Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU83416
Risk: Low
CVSSv3.1: 4.5 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:C]
CVE-ID: CVE-2023-44318
CWE-ID:
CWE-321 - Use of Hard-coded Cryptographic Key
Exploit availability: No
DescriptionThe vulnerability allows a remote user to compromise the target system.
The vulnerability exists due to the usage a hardcoded key to obfuscate the configuration backup that an administrator can export from the device. A remote administrator can obtain a configuration backup to extract configuration information from the exported file.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsSCALANCE XR328-4C WG (28xGE: All versions
DC24V): All versions
24V): All versions
AC230V): All versions
4xGE: All versions
SCALANCE XR328-4C WG (24xFE: All versions
SCALANCE XR326-2C PoE WG (without UL): All versions
DC 24V): All versions
AC 230V): All versions
SCALANCE XR324WG (24 x FE: All versions
SCALANCE XC206-2G PoE (54 V DC): All versions
SCALANCE XP216 (Ethernet/IP): All versions
SCALANCE XP208 (Ethernet/IP): All versions
SCALANCE XC224-4C G (EIP Def.): All versions
SCALANCE XC216-4C G (EIP Def.): All versions
SCALANCE XC216-3G PoE (54 V DC): All versions
SCALANCE XC208G PoE (54 V DC): All versions
SCALANCE XC208G (EIP def.): All versions
SCALANCE XC206-2SFP G (EIP DEF.): All versions
SCALANCE XC206-2G PoE EEC (54 V DC): All versions
SCALANCE XC206-2 (ST/BFOC): All versions
SCALANCE XC206-2 (SC): All versions
SCALANCE XB216 (PN): All versions
SCALANCE XB216 (E/IP): All versions
SCALANCE XB213-3LD (SC: All versions
SCALANCE XB213-3 (ST: All versions
SCALANCE XB213-3 (SC: All versions
SCALANCE XB208 (PN): All versions
SCALANCE XB208 (E/IP): All versions
SCALANCE XB205-3LD (SC: All versions
E/IP): All versions
SCALANCE XB205-3 (ST: All versions
PN): All versions
SCALANCE XB205-3 (SC: All versions
SIPLUS NET SCALANCE XC216-4C: All versions
SIPLUS NET SCALANCE XC208: All versions
SIPLUS NET SCALANCE XC206-2SFP: All versions
SIPLUS NET SCALANCE XC206-2: All versions
SCALANCE XR326-2C PoE WG: All versions
SCALANCE XP216POE EEC: All versions
SCALANCE XP216EEC: All versions
SCALANCE XP216: All versions
SCALANCE XP208PoE EEC: All versions
SCALANCE XP208EEC: All versions
SCALANCE XP208: All versions
SCALANCE XF204-2BA DNA: All versions
SCALANCE XF204-2BA: All versions
SCALANCE XF204 DNA: All versions
SCALANCE XC224-4C G EEC: All versions
SCALANCE XC224-4C G: All versions
SCALANCE XC224: All versions
SCALANCE XC216EEC: All versions
SCALANCE XC216-4C G EEC: All versions
SCALANCE XC216-4C G: All versions
SCALANCE XC216-4C: All versions
SCALANCE XC216-3G PoE: All versions
SCALANCE XC216: All versions
SCALANCE XC208G PoE: All versions
SCALANCE XC208G EEC: All versions
SCALANCE XC208G: All versions
SCALANCE XC208EEC: All versions
SCALANCE XC208: All versions
SCALANCE XC206-2SFP G EEC: All versions
SCALANCE XC206-2SFP G: All versions
SCALANCE XC206-2SFP EEC: All versions
SCALANCE XC206-2SFP: All versions
SCALANCE XC206-2G PoE: All versions
SCALANCE XF204: All versions
External linkshttp://cert-portal.siemens.com/productcert/txt/ssa-353002.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU83420
Risk: Low
CVSSv3.1: 2.5 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L/E:U/RL:U/RC:C]
CVE-ID: CVE-2023-44321
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources. A remote administrator can trigger resource exhaustion and perform a denial of service (DoS) attack.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsSCALANCE XR328-4C WG (28xGE: All versions
DC24V): All versions
24V): All versions
AC230V): All versions
4xGE: All versions
SCALANCE XR328-4C WG (24xFE: All versions
SCALANCE XR326-2C PoE WG (without UL): All versions
DC 24V): All versions
AC 230V): All versions
SCALANCE XR324WG (24 x FE: All versions
SCALANCE XC206-2G PoE (54 V DC): All versions
SCALANCE XP216 (Ethernet/IP): All versions
SCALANCE XP208 (Ethernet/IP): All versions
SCALANCE XC224-4C G (EIP Def.): All versions
SCALANCE XC216-4C G (EIP Def.): All versions
SCALANCE XC216-3G PoE (54 V DC): All versions
SCALANCE XC208G PoE (54 V DC): All versions
SCALANCE XC208G (EIP def.): All versions
SCALANCE XC206-2SFP G (EIP DEF.): All versions
SCALANCE XC206-2G PoE EEC (54 V DC): All versions
SCALANCE XC206-2 (ST/BFOC): All versions
SCALANCE XC206-2 (SC): All versions
SCALANCE XB216 (PN): All versions
SCALANCE XB216 (E/IP): All versions
SCALANCE XB213-3LD (SC: All versions
SCALANCE XB213-3 (ST: All versions
SCALANCE XB213-3 (SC: All versions
SCALANCE XB208 (PN): All versions
SCALANCE XB208 (E/IP): All versions
SCALANCE XB205-3LD (SC: All versions
E/IP): All versions
SCALANCE XB205-3 (ST: All versions
PN): All versions
SCALANCE XB205-3 (SC: All versions
SIPLUS NET SCALANCE XC216-4C: All versions
SIPLUS NET SCALANCE XC208: All versions
SIPLUS NET SCALANCE XC206-2SFP: All versions
SIPLUS NET SCALANCE XC206-2: All versions
SCALANCE XR326-2C PoE WG: All versions
SCALANCE XP216POE EEC: All versions
SCALANCE XP216EEC: All versions
SCALANCE XP216: All versions
SCALANCE XP208PoE EEC: All versions
SCALANCE XP208EEC: All versions
SCALANCE XP208: All versions
SCALANCE XF204-2BA DNA: All versions
SCALANCE XF204-2BA: All versions
SCALANCE XF204 DNA: All versions
SCALANCE XC224-4C G EEC: All versions
SCALANCE XC224-4C G: All versions
SCALANCE XC224: All versions
SCALANCE XC216EEC: All versions
SCALANCE XC216-4C G EEC: All versions
SCALANCE XC216-4C G: All versions
SCALANCE XC216-4C: All versions
SCALANCE XC216-3G PoE: All versions
SCALANCE XC216: All versions
SCALANCE XC208G PoE: All versions
SCALANCE XC208G EEC: All versions
SCALANCE XC208G: All versions
SCALANCE XC208EEC: All versions
SCALANCE XC208: All versions
SCALANCE XC206-2SFP G EEC: All versions
SCALANCE XC206-2SFP G: All versions
SCALANCE XC206-2SFP EEC: All versions
SCALANCE XC206-2SFP: All versions
SCALANCE XC206-2G PoE: All versions
SCALANCE XF204: All versions
External linkshttp://cert-portal.siemens.com/productcert/txt/ssa-353002.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.