// For flags

CVE-2019-10942

 

Severity Score

8.6
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0), SCALANCE X204RNA (HSR) (All versions), SCALANCE X204RNA (PRP) (All versions), SCALANCE X204RNA EEC (HSR) (All versions), SCALANCE X204RNA EEC (PRP) (All versions), SCALANCE X204RNA EEC (PRP/HSR) (All versions). The device contains a vulnerability that could allow an attacker to trigger a denial-of-service condition by sending large message packages repeatedly to the telnet service. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the device.

Se ha identificado una vulnerabilidad en la familia de conmutadores SCALANCE X-200 (incluidas las variantes de SIPLUS NET) (Todas las versiones anteriores a la versión V5.2.5), la familia de conmutadores SCALANCE X-200IRT (incluidas las variantes de SIPLUS NET) (Todas las versiones anteriores a la versión V5.5. 0), SCALANCE X204RNA (HSR) (Todas las versiones), SCALANCE X204RNA (PRP) (Todas las versiones), SCALANCE X204RNA EEC (HSR) (Todas las versiones), SCALANCE X204RNA EEC (PRP) (Todas las versiones), SCALANCE X204RNA EEC (PRP/HSR) (Todas las versiones). El dispositivo contiene una vulnerabilidad que podría permitir a un atacante desencadenar una condición de denegación de servicio mediante el envío repetido de grandes paquetes de mensajes al servicio telnet. La vulnerabilidad de seguridad podría ser explotada por un atacante con acceso de red a los sistemas afectados. La explotación exitosa no requiere privilegios del sistema ni interacción del usuario. Un atacante podría utilizar la vulnerabilidad para comprometer la disponibilidad del dispositivo

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-04-08 CVE Reserved
  • 2019-08-13 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-400: Uncontrolled Resource Consumption
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Siemens
Search vendor "Siemens"
Scalance X-200 Firmware
Search vendor "Siemens" for product "Scalance X-200 Firmware"
*-
Affected
in Siemens
Search vendor "Siemens"
Scalance X-200
Search vendor "Siemens" for product "Scalance X-200"
--
Safe
Siemens
Search vendor "Siemens"
Scalance X-200irt Firmware
Search vendor "Siemens" for product "Scalance X-200irt Firmware"
*-
Affected
in Siemens
Search vendor "Siemens"
Scalance X-200irt
Search vendor "Siemens" for product "Scalance X-200irt"
--
Safe
Siemens
Search vendor "Siemens"
Scalance X-200rna Firmware
Search vendor "Siemens" for product "Scalance X-200rna Firmware"
*-
Affected
in Siemens
Search vendor "Siemens"
Scalance X-200rna
Search vendor "Siemens" for product "Scalance X-200rna"
--
Safe