Insecure Session ID Generation in Siemens SCALANCE Products
CVE-2022-26647

8.8HIGH

Key Information:

Summary

A vulnerability exists in various Siemens SCALANCE devices, where the web server generates session IDs and nonces using insecure methods. This flaw allows unauthenticated remote attackers to potentially brute-force session IDs, leading to session hijacking. Users of affected products should promptly apply available patches to mitigate risks associated with this vulnerability. For detailed information, refer to the advisory from Siemens.

Affected Version(s)

SCALANCE X200-4P IRT All versions < V5.5.2

SCALANCE X201-3P IRT All versions < V5.5.2

SCALANCE X201-3P IRT PRO All versions < V5.5.2

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.