A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < 5.5.1), SCALANCE X201-3P IRT (All versions < 5.5.1), SCALANCE X201-3P IRT PRO (All versions < 5.5.1), SCALANCE X202-2 IRT (All versions < 5.5.1), SCALANCE X202-2P IRT (incl. SIPLUS NET variant) (All versions < 5.5.1), SCALANCE X202-2P IRT PRO (All versions < 5.5.1), SCALANCE X204 IRT (All versions < 5.5.1), SCALANCE X204 IRT PRO (All versions < 5.5.1), SCALANCE X204-2 (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE X204-2FM (All versions < V5.2.5), SCALANCE X204-2LD (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE X204-2LD TS (All versions < V5.2.5), SCALANCE X204-2TS (All versions < V5.2.5), SCALANCE X206-1 (All versions < V5.2.5), SCALANCE X206-1LD (All versions < V5.2.5), SCALANCE X208 (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE X208PRO (All versions < V5.2.5), SCALANCE X212-2 (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE X212-2LD (All versions < V5.2.5), SCALANCE X216 (All versions < V5.2.5), SCALANCE X224 (All versions < V5.2.5), SCALANCE XF201-3P IRT (All versions < 5.5.1), SCALANCE XF202-2P IRT (All versions < 5.5.1), SCALANCE XF204 (All versions < V5.2.5), SCALANCE XF204 IRT (All versions < 5.5.1), SCALANCE XF204-2 (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE XF204-2BA IRT (All versions < 5.5.1), SCALANCE XF206-1 (All versions < V5.2.5), SCALANCE XF208 (All versions < V5.2.5). Incorrect processing of POST requests in the webserver may result in write out of bounds in heap. An attacker might leverage this to cause denial-of-service on the device and potentially remotely execute code.

Subscriptions

Vendors Products
Siemens Subscribe
Scalance X200-4p Irt Subscribe
Scalance X200-4p Irt Firmware Subscribe
Scalance X201-3p Irt Subscribe
Scalance X201-3p Irt Firmware Subscribe
Scalance X201-3p Irt Pro Subscribe
Scalance X201-3p Irt Pro Firmware Subscribe
Scalance X202-2 Irt Subscribe
Scalance X202-2 Irt Firmware Subscribe
Scalance X202-2p Irt Subscribe
Scalance X202-2p Irt Firmware Subscribe
Scalance X202-2p Irt Pro Subscribe
Scalance X202-2p Irt Pro Firmware Subscribe
Scalance X204-2 Subscribe
Scalance X204-2 Firmware Subscribe
Scalance X204-2fm Subscribe
Scalance X204-2fm Firmware Subscribe
Scalance X204-2ld Subscribe
Scalance X204-2ld Firmware Subscribe
Scalance X204-2ld Ts Subscribe
Scalance X204-2ld Ts Firmware Subscribe
Scalance X204-2ts Subscribe
Scalance X204-2ts Firmware Subscribe
Scalance X204 Irt Subscribe
Scalance X204 Irt Firmware Subscribe
Scalance X204 Irt Pro Subscribe
Scalance X204 Irt Pro Firmware Subscribe
Scalance X206-1 Subscribe
Scalance X206-1 Firmware Subscribe
Scalance X206-1ld Subscribe
Scalance X206-1ld Firmware Subscribe
Scalance X208 Subscribe
Scalance X208 Firmware Subscribe
Scalance X208pro Subscribe
Scalance X208pro Firmware Subscribe
Scalance X212-2 Subscribe
Scalance X212-2 Firmware Subscribe
Scalance X212-2ld Subscribe
Scalance X212-2ld Firmware Subscribe
Scalance X216 Subscribe
Scalance X216 Firmware Subscribe
Scalance X224 Subscribe
Scalance X224 Firmware Subscribe
Scalance Xf201-3p Irt Subscribe
Scalance Xf201-3p Irt Firmware Subscribe
Scalance Xf202-2p Irt Subscribe
Scalance Xf202-2p Irt Firmware Subscribe
Scalance Xf204 Subscribe
Scalance Xf204-2 Subscribe
Scalance Xf204-2 Firmware Subscribe
Scalance Xf204-2ba Irt Subscribe
Scalance Xf204-2ba Irt Firmware Subscribe
Scalance Xf204 Firmware Subscribe
Scalance Xf204 Irt Subscribe
Scalance Xf204 Irt Firmware Subscribe
Scalance Xf206-1 Subscribe
Scalance Xf206-1 Firmware Subscribe
Scalance Xf208 Subscribe
Scalance Xf208 Firmware Subscribe

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-12560 A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < 5.5.1), SCALANCE X201-3P IRT (All versions < 5.5.1), SCALANCE X201-3P IRT PRO (All versions < 5.5.1), SCALANCE X202-2 IRT (All versions < 5.5.1), SCALANCE X202-2P IRT (incl. SIPLUS NET variant) (All versions < 5.5.1), SCALANCE X202-2P IRT PRO (All versions < 5.5.1), SCALANCE X204 IRT (All versions < 5.5.1), SCALANCE X204 IRT PRO (All versions < 5.5.1), SCALANCE X204-2 (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE X204-2FM (All versions < V5.2.5), SCALANCE X204-2LD (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE X204-2LD TS (All versions < V5.2.5), SCALANCE X204-2TS (All versions < V5.2.5), SCALANCE X206-1 (All versions < V5.2.5), SCALANCE X206-1LD (All versions < V5.2.5), SCALANCE X208 (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE X208PRO (All versions < V5.2.5), SCALANCE X212-2 (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE X212-2LD (All versions < V5.2.5), SCALANCE X216 (All versions < V5.2.5), SCALANCE X224 (All versions < V5.2.5), SCALANCE XF201-3P IRT (All versions < 5.5.1), SCALANCE XF202-2P IRT (All versions < 5.5.1), SCALANCE XF204 (All versions < V5.2.5), SCALANCE XF204 IRT (All versions < 5.5.1), SCALANCE XF204-2 (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE XF204-2BA IRT (All versions < 5.5.1), SCALANCE XF206-1 (All versions < V5.2.5), SCALANCE XF208 (All versions < V5.2.5). Incorrect processing of POST requests in the webserver may result in write out of bounds in heap. An attacker might leverage this to cause denial-of-service on the device and potentially remotely execute code.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2024-08-03T20:11:27.504Z

Reserved: 2021-01-21T00:00:00.000Z

Link: CVE-2021-25668

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-04-22T21:15:10.110

Modified: 2024-11-21T05:55:15.517

Link: CVE-2021-25668

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses