The authentication implementation in the web server on Siemens SCALANCE X-200 switches with firmware before 5.0.0 does not use a sufficient source of entropy for generating values of random numbers, which makes it easier for remote attackers to hijack sessions by predicting a value.
2013-09-17T12:04:28.820
2025-04-11T00:51:21.963
Deferred
CVSSv2: 8.3 (HIGH)
AV:N/AC:M/Au:N/C:P/I:P/A:C
8.6
8.5
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | siemens | scalance_x-200_series_firmware | ≤ 4.4 | Yes |
Operating System | siemens | scalance_x-200_series_firmware | 4.3 | Yes |
Hardware | siemens | scalance_x-200 | - | Yes |
Hardware | siemens | scalance_x-200rna | - | Yes |
Hardware | siemens | scalance_x200-4p_irt | - | Yes |
Hardware | siemens | scalance_x201-3p_irt | - | Yes |
Hardware | siemens | scalance_x201-3p_irt | - | Yes |
Hardware | siemens | scalance_x202-2irt | - | Yes |
Hardware | siemens | scalance_x202-2p_irt | - | Yes |
Hardware | siemens | scalance_x202-2p_irt | - | Yes |
Hardware | siemens | scalance_x204irt | - | Yes |
Hardware | siemens | scalance_x204irt | - | Yes |
Hardware | siemens | scalance_xf-200 | - | Yes |