A vulnerability has been identified in SCALANCE S602 (All versions < V4.1), SCALANCE S612 (All versions < V4.1), SCALANCE S623 (All versions < V4.1), SCALANCE S627-2M (All versions < V4.1), SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < 5.2.4), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0), SCALANCE X-200RNA switch family (All versions < V3.2.7), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions < 4.1.3). The device does not send the X-Frame-Option Header in the administrative web interface, which makes it vulnerable to Clickjacking attacks. The security vulnerability could be exploited by an attacker that is able to trick an administrative user with a valid session on the target device into clicking on a website controlled by the attacker. The vulnerability could allow an attacker to perform administrative actions via the web interface.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Siemens
Subscribe
|
Scalance X-200irt
Subscribe
Scalance X-200irt Firmware
Subscribe
Scalance X-300
Subscribe
Scalance X-300 Firmware
Subscribe
Scalance Xb-200
Subscribe
Scalance Xb-200 Firmware
Subscribe
Scalance Xc-200
Subscribe
Scalance Xc-200 Firmware
Subscribe
Scalance Xf-200
Subscribe
Scalance Xf-200 Firmware
Subscribe
Scalance Xp-200
Subscribe
Scalance Xp-200 Firmware
Subscribe
Scalance Xr-300
Subscribe
Scalance Xr-300 Firmware
Subscribe
Scalance Xr-300wg
Subscribe
Scalance Xr-300wg Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-5194 | A vulnerability has been identified in SCALANCE S602 (All versions < V4.1), SCALANCE S612 (All versions < V4.1), SCALANCE S623 (All versions < V4.1), SCALANCE S627-2M (All versions < V4.1), SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < 5.2.4), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0), SCALANCE X-200RNA switch family (All versions < V3.2.7), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions < 4.1.3). The device does not send the X-Frame-Option Header in the administrative web interface, which makes it vulnerable to Clickjacking attacks. The security vulnerability could be exploited by an attacker that is able to trick an administrative user with a valid session on the target device into clicking on a website controlled by the attacker. The vulnerability could allow an attacker to perform administrative actions via the web interface. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2024-08-05T00:05:43.919Z
Reserved: 2019-07-18T00:00:00
Link: CVE-2019-13924
No data.
Status : Modified
Published: 2020-02-11T16:15:14.430
Modified: 2024-11-21T04:25:42.543
Link: CVE-2019-13924
No data.
OpenCVE Enrichment
No data.
EUVD