Risk | Medium |
Patch available | NO |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2019-10927 CVE-2019-10928 |
CWE-ID | N/A |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
SCALANCE SR-300WG Hardware solutions / Routers & switches, VoIP, GSM, etc SCALANCE XP-200 Hardware solutions / Routers & switches, VoIP, GSM, etc SCALANCE XF-200BA Hardware solutions / Routers & switches, VoIP, GSM, etc SCALANCE XC-200 Hardware solutions / Routers & switches, VoIP, GSM, etc SCALANCE XB-200 Hardware solutions / Routers & switches, VoIP, GSM, etc SCALANCE SC-600 Hardware solutions / Routers & switches, VoIP, GSM, etc |
Vendor | Siemens |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU20347
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2019-10927
CWE-ID: N/A
Exploit availability: No
DescriptionCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsSCALANCE SR-300WG: 4.1
SCALANCE XP-200: 4.1
SCALANCE XF-200BA: 4.1
SCALANCE XC-200: 4.1
SCALANCE XB-200: 4.1
SCALANCE SC-600: 2.0
CPE2.3https://cert-portal.siemens.com/productcert/pdf/ssa-671286.pdf
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU20348
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2019-10928
CWE-ID: N/A
Exploit availability: No
DescriptionInstall updates from vendor's website.
Vulnerable software versionsSCALANCE SC-600: 2.0
CPE2.3 External linkshttps://cert-portal.siemens.com/productcert/pdf/ssa-671286.pdf
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.