path traversal vulnerability was found in the `deviceinfo` binary via the `mac` parameter. This could allow an authenticated attacker with access to the SSH interface on the affected device to read the contents of any file named `address`.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Scalance Lpe9403 Firmware | <2.1 | |
Siemens Scalance Lpe9403 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-27409 is low.
CVE-2023-27409 affects SCALANCE LPE9403 (All versions < V2.1) through a path traversal vulnerability.
CVE-2023-27409 allows an authenticated attacker with access to the SSH interface to read the contents of any file on the affected device.
To fix CVE-2023-27409, update SCALANCE LPE9403 firmware to version V2.1 or above.
More information about CVE-2023-27409 can be found in the Siemens ProductCERT advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-325383.pdf