CVE-2019-10942
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0), SCALANCE X204RNA (HSR) (All versions), SCALANCE X204RNA (PRP) (All versions), SCALANCE X204RNA EEC (HSR) (All versions), SCALANCE X204RNA EEC (PRP) (All versions), SCALANCE X204RNA EEC (PRP/HSR) (All versions). The device contains a vulnerability that could allow an attacker to trigger a denial-of-service condition by sending large message packages repeatedly to the telnet service. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the device.
Se ha identificado una vulnerabilidad en la familia de conmutadores SCALANCE X-200 (incluidas las variantes de SIPLUS NET) (Todas las versiones anteriores a la versión V5.2.5), la familia de conmutadores SCALANCE X-200IRT (incluidas las variantes de SIPLUS NET) (Todas las versiones anteriores a la versión V5.5. 0), SCALANCE X204RNA (HSR) (Todas las versiones), SCALANCE X204RNA (PRP) (Todas las versiones), SCALANCE X204RNA EEC (HSR) (Todas las versiones), SCALANCE X204RNA EEC (PRP) (Todas las versiones), SCALANCE X204RNA EEC (PRP/HSR) (Todas las versiones). El dispositivo contiene una vulnerabilidad que podría permitir a un atacante desencadenar una condición de denegación de servicio mediante el envío repetido de grandes paquetes de mensajes al servicio telnet. La vulnerabilidad de seguridad podría ser explotada por un atacante con acceso de red a los sistemas afectados. La explotación exitosa no requiere privilegios del sistema ni interacción del usuario. Un atacante podría utilizar la vulnerabilidad para comprometer la disponibilidad del dispositivo
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-04-08 CVE Reserved
- 2019-08-13 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-400: Uncontrolled Resource Consumption
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-100232.pdf | 2022-02-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Siemens Search vendor "Siemens" | Scalance X-200 Firmware Search vendor "Siemens" for product "Scalance X-200 Firmware" | * | - |
Affected
| in | Siemens Search vendor "Siemens" | Scalance X-200 Search vendor "Siemens" for product "Scalance X-200" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Scalance X-200irt Firmware Search vendor "Siemens" for product "Scalance X-200irt Firmware" | * | - |
Affected
| in | Siemens Search vendor "Siemens" | Scalance X-200irt Search vendor "Siemens" for product "Scalance X-200irt" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Scalance X-200rna Firmware Search vendor "Siemens" for product "Scalance X-200rna Firmware" | * | - |
Affected
| in | Siemens Search vendor "Siemens" | Scalance X-200rna Search vendor "Siemens" for product "Scalance X-200rna" | - | - |
Safe
|