CVE-2022-25753

Severity CVSS v4.0:
Pending analysis
Type:
CWE-787 Out-of-bounds Write
Publication date:
12/04/2022
Last modified:
19/04/2022

Description

A vulnerability has been identified in SCALANCE X302-7 EEC (230V), SCALANCE X302-7 EEC (230V, coated), SCALANCE X302-7 EEC (24V), SCALANCE X302-7 EEC (24V, coated), SCALANCE X302-7 EEC (2x 230V), SCALANCE X302-7 EEC (2x 230V, coated), SCALANCE X302-7 EEC (2x 24V), SCALANCE X302-7 EEC (2x 24V, coated), SCALANCE X304-2FE, SCALANCE X306-1LD FE, SCALANCE X307-2 EEC (230V), SCALANCE X307-2 EEC (230V, coated), SCALANCE X307-2 EEC (24V), SCALANCE X307-2 EEC (24V, coated), SCALANCE X307-2 EEC (2x 230V), SCALANCE X307-2 EEC (2x 230V, coated), SCALANCE X307-2 EEC (2x 24V), SCALANCE X307-2 EEC (2x 24V, coated), SCALANCE X307-3, SCALANCE X307-3, SCALANCE X307-3LD, SCALANCE X307-3LD, SCALANCE X308-2, SCALANCE X308-2, SCALANCE X308-2LD, SCALANCE X308-2LD, SCALANCE X308-2LH, SCALANCE X308-2LH, SCALANCE X308-2LH+, SCALANCE X308-2LH+, SCALANCE X308-2M, SCALANCE X308-2M, SCALANCE X308-2M PoE, SCALANCE X308-2M PoE, SCALANCE X308-2M TS, SCALANCE X308-2M TS, SCALANCE X310, SCALANCE X310, SCALANCE X310FE, SCALANCE X310FE, SCALANCE X320-1 FE, SCALANCE X320-1-2LD FE, SCALANCE X408-2, SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M TS (24V), SCALANCE XR324-12M TS (24V), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M PoE (230V, ports on front), SCALANCE XR324-4M PoE (230V, ports on rear), SCALANCE XR324-4M PoE (24V, ports on front), SCALANCE XR324-4M PoE (24V, ports on rear), SCALANCE XR324-4M PoE TS (24V, ports on front), SIPLUS NET SCALANCE X308-2. The handling of arguments such as IP addresses in the CLI of affected devices is prone to buffer overflows. This could allow an authenticated remote attacker to execute arbitrary code on the device.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:siemens:scalance_x302-7eec_firmware:*:*:*:*:*:*:*:* 4.1.4 (excluding)
cpe:2.3:h:siemens:scalance_x302-7eec:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:scalance_x304-2fe_firmware:*:*:*:*:*:*:*:* 4.1.4 (excluding)
cpe:2.3:h:siemens:scalance_x304-2fe:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:scalance_x306-1ldfe_firmware:*:*:*:*:*:*:*:* 4.1.4 (excluding)
cpe:2.3:h:siemens:scalance_x306-1ldfe:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:scalance_x307-2eec_firmware:*:*:*:*:*:*:*:* 4.1.4 (excluding)
cpe:2.3:h:siemens:scalance_x307-2eec:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:scalance_x307-3_firmware:*:*:*:*:*:*:*:* 4.1.4 (excluding)
cpe:2.3:h:siemens:scalance_x307-3:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:scalance_x307-3ld_firmware:*:*:*:*:*:*:*:* 4.1.4 (excluding)
cpe:2.3:h:siemens:scalance_x307-3ld:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:scalance_x308-2_firmware:*:*:*:*:*:*:*:* 4.1.4 (excluding)
cpe:2.3:h:siemens:scalance_x308-2:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:scalance_x308-2ld_firmware:*:*:*:*:*:*:*:* 4.1.4 (excluding)


References to Advisories, Solutions, and Tools