Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU52214
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-25668
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote attacker can pass specially crafted data to the application, trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsSCALANCE X204-2: All versions
SCALANCE X204-2FM: All versions
SCALANCE X204-2LD: All versions
SCALANCE X204-2LD TS: All versions
SCALANCE X204-2TS: All versions
SCALANCE X206-1: All versions
SCALANCE X206-1LD: All versions
SCALANCE X208: All versions
SCALANCE X208PRO: All versions
SCALANCE X212-2: All versions
SCALANCE X212-2LD: All versions
SCALANCE X216: All versions
SCALANCE X224: All versions
SCALANCE XF204: All versions
SCALANCE XF204-2: All versions
SCALANCE XF206-1: All versions
SCALANCE XF208: All versions
SCALANCE X200-4P IRT: before 5.5.1
SCALANCE X201-3P IRT: before 5.5.1
SCALANCE X201-3P IRT PRO: before 5.5.1
SCALANCE X202-2 IRT: before 5.5.1
SCALANCE X202-2P IRT: before 5.5.1
SCALANCE X202-2P IRT PRO: before 5.5.1
SCALANCE X204 IRT: before 5.5.1
SCALANCE X204 IRT PRO: before 5.5.1
SCALANCE XF201-3P IRT: before 5.5.1
SCALANCE XF202-2P IRT: before 5.5.1
SCALANCE XF204 IRT: before 5.5.1
SCALANCE XF204-2BA IRT: before 5.5.1
External linkshttp://ics-cert.us-cert.gov/advisories/icsa-21-103-07
http://cert-portal.siemens.com/productcert/pdf/ssa-187092.pdf
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU52215
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-25669
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing POST requests in the web server. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsSCALANCE X204-2: All versions
SCALANCE X204-2FM: All versions
SCALANCE X204-2LD: All versions
SCALANCE X204-2LD TS: All versions
SCALANCE X204-2TS: All versions
SCALANCE X206-1: All versions
SCALANCE X206-1LD: All versions
SCALANCE X208: All versions
SCALANCE X208PRO: All versions
SCALANCE X212-2: All versions
SCALANCE X212-2LD: All versions
SCALANCE X216: All versions
SCALANCE X224: All versions
SCALANCE XF204: All versions
SCALANCE XF204-2: All versions
SCALANCE XF206-1: All versions
SCALANCE XF208: All versions
SCALANCE X200-4P IRT: before 5.5.1
SCALANCE X201-3P IRT: before 5.5.1
SCALANCE X201-3P IRT PRO: before 5.5.1
SCALANCE X202-2 IRT: before 5.5.1
SCALANCE X202-2P IRT: before 5.5.1
SCALANCE X202-2P IRT PRO: before 5.5.1
SCALANCE X204 IRT: before 5.5.1
SCALANCE X204 IRT PRO: before 5.5.1
SCALANCE XF201-3P IRT: before 5.5.1
SCALANCE XF202-2P IRT: before 5.5.1
SCALANCE XF204 IRT: before 5.5.1
SCALANCE XF204-2BA IRT: before 5.5.1
External linkshttp://ics-cert.us-cert.gov/advisories/icsa-21-103-07
http://cert-portal.siemens.com/productcert/pdf/ssa-187092.pdf
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.