Description
A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT PRO (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2P IRT (All versions < V5.5.2), SCALANCE X202-2P IRT PRO (All versions < V5.5.2), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT PRO (All versions < V5.5.2), SCALANCE XF201-3P IRT (All versions < V5.5.2), SCALANCE XF202-2P IRT (All versions < V5.5.2), SCALANCE XF204-2BA IRT (All versions < V5.5.2), SCALANCE XF204IRT (All versions < V5.5.2), SIPLUS NET SCALANCE X202-2P IRT (All versions < V5.5.2). The SSH server on affected devices is configured to offer weak ciphers by default.
This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data
passed over the connection between legitimate clients and the affected device.
This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data
passed over the connection between legitimate clients and the affected device.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-32658 | A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT PRO (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2P IRT (All versions < V5.5.2), SCALANCE X202-2P IRT PRO (All versions < V5.5.2), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT PRO (All versions < V5.5.2), SCALANCE XF201-3P IRT (All versions < V5.5.2), SCALANCE XF202-2P IRT (All versions < V5.5.2), SCALANCE XF204-2BA IRT (All versions < V5.5.2), SCALANCE XF204IRT (All versions < V5.5.2), SIPLUS NET SCALANCE X202-2P IRT (All versions < V5.5.2). The SSH server on affected devices is configured to offer weak ciphers by default. This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data passed over the connection between legitimate clients and the affected device. |
References
History
Fri, 07 Feb 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Siemens
Subscribe
Scalance X200-4p Irt
Subscribe
Scalance X200-4p Irt Firmware
Subscribe
Scalance X201-3p Irt
Subscribe
Scalance X201-3p Irt Firmware
Subscribe
Scalance X201-3p Irt Pro
Subscribe
Scalance X201-3p Irt Pro Firmware
Subscribe
Scalance X202-2irt
Subscribe
Scalance X202-2irt Firmware
Subscribe
Scalance X202-2p Irt
Subscribe
Scalance X202-2p Irt Firmware
Subscribe
Scalance X202-2p Irt Pro
Subscribe
Scalance X202-2p Irt Pro Firmware
Subscribe
Scalance X204irt
Subscribe
Scalance X204irt Firmware
Subscribe
Scalance X204irt Pro
Subscribe
Scalance X204irt Pro Firmware
Subscribe
Scalance Xf201-3p Irt
Subscribe
Scalance Xf201-3p Irt Firmware
Subscribe
Scalance Xf202-2p Irt
Subscribe
Scalance Xf202-2p Irt Firmware
Subscribe
Scalance Xf204-2ba Irt
Subscribe
Scalance Xf204-2ba Irt Firmware
Subscribe
Scalance Xf204irt
Subscribe
Scalance Xf204irt Firmware
Subscribe
Siplus Net Scalance X202-2p Irt
Subscribe
Siplus Net Scalance X202-2p Irt Firmware
Subscribe
Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2025-02-07T16:49:26.184Z
Reserved: 2023-03-30T12:04:26.539Z
Link: CVE-2023-29054
Updated: 2024-08-02T14:00:14.631Z
Status : Modified
Published: 2023-04-11T10:15:18.517
Modified: 2024-11-21T07:56:27.647
Link: CVE-2023-29054
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD