
CVE-2023-44374
https://notcve.org/view.php?id=CVE-2023-44374
14 Nov 2023 — Affected devices allow to change the password, but insufficiently check which password is to be changed. With this an authenticated attacker could, under certain conditions, be able to change the password of another, potential admin user allowing her to escalate her privileges. Se ha identificado una vulnerabilidad en: SCALANCE XB205-3 (SC, PN) (V < 4.5), SCALANCE XB205-3 (ST, E/IP) (V < 4.5), SCALANCE XB205-3 (ST, E/IP) (V < 4.5), SCALANCE XB205-3 (ST, PN) (V < 4.5), SCALANCE XB205-3LD (SC, E/I... • https://cert-portal.siemens.com/productcert/html/ssa-180704.html • CWE-567: Unsynchronized Access to Shared Data in a Multithreaded Context •

CVE-2023-44373
https://notcve.org/view.php?id=CVE-2023-44373
14 Nov 2023 — Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. Follow-up of CVE-2022-36323. Se ha identificado una vulnerabilidad en: SCALANCE XB205-3 (SC, PN) (V < 4.5), SCALANCE XB205-3 (ST, E/IP) (V < 4.5), SCALANCE XB205-3 (ST , E/IP) (V < 4.5), SCALANCE XB205-3 (ST, PN) (V < 4.5), SCALANCE XB205-3LD (SC, E/IP) (V < 4.5 ), SCALANCE XB205-3LD (SC, PN) (V < 4.5), SCALA... • https://cert-portal.siemens.com/productcert/html/ssa-180704.html • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVE-2023-44322
https://notcve.org/view.php?id=CVE-2023-44322
14 Nov 2023 — Affected devices can be configured to send emails when certain events occur on the device. When presented with an invalid response from the SMTP server, the device triggers an error that disrupts email sending. An attacker with access to the network can use this to do disable notification of users when certain events occur. Se ha identificado una vulnerabilidad en: SCALANCE XB205-3 (SC, PN) (V < 4.5), SCALANCE XB205-3 (ST, E/IP) (V < 4.5), SCALANCE XB205-3 (ST , E/IP) (V < 4.5), SCALANCE XB205-3 (S... • https://cert-portal.siemens.com/productcert/html/ssa-180704.html • CWE-252: Unchecked Return Value •

CVE-2023-44321
https://notcve.org/view.php?id=CVE-2023-44321
14 Nov 2023 — Affected devices do not properly validate the length of inputs when performing certain configuration changes in the web interface allowing an authenticated attacker to cause a denial of service condition. The device needs to be restarted for the web interface to become available again. Se ha identificado una vulnerabilidad en: SCALANCE XB205-3 (SC, PN) (V < 4.5), SCALANCE XB205-3 (ST, E/IP) (V < 4.5), SCALANCE XB205-3 (ST , E/IP) (V < 4.5), SCALANCE XB205-3 (ST, PN) (V < 4.5), SCALANCE XB205-3LD... • https://cert-portal.siemens.com/productcert/html/ssa-180704.html • CWE-400: Uncontrolled Resource Consumption •

CVE-2023-44320
https://notcve.org/view.php?id=CVE-2023-44320
14 Nov 2023 — Affected devices do not properly validate the authentication when performing certain modifications in the web interface allowing an authenticated attacker to influence the user interface configured by an administrator. Se ha identificado una vulnerabilidad en: SCALANCE XB205-3 (SC, PN) (V < 4.5), SCALANCE XB205-3 (ST, E/IP) (V < 4.5), SCALANCE XB205-3 (ST , E/IP) (V < 4.5), SCALANCE XB205-3 (ST, PN) (V < 4.5), SCALANCE XB205-3LD (SC, E/IP) (V < 4.5 ), SCALANCE XB205-3LD (SC, PN) (V < 4.5),... • https://cert-portal.siemens.com/productcert/html/ssa-180704.html • CWE-425: Direct Request ('Forced Browsing') •

CVE-2023-44319
https://notcve.org/view.php?id=CVE-2023-44319
14 Nov 2023 — Affected devices use a weak checksum algorithm to protect the configuration backup that an administrator can export from the device. This could allow an authenticated attacker with administrative privileges or an attacker that tricks a legitimate administrator to upload a modified configuration file to change the configuration of an affected device. Se ha identificado una vulnerabilidad en: SCALANCE XB205-3 (SC, PN) (V < 4.5), SCALANCE XB205-3 (ST, E/IP) (V < 4.5), SCALANCE XB205-3 (ST , E/IP) (V <... • https://cert-portal.siemens.com/productcert/html/ssa-180704.html • CWE-328: Use of Weak Hash •

CVE-2023-44318
https://notcve.org/view.php?id=CVE-2023-44318
14 Nov 2023 — Affected devices use a hardcoded key to obfuscate the configuration backup that an administrator can export from the device. This could allow an authenticated attacker with administrative privileges or an attacker that obtains a configuration backup to extract configuration information from the exported file. Se ha identificado una vulnerabilidad en: SCALANCE XB205-3 (SC, PN) (V < 4.5), SCALANCE XB205-3 (ST, E/IP) (V < 4.5), SCALANCE XB205-3 (ST , E/IP) (V < 4.5), SCALANCE XB205-3 (ST, PN) (V < ... • https://cert-portal.siemens.com/productcert/html/ssa-180704.html • CWE-321: Use of Hard-coded Cryptographic Key •

CVE-2022-31765
https://notcve.org/view.php?id=CVE-2022-31765
11 Oct 2022 — Affected devices do not properly authorize the change password function of the web interface. This could allow low privileged users to escalate their privileges. Los dispositivos afectados no autorizan apropiadamente la función change password de la interfaz web. Esto podría permitir a usuarios poco privilegiado escalar sus privilegios • https://cert-portal.siemens.com/productcert/pdf/ssa-552702.pdf • CWE-862: Missing Authorization •