A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < 5.5.1), SCALANCE X201-3P IRT (All versions < 5.5.1), SCALANCE X201-3P IRT PRO (All versions < 5.5.1), SCALANCE X202-2 IRT (All versions < 5.5.1), SCALANCE X202-2P IRT (incl. SIPLUS NET variant) (All versions < 5.5.1), SCALANCE X202-2P IRT PRO (All versions < 5.5.1), SCALANCE X204 IRT (All versions < 5.5.1), SCALANCE X204 IRT PRO (All versions < 5.5.1), SCALANCE X204-2 (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE X204-2FM (All versions < V5.2.5), SCALANCE X204-2LD (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE X204-2LD TS (All versions < V5.2.5), SCALANCE X204-2TS (All versions < V5.2.5), SCALANCE X206-1 (All versions < V5.2.5), SCALANCE X206-1LD (All versions < V5.2.5), SCALANCE X208 (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE X208PRO (All versions < V5.2.5), SCALANCE X212-2 (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE X212-2LD (All versions < V5.2.5), SCALANCE X216 (All versions < V5.2.5), SCALANCE X224 (All versions < V5.2.5), SCALANCE XF201-3P IRT (All versions < 5.5.1), SCALANCE XF202-2P IRT (All versions < 5.5.1), SCALANCE XF204 (All versions < V5.2.5), SCALANCE XF204 IRT (All versions < 5.5.1), SCALANCE XF204-2 (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE XF204-2BA IRT (All versions < 5.5.1), SCALANCE XF206-1 (All versions < V5.2.5), SCALANCE XF208 (All versions < V5.2.5). Incorrect processing of POST requests in the webserver may result in write out of bounds in heap. An attacker might leverage this to cause denial-of-service on the device and potentially remotely execute code.

Project Subscriptions

Vendors Products
Siemens Subscribe
Scalance X200-4p Irt Subscribe
Scalance X200-4p Irt Firmware Subscribe
Scalance X201-3p Irt Subscribe
Scalance X201-3p Irt Firmware Subscribe
Scalance X201-3p Irt Pro Subscribe
Scalance X201-3p Irt Pro Firmware Subscribe
Scalance X202-2 Irt Subscribe
Scalance X202-2 Irt Firmware Subscribe
Scalance X202-2p Irt Subscribe
Scalance X202-2p Irt Firmware Subscribe
Scalance X202-2p Irt Pro Subscribe
Scalance X202-2p Irt Pro Firmware Subscribe
Scalance X204-2 Subscribe
Scalance X204-2 Firmware Subscribe
Scalance X204-2fm Subscribe
Scalance X204-2fm Firmware Subscribe
Scalance X204-2ld Subscribe
Scalance X204-2ld Firmware Subscribe
Scalance X204-2ld Ts Subscribe
Scalance X204-2ld Ts Firmware Subscribe
Scalance X204-2ts Subscribe
Scalance X204-2ts Firmware Subscribe
Scalance X204 Irt Subscribe
Scalance X204 Irt Firmware Subscribe
Scalance X204 Irt Pro Subscribe
Scalance X204 Irt Pro Firmware Subscribe
Scalance X206-1 Subscribe
Scalance X206-1 Firmware Subscribe
Scalance X206-1ld Subscribe
Scalance X206-1ld Firmware Subscribe
Scalance X208 Subscribe
Scalance X208 Firmware Subscribe
Scalance X208pro Subscribe
Scalance X208pro Firmware Subscribe
Scalance X212-2 Subscribe
Scalance X212-2 Firmware Subscribe
Scalance X212-2ld Subscribe
Scalance X212-2ld Firmware Subscribe
Scalance X216 Subscribe
Scalance X216 Firmware Subscribe
Scalance X224 Subscribe
Scalance X224 Firmware Subscribe
Scalance Xf201-3p Irt Subscribe
Scalance Xf201-3p Irt Firmware Subscribe
Scalance Xf202-2p Irt Subscribe
Scalance Xf202-2p Irt Firmware Subscribe
Scalance Xf204 Subscribe
Scalance Xf204-2 Subscribe
Scalance Xf204-2 Firmware Subscribe
Scalance Xf204-2ba Irt Subscribe
Scalance Xf204-2ba Irt Firmware Subscribe
Scalance Xf204 Firmware Subscribe
Scalance Xf204 Irt Subscribe
Scalance Xf204 Irt Firmware Subscribe
Scalance Xf206-1 Subscribe
Scalance Xf206-1 Firmware Subscribe
Scalance Xf208 Subscribe
Scalance Xf208 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-12560 A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < 5.5.1), SCALANCE X201-3P IRT (All versions < 5.5.1), SCALANCE X201-3P IRT PRO (All versions < 5.5.1), SCALANCE X202-2 IRT (All versions < 5.5.1), SCALANCE X202-2P IRT (incl. SIPLUS NET variant) (All versions < 5.5.1), SCALANCE X202-2P IRT PRO (All versions < 5.5.1), SCALANCE X204 IRT (All versions < 5.5.1), SCALANCE X204 IRT PRO (All versions < 5.5.1), SCALANCE X204-2 (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE X204-2FM (All versions < V5.2.5), SCALANCE X204-2LD (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE X204-2LD TS (All versions < V5.2.5), SCALANCE X204-2TS (All versions < V5.2.5), SCALANCE X206-1 (All versions < V5.2.5), SCALANCE X206-1LD (All versions < V5.2.5), SCALANCE X208 (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE X208PRO (All versions < V5.2.5), SCALANCE X212-2 (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE X212-2LD (All versions < V5.2.5), SCALANCE X216 (All versions < V5.2.5), SCALANCE X224 (All versions < V5.2.5), SCALANCE XF201-3P IRT (All versions < 5.5.1), SCALANCE XF202-2P IRT (All versions < 5.5.1), SCALANCE XF204 (All versions < V5.2.5), SCALANCE XF204 IRT (All versions < 5.5.1), SCALANCE XF204-2 (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE XF204-2BA IRT (All versions < 5.5.1), SCALANCE XF206-1 (All versions < V5.2.5), SCALANCE XF208 (All versions < V5.2.5). Incorrect processing of POST requests in the webserver may result in write out of bounds in heap. An attacker might leverage this to cause denial-of-service on the device and potentially remotely execute code.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2024-08-03T20:11:27.504Z

Reserved: 2021-01-21T00:00:00

Link: CVE-2021-25668

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-04-22T21:15:10.110

Modified: 2024-11-21T05:55:15.517

Link: CVE-2021-25668

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses