5.9
MEDIUM
CVE-2020-28391
"Siemens SCALANCE Hardcoded Key Vulnerability"
Description

A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0), SCALANCE X-200RNA switch family (All versions < V3.2.7). Devices create a new unique key upon factory reset, except when used with C-PLUG. When used with C-PLUG the devices use the hardcoded private RSA-key shipped with the firmware-image. An attacker could leverage this situation to a man-in-the-middle situation and decrypt previously captured traffic.

INFO

Published Date :

Jan. 12, 2021, 9:15 p.m.

Last Modified :

Dec. 13, 2022, 5:15 p.m.

Remotely Exploitable :

Yes !

Impact Score :

3.6

Exploitability Score :

2.2
Affected Products

The following products are affected by CVE-2020-28391 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Siemens scalance_x202-2irt_firmware
2 Siemens scalance_x204irt_firmware
3 Siemens scalance_xf201-3p_irt_firmware
4 Siemens scalance_xf202-2p_irt_firmware
5 Siemens scalance_xf204-2ba_irt_firmware
6 Siemens scalance_xf204irt_firmware
7 Siemens scalance_xf204_firmware
8 Siemens scalance_xf204-2_firmware
9 Siemens scalance_xf206-1_firmware
10 Siemens scalance_xf208_firmware
11 Siemens scalance_x307-3_firmware
12 Siemens scalance_x307-3ld_firmware
13 Siemens scalance_x308-2_firmware
14 Siemens scalance_x308-2ld_firmware
15 Siemens scalance_x308-2lh_firmware
16 Siemens scalance_x308-2lh\+_firmware
17 Siemens scalance_x308-2m_firmware
18 Siemens scalance_x308-2m_ts_firmware
19 Siemens scalance_x310_firmware
20 Siemens scalance_x310fe_firmware
21 Siemens scalance_x320-1fe_firmware
22 Siemens scalance_x320-3ldfe_firmware
23 Siemens scalance_xb205-3_firmware
24 Siemens scalance_xb205-3ld_firmware
25 Siemens scalance_xb208_firmware
26 Siemens scalance_xb213-3_firmware
27 Siemens scalance_xb213-3ld_firmware
28 Siemens scalance_xb216_firmware
29 Siemens scalance_xc206-2_firmware
30 Siemens scalance_xc206-2g_poe_eec_firmware
31 Siemens scalance_xc206-2sfp_firmware
32 Siemens scalance_xc206-2sfp_eec_firmware
33 Siemens scalance_xc206-2sfp_g_firmware
34 Siemens scalance_xc206-2sfp_g_eec_firmware
35 Siemens scalance_xc208_firmware
36 Siemens scalance_xc216_firmware
37 Siemens scalance_xc216-4c_firmware
38 Siemens scalance_xc216-4c_g_firmware
39 Siemens scalance_xc216-4c_g_eec_firmware
40 Siemens scalance_xc216eec_firmware
41 Siemens scalance_xc224-4c_g_eec_firmware
42 Siemens scalance_xf204_dna_firmware
43 Siemens scalance_xp208_firmware
44 Siemens scalance_xp208eec_firmware
45 Siemens scalance_xp208poe_eec_firmware
46 Siemens scalance_xp216_firmware
47 Siemens scalance_xp216eec_firmware
48 Siemens scalance_xp216poe_eec_firmware
49 Siemens scalance_x200-4pirt_firmware
50 Siemens scalance_x201-3pirt_firmware
51 Siemens scalance_x202-2pirt_firmware
52 Siemens scalance_x202-2pirt_siplus_net_firmware
53 Siemens scalance_xc206-2g_poe__firmware
54 Siemens scalance_xc206-2sfp_g_\(e\/ip\)_firmware
55 Siemens scalance_xc208eec_firmware
56 Siemens scalance_xc208g_firmware
57 Siemens scalance_xc208g_\(e\/ip\)_firmware
58 Siemens scalance_xc208g_eec_firmware
59 Siemens scalance_xc208g_poe_firmware
60 Siemens scalance_xc216-4c_g_\(e\/ip\)_firmware
61 Siemens scalance_xc224-4c_g__firmware
62 Siemens scalance_xc224-4c_g_\(e\/ip\)_firmware
63 Siemens scalance_xc224__firmware
64 Siemens scalance_xf204-2ba_dna_firmware
65 Siemens scalance_xp208_\(eip\)_firmware
66 Siemens scalance_xp216_\(eip\)_firmware
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2020-28391.

