A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT PRO (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2P IRT (All versions < V5.5.2), SCALANCE X202-2P IRT PRO (All versions < V5.5.2), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT PRO (All versions < V5.5.2), SCALANCE XF201-3P IRT (All versions < V5.5.2), SCALANCE XF202-2P IRT (All versions < V5.5.2), SCALANCE XF204-2BA IRT (All versions < V5.5.2), SCALANCE XF204IRT (All versions < V5.5.2), SIPLUS NET SCALANCE X202-2P IRT (All versions < V5.5.2). The SSH server on affected devices is configured to offer weak ciphers by default.

This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data
passed over the connection between legitimate clients and the affected device.

Project Subscriptions

Vendors Products
Siemens Subscribe
Scalance X200-4p Irt Subscribe
Scalance X200-4p Irt Firmware Subscribe
Scalance X201-3p Irt Subscribe
Scalance X201-3p Irt Firmware Subscribe
Scalance X201-3p Irt Pro Subscribe
Scalance X201-3p Irt Pro Firmware Subscribe
Scalance X202-2irt Subscribe
Scalance X202-2irt Firmware Subscribe
Scalance X202-2p Irt Subscribe
Scalance X202-2p Irt Firmware Subscribe
Scalance X202-2p Irt Pro Subscribe
Scalance X202-2p Irt Pro Firmware Subscribe
Scalance X204irt Subscribe
Scalance X204irt Firmware Subscribe
Scalance X204irt Pro Subscribe
Scalance X204irt Pro Firmware Subscribe
Scalance Xf201-3p Irt Subscribe
Scalance Xf201-3p Irt Firmware Subscribe
Scalance Xf202-2p Irt Subscribe
Scalance Xf202-2p Irt Firmware Subscribe
Scalance Xf204-2ba Irt Subscribe
Scalance Xf204-2ba Irt Firmware Subscribe
Scalance Xf204irt Subscribe
Scalance Xf204irt Firmware Subscribe
Siplus Net Scalance X202-2p Irt Subscribe
Siplus Net Scalance X202-2p Irt Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-32658 A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT PRO (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2P IRT (All versions < V5.5.2), SCALANCE X202-2P IRT PRO (All versions < V5.5.2), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT PRO (All versions < V5.5.2), SCALANCE XF201-3P IRT (All versions < V5.5.2), SCALANCE XF202-2P IRT (All versions < V5.5.2), SCALANCE XF204-2BA IRT (All versions < V5.5.2), SCALANCE XF204IRT (All versions < V5.5.2), SIPLUS NET SCALANCE X202-2P IRT (All versions < V5.5.2). The SSH server on affected devices is configured to offer weak ciphers by default. This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data passed over the connection between legitimate clients and the affected device.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 07 Feb 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2025-02-07T16:49:26.184Z

Reserved: 2023-03-30T12:04:26.539Z

Link: CVE-2023-29054

cve-icon Vulnrichment

Updated: 2024-08-02T14:00:14.631Z

cve-icon NVD

Status : Modified

Published: 2023-04-11T10:15:18.517

Modified: 2024-11-21T07:56:27.647

Link: CVE-2023-29054

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses