The authentication implementation in the web server on Siemens SCALANCE X-200 switches with firmware before 5.0.0 does not use a sufficient source of entropy for generating values of random numbers, which makes it easier for remote attackers to hijack sessions by predicting a value.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://ics-cert.us-cert.gov/advisories/ICSA-13-254-01 - US Government Resource | |
References | () http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-850708.pdf - Vendor Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-850708.pdf - |
Information
Published : 2013-09-17 12:04
Updated : 2024-11-21 01:57
NVD link : CVE-2013-5709
Mitre link : CVE-2013-5709
CVE.ORG link : CVE-2013-5709
JSON object : View
Products Affected
siemens
- scalance_x201-3p_irt
- scalance_x-200
- scalance_xf-200
- scalance_x-200_series_firmware
- scalance_x-200rna
- scalance_x202-2p_irt
- scalance_x202-2irt
- scalance_x204irt
- scalance_x200-4p_irt
CWE
CWE-189
Numeric Errors