Security Context Vulnerability in Siemens SCALANCE Devices
CVE-2024-30191
8.4HIGH
Key Information:
- Vendor
- Siemens
- Vendor
- CVE Published:
- 9 April 2024
Summary
A vulnerability affects multiple models in the Siemens SCALANCE product line, allowing a physically near attacker to bind an unauthorized security context with network frames meant for legitimate devices. This scenario, identified as Scenario 3 'Override client’s security context' linked to CVE-2022-47522, could enable exploitation through deceptive associations, potentially leading to unauthorized decryption of sensitive frame data. Users of SCALANCE devices are advised to review their configurations and implement appropriate security measures to mitigate this risk.
Affected Version(s)
SCALANCE W1748-1 M12 0
SCALANCE W1748-1 M12 0
SCALANCE W1788-1 M12 0
References
CVSS V3.1
Score:
8.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved