Insecure Session ID Generation in Siemens SCALANCE Products
CVE-2022-26647
8.8HIGH
Key Information:
- Vendor
- Siemens
- Vendor
- CVE Published:
- 12 July 2022
Summary
A vulnerability exists in various Siemens SCALANCE devices, where the web server generates session IDs and nonces using insecure methods. This flaw allows unauthenticated remote attackers to potentially brute-force session IDs, leading to session hijacking. Users of affected products should promptly apply available patches to mitigate risks associated with this vulnerability. For detailed information, refer to the advisory from Siemens.
Affected Version(s)
SCALANCE X200-4P IRT All versions < V5.5.2
SCALANCE X201-3P IRT All versions < V5.5.2
SCALANCE X201-3P IRT PRO All versions < V5.5.2
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved