A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT PRO (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2P IRT (All versions < V5.5.2), SCALANCE X202-2P IRT PRO (All versions < V5.5.2), SCALANCE X204-2 (All versions < V5.2.6), SCALANCE X204-2FM (All versions < V5.2.6), SCALANCE X204-2LD (All versions < V5.2.6), SCALANCE X204-2LD TS (All versions < V5.2.6), SCALANCE X204-2TS (All versions < V5.2.6), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT PRO (All versions < V5.5.2), SCALANCE X206-1 (All versions < V5.2.6), SCALANCE X206-1LD (All versions < V5.2.6), SCALANCE X208 (All versions < V5.2.6), SCALANCE X208PRO (All versions < V5.2.6), SCALANCE X212-2 (All versions < V5.2.6), SCALANCE X212-2LD (All versions < V5.2.6), SCALANCE X216 (All versions < V5.2.6), SCALANCE X224 (All versions < V5.2.6), SCALANCE XF201-3P IRT (All versions < V5.5.2), SCALANCE XF202-2P IRT (All versions < V5.5.2), SCALANCE XF204 (All versions < V5.2.6), SCALANCE XF204-2 (All versions < V5.2.6), SCALANCE XF204-2BA IRT (All versions < V5.5.2), SCALANCE XF204IRT (All versions < V5.5.2), SCALANCE XF206-1 (All versions < V5.2.6), SCALANCE XF208 (All versions < V5.2.6). Affected devices do not properly validate the URI of incoming HTTP GET requests. This could allow an unauthenticated remote attacker to crash affected devices.

Project Subscriptions

Vendors Products
Siemens Subscribe
Scalance X200-4p Irt Subscribe
Scalance X200-4p Irt Firmware Subscribe
Scalance X201-3p Irt Subscribe
Scalance X201-3p Irt Firmware Subscribe
Scalance X201-3p Irt Pro Subscribe
Scalance X201-3p Irt Pro Firmware Subscribe
Scalance X202-2irt Subscribe
Scalance X202-2irt Firmware Subscribe
Scalance X202-2p Irt Subscribe
Scalance X202-2p Irt Firmware Subscribe
Scalance X202-2p Irt Pro Subscribe
Scalance X202-2p Irt Pro Firmware Subscribe
Scalance X204-2 Subscribe
Scalance X204-2 Firmware Subscribe
Scalance X204-2fm Subscribe
Scalance X204-2fm Firmware Subscribe
Scalance X204-2ld Subscribe
Scalance X204-2ld Firmware Subscribe
Scalance X204-2ld Ts Subscribe
Scalance X204-2ld Ts Firmware Subscribe
Scalance X204-2ts Subscribe
Scalance X204-2ts Firmware Subscribe
Scalance X204irt Subscribe
Scalance X204irt Firmware Subscribe
Scalance X204irt Pro Subscribe
Scalance X204irt Pro Firmware Subscribe
Scalance X206-1 Subscribe
Scalance X206-1 Firmware Subscribe
Scalance X206-1ld Subscribe
Scalance X206-1ld Firmware Subscribe
Scalance X208 Subscribe
Scalance X208 Firmware Subscribe
Scalance X208 Pro Subscribe
Scalance X208 Pro Firmware Subscribe
Scalance X212-2 Subscribe
Scalance X212-2 Firmware Subscribe
Scalance X212-2ld Subscribe
Scalance X212-2ld Firmware Subscribe
Scalance X216 Subscribe
Scalance X216 Firmware Subscribe
Scalance X224 Subscribe
Scalance X224 Firmware Subscribe
Scalance Xf201-3p Irt Subscribe
Scalance Xf201-3p Irt Firmware Subscribe
Scalance Xf202-2p Irt Subscribe
Scalance Xf202-2p Irt Firmware Subscribe
Scalance Xf204 Subscribe
Scalance Xf204-2 Subscribe
Scalance Xf204-2 Firmware Subscribe
Scalance Xf204-2ba Irt Subscribe
Scalance Xf204-2ba Irt Firmware Subscribe
Scalance Xf204 Firmware Subscribe
Scalance Xf204irt Subscribe
Scalance Xf204irt Firmware Subscribe
Scalance Xf206-1 Subscribe
Scalance Xf206-1 Firmware Subscribe
Scalance Xf208 Subscribe
Scalance Xf208 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-31203 A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT PRO (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2P IRT (All versions < V5.5.2), SCALANCE X202-2P IRT PRO (All versions < V5.5.2), SCALANCE X204-2 (All versions < V5.2.6), SCALANCE X204-2FM (All versions < V5.2.6), SCALANCE X204-2LD (All versions < V5.2.6), SCALANCE X204-2LD TS (All versions < V5.2.6), SCALANCE X204-2TS (All versions < V5.2.6), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT PRO (All versions < V5.5.2), SCALANCE X206-1 (All versions < V5.2.6), SCALANCE X206-1LD (All versions < V5.2.6), SCALANCE X208 (All versions < V5.2.6), SCALANCE X208PRO (All versions < V5.2.6), SCALANCE X212-2 (All versions < V5.2.6), SCALANCE X212-2LD (All versions < V5.2.6), SCALANCE X216 (All versions < V5.2.6), SCALANCE X224 (All versions < V5.2.6), SCALANCE XF201-3P IRT (All versions < V5.5.2), SCALANCE XF202-2P IRT (All versions < V5.5.2), SCALANCE XF204 (All versions < V5.2.6), SCALANCE XF204-2 (All versions < V5.2.6), SCALANCE XF204-2BA IRT (All versions < V5.5.2), SCALANCE XF204IRT (All versions < V5.5.2), SCALANCE XF206-1 (All versions < V5.2.6), SCALANCE XF208 (All versions < V5.2.6). Affected devices do not properly validate the URI of incoming HTTP GET requests. This could allow an unauthenticated remote attacker to crash affected devices.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00415}

epss

{'score': 0.01072}


Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00455}

epss

{'score': 0.00415}


Mon, 21 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2025-04-21T13:51:58.286Z

Reserved: 2022-03-07T00:00:00.000Z

Link: CVE-2022-26649

cve-icon Vulnrichment

Updated: 2024-08-03T05:11:43.372Z

cve-icon NVD

Status : Modified

Published: 2022-07-12T10:15:10.367

Modified: 2024-11-21T06:54:15.353

Link: CVE-2022-26649

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses