Siemens

Scalance Xr526-8c Firmware

8 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.11%
  • Published 13.12.2022 16:15:25
  • Last modified 14.01.2025 11:15:10

Affected devices use a weak encryption scheme to encrypt the debug zip file. This could allow an authenticated attacker to decrypt the contents of the file and retrieve debug information about the system.

  • EPSS 0.07%
  • Published 13.12.2022 16:15:25
  • Last modified 14.01.2025 11:15:11

Affected devices store the CLI user passwords encrypted in flash memory. Attackers with physical access to the device could retrieve the file and decrypt the CLI user passwords.

  • EPSS 0.28%
  • Published 13.12.2022 16:15:25
  • Last modified 14.01.2025 11:15:11

Affected devices do not check the TFTP blocksize correctly. This could allow an authenticated attacker to read from an uninitialized buffer that potentially contains previously allocated data.

  • EPSS 0.51%
  • Published 10.08.2022 12:15:12
  • Last modified 21.11.2024 07:12:47

Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell.

  • EPSS 1.26%
  • Published 10.08.2022 12:15:12
  • Last modified 21.11.2024 07:12:47

Affected devices do not properly handle the renegotiation of SSL/TLS parameters. This could allow an unauthenticated remote attacker to bypass the TCP brute force prevention and lead to a denial of service condition for the duration of the attack.

  • EPSS 0.37%
  • Published 10.08.2022 12:15:12
  • Last modified 21.11.2024 07:12:47

Affected devices do not properly sanitize data introduced by an user when rendering the web interface. This could allow an authenticated remote attacker with administrative privileges to inject code and lead to a DOM-based XSS.

  • EPSS 0.35%
  • Published 14.06.2022 10:15:17
  • Last modified 21.11.2024 06:14:48

A vulnerability has been identified in SCALANCE XM408-4C (All versions < V6.5), SCALANCE XM408-4C (L3 int.) (All versions < V6.5), SCALANCE XM408-8C (All versions < V6.5), SCALANCE XM408-8C (L3 int.) (All versions < V6.5), SCALANCE XM416-4C (All vers...

  • EPSS 13.18%
  • Published 25.03.2021 15:15:13
  • Last modified 21.11.2024 06:21:33

An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but incl...