7.1
CVE-2020-15799
- EPSS 0.49%
- Published 12.01.2021 21:15:16
- Last modified 21.11.2024 05:06:12
- Source productcert@siemens.com
- Teams watchlist Login
- Open Login
A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0). The vulnerability could allow an unauthenticated attacker to reboot the device over the network by using special urls from integrated web server of the affected products.
Data is provided by the National Vulnerability Database (NVD)
Siemens ≫ Scalance X200-4pirt Firmware Version < 5.5.0
Siemens ≫ Scalance X201-3pirt Firmware Version < 5.5.0
Siemens ≫ Scalance X202-2irt Firmware Version < 5.5.0
Siemens ≫ Scalance X202-2pirt Firmware Version < 5.5.0
Siemens ≫ Scalance X202-2pirt Siplus Net Firmware Version < 5.5.0
Siemens ≫ Scalance X204irt Firmware Version < 5.5.0
Siemens ≫ Scalance Xb205-3 Firmware Version < 5.2.5
Siemens ≫ Scalance Xb205-3ld Firmware Version < 5.2.5
Siemens ≫ Scalance Xb208 Firmware Version < 5.2.5
Siemens ≫ Scalance Xb213-3 Firmware Version < 5.2.5
Siemens ≫ Scalance Xb213-3ld Firmware Version < 5.2.5
Siemens ≫ Scalance Xb216 Firmware Version < 5.2.5
Siemens ≫ Scalance Xc206-2 Firmware Version < 5.2.5
Siemens ≫ Scalance Xc206-2g Poe Firmware Version < 5.2.5
Siemens ≫ Scalance Xc206-2g Poe Eec Firmware Version < 5.2.5
Siemens ≫ Scalance Xc206-2sfp Firmware Version < 5.2.5
Siemens ≫ Scalance Xc206-2sfp Eec Firmware Version < 5.2.5
Siemens ≫ Scalance Xc206-2sfp G Firmware Version < 5.2.5
Siemens ≫ Scalance Xc206-2sfp G (e/ip) Firmware Version < 5.2.5
Siemens ≫ Scalance Xc206-2sfp G Eec Firmware Version < 5.2.5
Siemens ≫ Scalance Xc208 Firmware Version < 5.2.5
Siemens ≫ Scalance Xc208eec Firmware Version < 5.2.5
Siemens ≫ Scalance Xc208g Firmware Version < 5.2.5
Siemens ≫ Scalance Xc208g (e/ip) Firmware Version < 5.2.5
Siemens ≫ Scalance Xc208g Eec Firmware Version < 5.2.5
Siemens ≫ Scalance Xc208g Poe Firmware Version < 5.2.5
Siemens ≫ Scalance Xc216 Firmware Version < 5.2.5
Siemens ≫ Scalance Xc216-4c Firmware Version < 5.2.5
Siemens ≫ Scalance Xc216-4c G Firmware Version < 5.2.5
Siemens ≫ Scalance Xc216-4c G (e/ip) Firmware Version < 5.2.5
Siemens ≫ Scalance Xc216-4c G Eec Firmware Version < 5.2.5
Siemens ≫ Scalance Xc216eec Firmware Version < 5.2.5
Siemens ≫ Scalance Xc224-4c G Firmware Version < 5.2.5
Siemens ≫ Scalance Xc224-4c G (e/ip) Firmware Version < 5.2.5
Siemens ≫ Scalance Xc224-4c G Eec Firmware Version < 5.2.5
Siemens ≫ Scalance Xc224 Firmware Version < 5.2.5
Siemens ≫ Scalance Xf201-3p Irt Firmware Version < 5.2.5
Siemens ≫ Scalance Xf202-2p Irt Firmware Version < 5.2.5
Siemens ≫ Scalance Xf204 Firmware Version < 5.2.5
Siemens ≫ Scalance Xf204-2 Firmware Version < 5.2.5
Siemens ≫ Scalance Xf204-2ba Dna Firmware Version < 5.2.5
Siemens ≫ Scalance Xf204-2ba Irt Firmware Version < 5.2.5
Siemens ≫ Scalance Xf204 Dna Firmware Version < 5.2.5
Siemens ≫ Scalance Xf204irt Firmware Version < 5.2.5
Siemens ≫ Scalance Xf206-1 Firmware Version < 5.2.5
Siemens ≫ Scalance Xf208 Firmware Version < 5.2.5
Siemens ≫ Scalance Xp208 Firmware Version < 5.2.5
Siemens ≫ Scalance Xp208 (eip) Firmware Version < 5.2.5
Siemens ≫ Scalance Xp208eec Firmware Version < 5.2.5
Siemens ≫ Scalance Xp208poe Eec Firmware Version < 5.2.5
Siemens ≫ Scalance Xp216 Firmware Version < 5.2.5
Siemens ≫ Scalance Xp216 (eip) Firmware Version < 5.2.5
Siemens ≫ Scalance Xp216eec Firmware Version < 5.2.5
Siemens ≫ Scalance Xp216poe Eec Firmware Version < 5.2.5
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.49% | 0.645 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
|
nvd@nist.gov | 7.1 | 8.6 | 6.9 |
AV:N/AC:M/Au:N/C:N/I:N/A:C
|
CWE-306 Missing Authentication for Critical Function
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.