Lucene search

K
nvd[email protected]NVD:CVE-2021-25668
HistoryApr 22, 2021 - 9:15 p.m.

CVE-2021-25668

2021-04-2221:15:10
CWE-122
CWE-787
web.nvd.nist.gov

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

61.6%

A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < 5.5.1), SCALANCE X201-3P IRT (All versions < 5.5.1), SCALANCE X201-3P IRT PRO (All versions < 5.5.1), SCALANCE X202-2 IRT (All versions < 5.5.1), SCALANCE X202-2P IRT (incl. SIPLUS NET variant) (All versions < 5.5.1), SCALANCE X202-2P IRT PRO (All versions < 5.5.1), SCALANCE X204 IRT (All versions < 5.5.1), SCALANCE X204 IRT PRO (All versions < 5.5.1), SCALANCE X204-2 (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE X204-2FM (All versions < V5.2.5), SCALANCE X204-2LD (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE X204-2LD TS (All versions < V5.2.5), SCALANCE X204-2TS (All versions < V5.2.5), SCALANCE X206-1 (All versions < V5.2.5), SCALANCE X206-1LD (All versions < V5.2.5), SCALANCE X208 (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE X208PRO (All versions < V5.2.5), SCALANCE X212-2 (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE X212-2LD (All versions < V5.2.5), SCALANCE X216 (All versions < V5.2.5), SCALANCE X224 (All versions < V5.2.5), SCALANCE XF201-3P IRT (All versions < 5.5.1), SCALANCE XF202-2P IRT (All versions < 5.5.1), SCALANCE XF204 (All versions < V5.2.5), SCALANCE XF204 IRT (All versions < 5.5.1), SCALANCE XF204-2 (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE XF204-2BA IRT (All versions < 5.5.1), SCALANCE XF206-1 (All versions < V5.2.5), SCALANCE XF208 (All versions < V5.2.5). Incorrect processing of POST requests in the webserver may result in write out of bounds in heap. An attacker might leverage this to cause denial-of-service on the device and potentially remotely execute code.

Affected configurations

NVD
Node
siemensscalance_x200-4p_irt_firmwareRange<5.5.1
AND
siemensscalance_x200-4p_irtMatch-
Node
siemensscalance_x201-3p_irt_firmwareRange<5.5.1
AND
siemensscalance_x201-3p_irtMatch-
Node
siemensscalance_x201-3p_irt_pro_firmwareRange<5.5.1
AND
siemensscalance_x201-3p_irt_proMatch-
Node
siemensscalance_x202-2_irt_firmwareRange<5.5.1
AND
siemensscalance_x202-2_irtMatch-
Node
siemensscalance_x202-2p_irt_pro_firmwareRange<5.5.1
AND
siemensscalance_x202-2p_irt_proMatch-
Node
siemensscalance_x204_irt_firmwareRange<5.5.1
AND
siemensscalance_x204_irtMatch-
Node
siemensscalance_x204_irt_pro_firmwareRange<5.5.1
AND
siemensscalance_x204_irt_proMatch-
Node
siemensscalance_x204-2_firmwareRange<5.2.5
AND
siemensscalance_x204-2Match-
Node
siemensscalance_x204-2fm_firmwareRange<5.2.5
AND
siemensscalance_x204-2fmMatch-
Node
siemensscalance_x204-2ld_firmwareRange<5.2.5
AND
siemensscalance_x204-2ldMatch-
Node
siemensscalance_x204-2ld_ts_firmwareRange<5.2.5
AND
siemensscalance_x204-2ld_tsMatch-
Node
siemensscalance_x204-2ts_firmwareRange<5.2.5
AND
siemensscalance_x204-2tsMatch-
Node
siemensscalance_x206-1_firmwareRange<5.2.5
AND
siemensscalance_x206-1Match-
Node
siemensscalance_x206-1ld_firmwareRange<5.2.5
AND
siemensscalance_x206-1ldMatch-
Node
siemensscalance_x208_firmwareRange<5.2.5
AND
siemensscalance_x208Match-
Node
siemensscalance_x208pro_firmwareRange<5.2.5
AND
siemensscalance_x208proMatch-
Node
siemensscalance_x212-2_firmwareRange<5.2.5
AND
siemensscalance_x212-2Match-
Node
siemensscalance_x212-2ld_firmwareRange<5.2.5
AND
siemensscalance_x212-2ldMatch-
Node
siemensscalance_x216_firmwareRange<5.2.5
AND
siemensscalance_x216Match-
Node
siemensscalance_x224_firmwareRange<5.2.5
AND
siemensscalance_x224Match-
Node
siemensscalance_xf201-3p_irt_firmwareRange<5.5.1
AND
siemensscalance_xf201-3p_irtMatch-
Node
siemensscalance_xf202-2p_irt_firmwareRange<5.5.1
AND
siemensscalance_xf202-2p_irtMatch-
Node
siemensscalance_xf204_firmwareRange<5.2.5
AND
siemensscalance_xf204Match-
Node
siemensscalance_xf204_irt_firmwareRange<5.5.1
AND
siemensscalance_xf204_irtMatch-
Node
siemensscalance_xf204-2_firmwareRange<5.2.5
AND
siemensscalance_xf204-2Match-
Node
siemensscalance_xf204-2ba_irt_firmwareRange<5.5.1
AND
siemensscalance_xf204-2ba_irtMatch-
Node
siemensscalance_xf206-1_firmwareRange<5.2.5
AND
siemensscalance_xf206-1Match-
Node
siemensscalance_xf208_firmwareRange<5.2.5
AND
siemensscalance_xf208Match-
Node
siemensscalance_x202-2p_irt_firmwareRange<5.5.1
AND
siemensscalance_x202-2p_irtMatch-

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

61.6%

Related for NVD:CVE-2021-25668