CVE-2022-25752

A vulnerability has been identified in SCALANCE X302-7 EEC (230V), SCALANCE X302-7 EEC (230V, coated), SCALANCE X302-7 EEC (24V), SCALANCE X302-7 EEC (24V, coated), SCALANCE X302-7 EEC (2x 230V), SCALANCE X302-7 EEC (2x 230V, coated), SCALANCE X302-7 EEC (2x 24V), SCALANCE X302-7 EEC (2x 24V, coated), SCALANCE X304-2FE, SCALANCE X306-1LD FE, SCALANCE X307-2 EEC (230V), SCALANCE X307-2 EEC (230V, coated), SCALANCE X307-2 EEC (24V), SCALANCE X307-2 EEC (24V, coated), SCALANCE X307-2 EEC (2x 230V), SCALANCE X307-2 EEC (2x 230V, coated), SCALANCE X307-2 EEC (2x 24V), SCALANCE X307-2 EEC (2x 24V, coated), SCALANCE X307-3, SCALANCE X307-3, SCALANCE X307-3LD, SCALANCE X307-3LD, SCALANCE X308-2, SCALANCE X308-2, SCALANCE X308-2LD, SCALANCE X308-2LD, SCALANCE X308-2LH, SCALANCE X308-2LH, SCALANCE X308-2LH+, SCALANCE X308-2LH+, SCALANCE X308-2M, SCALANCE X308-2M, SCALANCE X308-2M PoE, SCALANCE X308-2M PoE, SCALANCE X308-2M TS, SCALANCE X308-2M TS, SCALANCE X310, SCALANCE X310, SCALANCE X310FE, SCALANCE X310FE, SCALANCE X320-1 FE, SCALANCE X320-1-2LD FE, SCALANCE X408-2, SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M TS (24V), SCALANCE XR324-12M TS (24V), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M PoE (230V, ports on front), SCALANCE XR324-4M PoE (230V, ports on rear), SCALANCE XR324-4M PoE (24V, ports on front), SCALANCE XR324-4M PoE (24V, ports on rear), SCALANCE XR324-4M PoE TS (24V, ports on front), SIPLUS NET SCALANCE X308-2. The webserver of affected devices calculates session ids and nonces in an insecure manner. This could allow an unauthenticated remote attacker to brute-force session ids and hijack existing sessions.
References
Link Resource
https://cert-portal.siemens.com/productcert/pdf/ssa-836527.pdf Mitigation Patch Vendor Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-836527.pdf Mitigation Patch Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:siemens:scalance_x302-7eec_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_x302-7eec:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:siemens:scalance_x304-2fe_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_x304-2fe:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:siemens:scalance_x306-1ldfe_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_x306-1ldfe:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:siemens:scalance_x307-2eec_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_x307-2eec:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:siemens:scalance_x307-3_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_x307-3:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:siemens:scalance_x307-3ld_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_x307-3ld:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:siemens:scalance_x308-2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_x308-2:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:siemens:scalance_x308-2ld_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_x308-2ld:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:siemens:scalance_x308-2lh_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_x308-2lh:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:siemens:scalance_x308-2lh\+_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_x308-2lh\+:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:siemens:scalance_x308-2m_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_x308-2m:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:siemens:scalance_x308-2m_poe_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_x308-2m_poe:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:siemens:scalance_x308-2m_ts_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_x308-2m_ts:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:siemens:scalance_x310_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_x310:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:siemens:scalance_x310fe_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_x310fe:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:siemens:scalance_x320-1fe_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_x320-1fe:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
cpe:2.3:o:siemens:scalance_x320-1-2ldfe_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_x320-1-2ldfe:-:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
cpe:2.3:o:siemens:scalance_x408-2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_x408-2:-:*:*:*:*:*:*:*

Configuration 19 (hide)

AND
cpe:2.3:o:siemens:scalance_xr324-4m_eec_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_xr324-4m_eec:-:*:*:*:*:*:*:*

Configuration 20 (hide)

AND
cpe:2.3:o:siemens:scalance_xr324-4m_poe_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_xr324-4m_poe:-:*:*:*:*:*:*:*

Configuration 21 (hide)

AND
cpe:2.3:o:siemens:scalance_xr324-4m_poe_ts_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_xr324-4m_poe_ts:-:*:*:*:*:*:*:*

Configuration 22 (hide)

AND
cpe:2.3:o:siemens:scalance_xr324-12m_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_xr324-12m:-:*:*:*:*:*:*:*

Configuration 23 (hide)

AND
cpe:2.3:o:siemens:scalance_xr324-12m_ts_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_xr324-12m_ts:-:*:*:*:*:*:*:*

Configuration 24 (hide)

AND
cpe:2.3:o:siemens:siplus_net_scalance_x308-2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:siplus_net_scalance_x308-2:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:52

Type Values Removed Values Added
References () https://cert-portal.siemens.com/productcert/pdf/ssa-836527.pdf - Mitigation, Patch, Vendor Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-836527.pdf - Mitigation, Patch, Vendor Advisory

Information

Published : 2022-04-12 09:15

Updated : 2024-11-21 06:52


NVD link : CVE-2022-25752

Mitre link : CVE-2022-25752

CVE.ORG link : CVE-2022-25752


JSON object : View

Products Affected

siemens

  • scalance_x308-2ld_firmware
  • scalance_x310fe
  • siplus_net_scalance_x308-2
  • scalance_x308-2_firmware
  • scalance_x408-2_firmware
  • scalance_x320-1-2ldfe
  • scalance_x307-3ld_firmware
  • scalance_xr324-12m_firmware
  • scalance_x304-2fe_firmware
  • scalance_x308-2lh\+_firmware
  • scalance_x320-1fe
  • scalance_x307-2eec_firmware
  • scalance_xr324-12m_ts
  • scalance_x302-7eec
  • scalance_x308-2
  • scalance_x308-2m_poe
  • scalance_xr324-4m_eec_firmware
  • scalance_x308-2m_ts
  • scalance_x308-2m_poe_firmware
  • siplus_net_scalance_x308-2_firmware
  • scalance_x308-2lh
  • scalance_x320-1-2ldfe_firmware
  • scalance_xr324-4m_poe_ts_firmware
  • scalance_x306-1ldfe_firmware
  • scalance_x310_firmware
  • scalance_xr324-4m_eec
  • scalance_x308-2lh_firmware
  • scalance_x308-2m
  • scalance_x304-2fe
  • scalance_x308-2lh\+
  • scalance_x310
  • scalance_x307-2eec
  • scalance_x320-1fe_firmware
  • scalance_x308-2ld
  • scalance_xr324-12m
  • scalance_xr324-12m_ts_firmware
  • scalance_x308-2m_ts_firmware
  • scalance_x307-3_firmware
  • scalance_x302-7eec_firmware
  • scalance_xr324-4m_poe_firmware
  • scalance_x308-2m_firmware
  • scalance_x307-3
  • scalance_xr324-4m_poe_ts
  • scalance_x306-1ldfe
  • scalance_x310fe_firmware
  • scalance_x408-2
  • scalance_xr324-4m_poe
  • scalance_x307-3ld
CWE
CWE-330

Use of Insufficiently Random Values