CVE-2019-13924
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability has been identified in SCALANCE S602 (All versions < V4.1), SCALANCE S612 (All versions < V4.1), SCALANCE S623 (All versions < V4.1), SCALANCE S627-2M (All versions < V4.1), SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < 5.2.4), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0), SCALANCE X-200RNA switch family (All versions < V3.2.7), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions < 4.1.3). The device does not send the X-Frame-Option Header in the administrative web interface, which makes it vulnerable to Clickjacking attacks. The security vulnerability could be exploited by an attacker that is able to trick an administrative user with a valid session on the target device into clicking on a website controlled by the attacker. The vulnerability could allow an attacker to perform administrative actions via the web interface.
Se ha identificado una vulnerabilidad en la SCALANCE S602 (Todas las versiones anteriores a V4.1), SCALANCE S612 (Todas las versiones anteriores a V4.1), SCALANCE S623 (Todas las versiones anteriores a V4.1), SCALANCE S627-2M (Todas las versiones anteriores a V4.1), familia de switches SCALANCE X-200 (incluidas las variantes SIPLUS NET) (Todas las versiones anteriores a 5.2.4), familia de switches SCALANCE X-200IRT (incluidas las variantes SIPLUS NET) (Todas las versiones anteriores a V5.5.0), familia de switches SCALANCE X-300 (incluidas las variantes X408 y SIPLUS NET) (Todas las versiones anteriores a 4.1.3). El dispositivo no envía el encabezado X-Frame-Option en la interfaz web administrativa, lo que lo hace vulnerable a los ataques de Clickjacking. La vulnerabilidad de seguridad podría ser explotada por un atacante que es capaz de engañar a un usuario administrativo con una sesión válida en el dispositivo de destino para que haga clic en un sitio web controlado por el atacante. La vulnerabilidad podría permitir a un atacante realizar acciones administrativas a través de la interfaz web
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-07-18 CVE Reserved
- 2020-02-11 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-693: Protection Mechanism Failure
- CWE-1021: Improper Restriction of Rendered UI Layers or Frames
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://www.us-cert.gov/ics/advisories/icsa-20-042-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-951513.pdf | 2022-12-13 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Siemens Search vendor "Siemens" | Scalance Xc-200 Firmware Search vendor "Siemens" for product "Scalance Xc-200 Firmware" | < 5.2.4 Search vendor "Siemens" for product "Scalance Xc-200 Firmware" and version " < 5.2.4" | - |
Affected
| in | Siemens Search vendor "Siemens" | Scalance Xc-200 Search vendor "Siemens" for product "Scalance Xc-200" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Scalance Xf-200 Firmware Search vendor "Siemens" for product "Scalance Xf-200 Firmware" | < 5.2.4 Search vendor "Siemens" for product "Scalance Xf-200 Firmware" and version " < 5.2.4" | - |
Affected
| in | Siemens Search vendor "Siemens" | Scalance Xf-200 Search vendor "Siemens" for product "Scalance Xf-200" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Scalance Xp-200 Firmware Search vendor "Siemens" for product "Scalance Xp-200 Firmware" | < 5.2.4 Search vendor "Siemens" for product "Scalance Xp-200 Firmware" and version " < 5.2.4" | - |
Affected
| in | Siemens Search vendor "Siemens" | Scalance Xp-200 Search vendor "Siemens" for product "Scalance Xp-200" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Scalance X-200irt Firmware Search vendor "Siemens" for product "Scalance X-200irt Firmware" | * | - |
Affected
| in | Siemens Search vendor "Siemens" | Scalance X-200irt Search vendor "Siemens" for product "Scalance X-200irt" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Scalance Xb-200 Firmware Search vendor "Siemens" for product "Scalance Xb-200 Firmware" | < 5.2.4 Search vendor "Siemens" for product "Scalance Xb-200 Firmware" and version " < 5.2.4" | - |
Affected
| in | Siemens Search vendor "Siemens" | Scalance Xb-200 Search vendor "Siemens" for product "Scalance Xb-200" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Scalance Xr-300wg Firmware Search vendor "Siemens" for product "Scalance Xr-300wg Firmware" | < 4.1.3 Search vendor "Siemens" for product "Scalance Xr-300wg Firmware" and version " < 4.1.3" | - |
Affected
| in | Siemens Search vendor "Siemens" | Scalance Xr-300wg Search vendor "Siemens" for product "Scalance Xr-300wg" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Scalance X-300 Firmware Search vendor "Siemens" for product "Scalance X-300 Firmware" | < 4.1.3 Search vendor "Siemens" for product "Scalance X-300 Firmware" and version " < 4.1.3" | - |
Affected
| in | Siemens Search vendor "Siemens" | Scalance X-300 Search vendor "Siemens" for product "Scalance X-300" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Scalance Xr-300 Firmware Search vendor "Siemens" for product "Scalance Xr-300 Firmware" | < 4.1.3 Search vendor "Siemens" for product "Scalance Xr-300 Firmware" and version " < 4.1.3" | - |
Affected
| in | Siemens Search vendor "Siemens" | Scalance Xr-300 Search vendor "Siemens" for product "Scalance Xr-300" | - | - |
Safe
|