A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT PRO (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2P IRT (All versions < V5.5.2), SCALANCE X202-2P IRT PRO (All versions < V5.5.2), SCALANCE X204-2 (All versions < V5.2.6), SCALANCE X204-2FM (All versions < V5.2.6), SCALANCE X204-2LD (All versions < V5.2.6), SCALANCE X204-2LD TS (All versions < V5.2.6), SCALANCE X204-2TS (All versions < V5.2.6), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT PRO (All versions < V5.5.2), SCALANCE X206-1 (All versions < V5.2.6), SCALANCE X206-1LD (All versions < V5.2.6), SCALANCE X208 (All versions < V5.2.6), SCALANCE X208PRO (All versions < V5.2.6), SCALANCE X212-2 (All versions < V5.2.6), SCALANCE X212-2LD (All versions < V5.2.6), SCALANCE X216 (All versions < V5.2.6), SCALANCE X224 (All versions < V5.2.6), SCALANCE XF201-3P IRT (All versions < V5.5.2), SCALANCE XF202-2P IRT (All versions < V5.5.2), SCALANCE XF204 (All versions < V5.2.6), SCALANCE XF204-2 (All versions < V5.2.6), SCALANCE XF204-2BA IRT (All versions < V5.5.2), SCALANCE XF204IRT (All versions < V5.5.2), SCALANCE XF206-1 (All versions < V5.2.6), SCALANCE XF208 (All versions < V5.2.6). The webserver of affected devices calculates session ids and nonces in an insecure manner. This could allow an unauthenticated remote attacker to brute-force session ids and hijack existing sessions.

Project Subscriptions

Vendors Products
Siemens Subscribe
Scalance X200-4p Irt Subscribe
Scalance X200-4p Irt Firmware Subscribe
Scalance X201-3p Irt Subscribe
Scalance X201-3p Irt Firmware Subscribe
Scalance X201-3p Irt Pro Subscribe
Scalance X201-3p Irt Pro Firmware Subscribe
Scalance X202-2irt Subscribe
Scalance X202-2irt Firmware Subscribe
Scalance X202-2p Irt Subscribe
Scalance X202-2p Irt Firmware Subscribe
Scalance X202-2p Irt Pro Subscribe
Scalance X202-2p Irt Pro Firmware Subscribe
Scalance X204-2 Subscribe
Scalance X204-2 Firmware Subscribe
Scalance X204-2fm Subscribe
Scalance X204-2fm Firmware Subscribe
Scalance X204-2ld Subscribe
Scalance X204-2ld Firmware Subscribe
Scalance X204-2ld Ts Subscribe
Scalance X204-2ld Ts Firmware Subscribe
Scalance X204-2ts Subscribe
Scalance X204-2ts Firmware Subscribe
Scalance X204irt Subscribe
Scalance X204irt Firmware Subscribe
Scalance X204irt Pro Subscribe
Scalance X204irt Pro Firmware Subscribe
Scalance X206-1 Subscribe
Scalance X206-1 Firmware Subscribe
Scalance X206-1ld Subscribe
Scalance X206-1ld Firmware Subscribe
Scalance X208 Subscribe
Scalance X208 Firmware Subscribe
Scalance X208 Pro Subscribe
Scalance X208 Pro Firmware Subscribe
Scalance X212-2 Subscribe
Scalance X212-2 Firmware Subscribe
Scalance X212-2ld Subscribe
Scalance X212-2ld Firmware Subscribe
Scalance X216 Subscribe
Scalance X216 Firmware Subscribe
Scalance X224 Subscribe
Scalance X224 Firmware Subscribe
Scalance Xf201-3p Irt Subscribe
Scalance Xf201-3p Irt Firmware Subscribe
Scalance Xf202-2p Irt Subscribe
Scalance Xf202-2p Irt Firmware Subscribe
Scalance Xf204 Subscribe
Scalance Xf204-2 Subscribe
Scalance Xf204-2 Firmware Subscribe
Scalance Xf204-2ba Irt Subscribe
Scalance Xf204-2ba Irt Firmware Subscribe
Scalance Xf204 Firmware Subscribe
Scalance Xf204irt Subscribe
Scalance Xf204irt Firmware Subscribe
Scalance Xf206-1 Subscribe
Scalance Xf206-1 Firmware Subscribe
Scalance Xf208 Subscribe
Scalance Xf208 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-31201 A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT PRO (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2P IRT (All versions < V5.5.2), SCALANCE X202-2P IRT PRO (All versions < V5.5.2), SCALANCE X204-2 (All versions < V5.2.6), SCALANCE X204-2FM (All versions < V5.2.6), SCALANCE X204-2LD (All versions < V5.2.6), SCALANCE X204-2LD TS (All versions < V5.2.6), SCALANCE X204-2TS (All versions < V5.2.6), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT PRO (All versions < V5.5.2), SCALANCE X206-1 (All versions < V5.2.6), SCALANCE X206-1LD (All versions < V5.2.6), SCALANCE X208 (All versions < V5.2.6), SCALANCE X208PRO (All versions < V5.2.6), SCALANCE X212-2 (All versions < V5.2.6), SCALANCE X212-2LD (All versions < V5.2.6), SCALANCE X216 (All versions < V5.2.6), SCALANCE X224 (All versions < V5.2.6), SCALANCE XF201-3P IRT (All versions < V5.5.2), SCALANCE XF202-2P IRT (All versions < V5.5.2), SCALANCE XF204 (All versions < V5.2.6), SCALANCE XF204-2 (All versions < V5.2.6), SCALANCE XF204-2BA IRT (All versions < V5.5.2), SCALANCE XF204IRT (All versions < V5.5.2), SCALANCE XF206-1 (All versions < V5.2.6), SCALANCE XF208 (All versions < V5.2.6). The webserver of affected devices calculates session ids and nonces in an insecure manner. This could allow an unauthenticated remote attacker to brute-force session ids and hijack existing sessions.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00537}

epss

{'score': 0.01206}


Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00694}

epss

{'score': 0.00537}


Mon, 21 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2025-04-21T13:52:17.065Z

Reserved: 2022-03-07T00:00:00.000Z

Link: CVE-2022-26647

cve-icon Vulnrichment

Updated: 2024-08-03T05:11:43.345Z

cve-icon NVD

Status : Modified

Published: 2022-07-12T10:15:10.257

Modified: 2024-11-21T06:54:15.023

Link: CVE-2022-26647

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses