Описание
A vulnerability has been identified in SCALANCE X-200RNA switch family (All versions < V3.2.7), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions < V4.1.0). Devices do not create a new unique private key after factory reset. An attacker could leverage this situation to a man-in-the-middle situation and decrypt previously captured traffic.
Ссылки
- Vendor Advisory
- Third Party AdvisoryUS Government ResourceVendor Advisory
- Vendor Advisory
- Third Party AdvisoryUS Government ResourceVendor Advisory
Уязвимые конфигурации
Одновременно
Одновременно
Одновременно
Одновременно
Одновременно
Одновременно
Одновременно
Одновременно
EPSS
5.9 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
Связанные уязвимости
A vulnerability has been identified in SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions < V4.1.0). Devices do not create a new unique private key after factory reset. An attacker could leverage this situation to a man-in-the-middle situation and decrypt previously captured traffic.
Уязвимость функции reset промышленных коммутаторов SCALANCE X-200, SCALANCE X-200IRT, SCALANCE X-300, позволяющая нарушителю повысить свои привилегии
EPSS
5.9 Medium
CVSS3
4.3 Medium
CVSS2