CVE-2019-13924
Summary
| CVE | CVE-2019-13924 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-02-11 16:15:00 UTC |
| Updated | 2022-12-13 17:15:00 UTC |
| Description | A vulnerability has been identified in SCALANCE S602 (All versions < V4.1), SCALANCE S612 (All versions < V4.1), SCALANCE S623 (All versions < V4.1), SCALANCE S627-2M (All versions < V4.1), SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < 5.2.4), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0), SCALANCE X-200RNA switch family (All versions < V3.2.7), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions < 4.1.3). The device does not send the X-Frame-Option Header in the administrative web interface, which makes it vulnerable to Clickjacking attacks. The security vulnerability could be exploited by an attacker that is able to trick an administrative user with a valid session on the target device into clicking on a website controlled by the attacker. The vulnerability could allow an attacker to perform administrative actions via the web interface. |
Risk And Classification
Problem Types: CWE-693
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Siemens | Scalance X-200irt | - | All | All | All |
| Hardware | Siemens | Scalance X-200irt | - | All | All | All |
| Operating System | Siemens | Scalance X-200irt Firmware | All | All | All | All |
| Operating System | Siemens | Scalance X-200irt Firmware | All | All | All | All |
| Hardware | Siemens | Scalance X-300 | - | All | All | All |
| Hardware | Siemens | Scalance X-300 | - | All | All | All |
| Operating System | Siemens | Scalance X-300 Firmware | All | All | All | All |
| Operating System | Siemens | Scalance X-300 Firmware | All | All | All | All |
| Hardware | Siemens | Scalance Xb-200 | - | All | All | All |
| Hardware | Siemens | Scalance Xb-200 | - | All | All | All |
| Operating System | Siemens | Scalance Xb-200 Firmware | All | All | All | All |
| Operating System | Siemens | Scalance Xb-200 Firmware | All | All | All | All |
| Hardware | Siemens | Scalance Xc-200 | - | All | All | All |
| Hardware | Siemens | Scalance Xc-200 | - | All | All | All |
| Operating System | Siemens | Scalance Xc-200 Firmware | All | All | All | All |
| Operating System | Siemens | Scalance Xc-200 Firmware | All | All | All | All |
| Hardware | Siemens | Scalance Xf-200 | - | All | All | All |
| Hardware | Siemens | Scalance Xf-200 | - | All | All | All |
| Operating System | Siemens | Scalance Xf-200 Firmware | All | All | All | All |
| Operating System | Siemens | Scalance Xf-200 Firmware | All | All | All | All |
| Hardware | Siemens | Scalance Xp-200 | - | All | All | All |
| Hardware | Siemens | Scalance Xp-200 | - | All | All | All |
| Operating System | Siemens | Scalance Xp-200 Firmware | All | All | All | All |
| Operating System | Siemens | Scalance Xp-200 Firmware | All | All | All | All |
| Hardware | Siemens | Scalance Xr-300 | - | All | All | All |
| Hardware | Siemens | Scalance Xr-300 | - | All | All | All |
| Hardware | Siemens | Scalance Xr-300wg | - | All | All | All |
| Hardware | Siemens | Scalance Xr-300wg | - | All | All | All |
| Operating System | Siemens | Scalance Xr-300wg Firmware | All | All | All | All |
| Operating System | Siemens | Scalance Xr-300wg Firmware | All | All | All | All |
| Operating System | Siemens | Scalance Xr-300 Firmware | All | All | All | All |
| Operating System | Siemens | Scalance Xr-300 Firmware | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| cert-portal.siemens.com/productcert/pdf/ssa-951513.pdf | MISC | cert-portal.siemens.com | Vendor Advisory |
| Siemens SCALANCE X Switches | CISA | MISC | www.us-cert.gov | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.