QID 591031

Date Published: 2022-09-05

QID 591031: Siemens SCALANCE XM-400 and XR-500 Vulnerability (SSA-145224) (ICSA-22-167-10)

AFFECTED PRODUCTS
The following versions of SCALANCE X industrial switches are affected:
XM408-4C: All versions prior to v6.5
XM408-4C (L3 int.): All versions prior to v6.5
XM408-8C: All versions prior to v6.5
XM408-8C (L3 int.): All versions prior to v6.5
XM416-4C: All versions prior to v6.5
XM416-4C (L3 int.): All versions prior to v6.5
XR524-8C, 1x230V: All versions prior to v6.5
XR524-8C, 1x230V (L3 int.): All versions prior to v6.5
XR524-8C, 2x230V: All versions prior to v6.5
XR524-8C, 2x230V (L3 int.): All versions prior to v6.5
XR524-8C, 24V: All versions prior to v6.5
XR524-8C, 24V (L3 int.): All versions prior to v6.5
XR526-8C, 1x230V: All versions prior to v6.5
XR526-8C, 1x230V (L3 int.): All versions prior to v6.5
XR526-8C, 2x230V: All versions prior to v6.5
XR526-8C, 2x230V (L3 int.): All versions prior to v6.5
XR526-8C, 24V: All versions prior to v6.5
XR526-8C, 24V (L3 int.): All versions prior to v6.5
XR528-6M: All versions prior to v6.5
XR528-6M (2HR2): All versions prior to v6.5
XR528-6M (2HR2, L3 int.): All versions prior to v6.5
XR528-6M (L3 int.): All versions prior to v6.5
XR552-12M: All versions prior to v6.5
XR552-12M (2HR2): All versions prior to v6.5
XR552-12M (2HR2): All versions prior to v6.5
XR552-12M (2HR2, L3 int.): All versions prior to v6.5

QID Detection Logic (Authenticated):
QID checks for the Vulnerable version of using passive scanning

Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to cause interruptions in the network.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 4.3 severity.
  • Solution

    Customers are advised to refer to CERT MITIGATIONS section ICSA-22-167-10 for affected packages and patching details.

    Vendor References

    CVEs related to QID 591031

    Software Advisories
    Advisory ID Software Component Link
    ICSA-22-167-10 URL Logo www.us-cert.gov/ics/advisories/ICSA-22-167-10