// For flags

CVE-2019-13924

 

Severity Score

5.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability has been identified in SCALANCE S602 (All versions < V4.1), SCALANCE S612 (All versions < V4.1), SCALANCE S623 (All versions < V4.1), SCALANCE S627-2M (All versions < V4.1), SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < 5.2.4), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0), SCALANCE X-200RNA switch family (All versions < V3.2.7), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions < 4.1.3). The device does not send the X-Frame-Option Header in the administrative web interface, which makes it vulnerable to Clickjacking attacks. The security vulnerability could be exploited by an attacker that is able to trick an administrative user with a valid session on the target device into clicking on a website controlled by the attacker. The vulnerability could allow an attacker to perform administrative actions via the web interface.

Se ha identificado una vulnerabilidad en la SCALANCE S602 (Todas las versiones anteriores a V4.1), SCALANCE S612 (Todas las versiones anteriores a V4.1), SCALANCE S623 (Todas las versiones anteriores a V4.1), SCALANCE S627-2M (Todas las versiones anteriores a V4.1), familia de switches SCALANCE X-200 (incluidas las variantes SIPLUS NET) (Todas las versiones anteriores a 5.2.4), familia de switches SCALANCE X-200IRT (incluidas las variantes SIPLUS NET) (Todas las versiones anteriores a V5.5.0), familia de switches SCALANCE X-300 (incluidas las variantes X408 y SIPLUS NET) (Todas las versiones anteriores a 4.1.3). El dispositivo no envía el encabezado X-Frame-Option en la interfaz web administrativa, lo que lo hace vulnerable a los ataques de Clickjacking. La vulnerabilidad de seguridad podría ser explotada por un atacante que es capaz de engañar a un usuario administrativo con una sesión válida en el dispositivo de destino para que haga clic en un sitio web controlado por el atacante. La vulnerabilidad podría permitir a un atacante realizar acciones administrativas a través de la interfaz web

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-07-18 CVE Reserved
  • 2020-02-11 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-693: Protection Mechanism Failure
  • CWE-1021: Improper Restriction of Rendered UI Layers or Frames
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Siemens
Search vendor "Siemens"
Scalance Xc-200 Firmware
Search vendor "Siemens" for product "Scalance Xc-200 Firmware"
< 5.2.4
Search vendor "Siemens" for product "Scalance Xc-200 Firmware" and version " < 5.2.4"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance Xc-200
Search vendor "Siemens" for product "Scalance Xc-200"
--
Safe
Siemens
Search vendor "Siemens"
Scalance Xf-200 Firmware
Search vendor "Siemens" for product "Scalance Xf-200 Firmware"
< 5.2.4
Search vendor "Siemens" for product "Scalance Xf-200 Firmware" and version " < 5.2.4"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance Xf-200
Search vendor "Siemens" for product "Scalance Xf-200"
--
Safe
Siemens
Search vendor "Siemens"
Scalance Xp-200 Firmware
Search vendor "Siemens" for product "Scalance Xp-200 Firmware"
< 5.2.4
Search vendor "Siemens" for product "Scalance Xp-200 Firmware" and version " < 5.2.4"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance Xp-200
Search vendor "Siemens" for product "Scalance Xp-200"
--
Safe
Siemens
Search vendor "Siemens"
Scalance X-200irt Firmware
Search vendor "Siemens" for product "Scalance X-200irt Firmware"
*-
Affected
in Siemens
Search vendor "Siemens"
Scalance X-200irt
Search vendor "Siemens" for product "Scalance X-200irt"
--
Safe
Siemens
Search vendor "Siemens"
Scalance Xb-200 Firmware
Search vendor "Siemens" for product "Scalance Xb-200 Firmware"
< 5.2.4
Search vendor "Siemens" for product "Scalance Xb-200 Firmware" and version " < 5.2.4"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance Xb-200
Search vendor "Siemens" for product "Scalance Xb-200"
--
Safe
Siemens
Search vendor "Siemens"
Scalance Xr-300wg Firmware
Search vendor "Siemens" for product "Scalance Xr-300wg Firmware"
< 4.1.3
Search vendor "Siemens" for product "Scalance Xr-300wg Firmware" and version " < 4.1.3"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance Xr-300wg
Search vendor "Siemens" for product "Scalance Xr-300wg"
--
Safe
Siemens
Search vendor "Siemens"
Scalance X-300 Firmware
Search vendor "Siemens" for product "Scalance X-300 Firmware"
< 4.1.3
Search vendor "Siemens" for product "Scalance X-300 Firmware" and version " < 4.1.3"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance X-300
Search vendor "Siemens" for product "Scalance X-300"
--
Safe
Siemens
Search vendor "Siemens"
Scalance Xr-300 Firmware
Search vendor "Siemens" for product "Scalance Xr-300 Firmware"
< 4.1.3
Search vendor "Siemens" for product "Scalance Xr-300 Firmware" and version " < 4.1.3"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance Xr-300
Search vendor "Siemens" for product "Scalance Xr-300"
--
Safe