A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0), SCALANCE X204RNA (HSR) (All versions), SCALANCE X204RNA (PRP) (All versions), SCALANCE X204RNA EEC (HSR) (All versions), SCALANCE X204RNA EEC (PRP) (All versions), SCALANCE X204RNA EEC (PRP/HSR) (All versions). The device contains a vulnerability that could allow an attacker to trigger a denial-of-service condition by sending large message packages repeatedly to the telnet service. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the device.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-100232.pdf | Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-100232.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 04:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-100232.pdf - Vendor Advisory |
Information
Published : 2019-08-13 19:15
Updated : 2024-11-21 04:20
NVD link : CVE-2019-10942
Mitre link : CVE-2019-10942
CVE.ORG link : CVE-2019-10942
JSON object : View
Products Affected
siemens
- scalance_x-200
- scalance_x-200irt_firmware
- scalance_x-200rna
- scalance_x-200rna_firmware
- scalance_x-200irt
- scalance_x-200_firmware
CWE
CWE-400
Uncontrolled Resource Consumption