Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x4vv-2q68-xx2p

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 8.6

Описание

A vulnerability has been identified in SCALANCE X300 (All versions < V4.0.0), SCALANCE X408 (All versions < V4.0.0), SCALANCE X414 (All versions). The web interface on port 443/tcp could allow an attacker to cause a Denial-of-Service condition by sending specially crafted packets to the web server. The device will automatically reboot, impacting network availability for other devices. An attacker must have network access to port 443/tcp to exploit the vulnerability. Neither valid credentials nor interaction by a legitimate user is required to exploit the vulnerability. There is no confidentiality or integrity impact, only availability is temporarily impacted. This vulnerability could be triggered by publicly available tools.

A vulnerability has been identified in SCALANCE X300 (All versions < V4.0.0), SCALANCE X408 (All versions < V4.0.0), SCALANCE X414 (All versions). The web interface on port 443/tcp could allow an attacker to cause a Denial-of-Service condition by sending specially crafted packets to the web server. The device will automatically reboot, impacting network availability for other devices. An attacker must have network access to port 443/tcp to exploit the vulnerability. Neither valid credentials nor interaction by a legitimate user is required to exploit the vulnerability. There is no confidentiality or integrity impact, only availability is temporarily impacted. This vulnerability could be triggered by publicly available tools.

EPSS

Процентиль: 74%
0.00804
Низкий

8.6 High

CVSS3

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 8.6
nvd
больше 7 лет назад

A vulnerability has been identified in SCALANCE X300 (All versions < V4.0.0), SCALANCE X408 (All versions < V4.0.0), SCALANCE X414 (All versions). The web interface on port 443/tcp could allow an attacker to cause a Denial-of-Service condition by sending specially crafted packets to the web server. The device will automatically reboot, impacting network availability for other devices. An attacker must have network access to port 443/tcp to exploit the vulnerability. Neither valid credentials nor interaction by a legitimate user is required to exploit the vulnerability. There is no confidentiality or integrity impact, only availability is temporarily impacted. This vulnerability could be triggered by publicly available tools.

CVSS3: 8.6
fstec
больше 7 лет назад

Уязвимость веб-сервера промышленных коммутаторов Siemens SCALANCE X300, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 74%
0.00804
Низкий

8.6 High

CVSS3

Дефекты

CWE-20