Weak SSH Cipher Configuration in SCALANCE X200 and X201 Series by Siemens
CVE-2023-29054

6.7MEDIUM

Key Information:

Summary

A vulnerability exists in multiple models of the SCALANCE series by Siemens, where the SSH server is improperly configured to use weak cryptographic ciphers by default. This misconfiguration poses a significant risk as it potentially allows unauthorized attackers to intercept and modify data between legitimate clients and the affected devices, facilitating man-in-the-middle attacks. Users are advised to upgrade to version V5.5.2 or later to mitigate these risks. For detailed information, please refer to the official Siemens advisory.

Affected Version(s)

SCALANCE X200-4P IRT All versions < V5.5.2

SCALANCE X201-3P IRT All versions < V5.5.2

SCALANCE X201-3P IRT PRO All versions < V5.5.2

References

CVSS V3.1

Score:
6.7
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
High
Availability:
Low
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.