URL Resource
https://cert-portal.siemens.com/productcert/pdf/ssa-274900.pdf Vendor Advisory
https://us-cert.cisa.gov/ics/advisories/icsa-21-012-02 Third Party Advisory US Government Resource Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2020-28391 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2020-28391 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Dec. 13, 2022

    Action Type Old Value New Value
    Changed Description A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0), SCALANCE X-200RNA switch family (All versions < V3.2.7). Devices create a new unique key upon factory reset, except when used with C-PLUG. When used with C-PLUG the devices use the hardcoded private RSA-key shipped with the firmware-image. An attacker could leverage this situation to a man-in-the-middle situation and decrypt previously captured traffic. A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0), SCALANCE X-200RNA switch family (All versions < V3.2.7). Devices create a new unique key upon factory reset, except when used with C-PLUG. When used with C-PLUG the devices use the hardcoded private RSA-key shipped with the firmware-image. An attacker could leverage this situation to a man-in-the-middle situation and decrypt previously captured traffic.
  • CVE Modified by [email protected]

    Dec. 13, 2022

    Action Type Old Value New Value
    Changed Description A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0). Devices create a new unique key upon factory reset, except when used with C-PLUG. When used with C-PLUG the devices use the hardcoded private RSA-key shipped with the firmware-image. An attacker could leverage this situation to a man-in-the-middle situation and decrypt previously captured traffic. A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0), SCALANCE X-200RNA switch family (All versions < V3.2.7). Devices create a new unique key upon factory reset, except when used with C-PLUG. When used with C-PLUG the devices use the hardcoded private RSA-key shipped with the firmware-image. An attacker could leverage this situation to a man-in-the-middle situation and decrypt previously captured traffic.
  • Modified Analysis by [email protected]

    Jul. 28, 2022

    Action Type Old Value New Value
    Changed Reference Type https://us-cert.cisa.gov/ics/advisories/icsa-21-012-02 Vendor Advisory https://us-cert.cisa.gov/ics/advisories/icsa-21-012-02 Third Party Advisory, US Government Resource, Vendor Advisory
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_x200-4pirt_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_x200-4pirt:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_x200-4pirt_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.5.0 OR cpe:2.3:h:siemens:scalance_x200-4pirt:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_x201-3pirt_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_x201-3pirt:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_x201-3pirt_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.5.0 OR cpe:2.3:h:siemens:scalance_x201-3pirt:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_x202-2irt_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_x202-2irt:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_x202-2irt_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.5.0 OR cpe:2.3:h:siemens:scalance_x202-2irt:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_x202-2pirt_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_x202-2pirt:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_x202-2pirt_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.5.0 OR cpe:2.3:h:siemens:scalance_x202-2pirt:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_x202-2pirt_siplus_net_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_x202-2pirt_siplus_net:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_x202-2pirt_siplus_net_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.5.0 OR cpe:2.3:h:siemens:scalance_x202-2pirt_siplus_net:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_x204irt_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_x204irt:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_x204irt_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.5.0 OR cpe:2.3:h:siemens:scalance_x204irt:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xb205-3_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xb205-3:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xb205-3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xb205-3:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xb205-3ld_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xb205-3ld:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xb205-3ld_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xb205-3ld:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xb208_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xb208:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xb208_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xb208:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xb213-3_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xb213-3:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xb213-3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xb213-3:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xb213-3ld_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xb213-3ld:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xb213-3ld_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xb213-3ld:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xb216_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xb216:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xb216_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xb216:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc206-2_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc206-2:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xc206-2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xc206-2:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc206-2g_poe__firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc206-2g_poe_:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xc206-2g_poe__firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xc206-2g_poe_:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc206-2g_poe_eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc206-2g_poe_eec:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xc206-2g_poe_eec_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xc206-2g_poe_eec:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc206-2sfp_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc206-2sfp:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xc206-2sfp_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xc206-2sfp:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc206-2sfp_eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc206-2sfp_eec:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xc206-2sfp_eec_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xc206-2sfp_eec:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc206-2sfp_g_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc206-2sfp_g:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xc206-2sfp_g_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xc206-2sfp_g:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc206-2sfp_g_\(e\/ip\)_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc206-2sfp_g_\(e\/ip\):-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xc206-2sfp_g_\(e\/ip\)_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xc206-2sfp_g_\(e\/ip\):-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc206-2sfp_g_eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc206-2sfp_g_eec:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xc206-2sfp_g_eec_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xc206-2sfp_g_eec:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc208_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc208:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xc208_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xc208:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc208eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc208eec:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xc208eec_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xc208eec:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc208g_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc208g:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xc208g_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xc208g:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc208g_\(e\/ip\)_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc208g_\(e\/ip\):-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xc208g_\(e\/ip\)_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xc208g_\(e\/ip\):-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc208g_eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc208g_eec:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xc208g_eec_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xc208g_eec:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc208g_poe_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc208g_poe:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xc208g_poe_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xc208g_poe:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc216_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc216:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xc216_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xc216:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc216-4c_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc216-4c:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xc216-4c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xc216-4c:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc216-4c_g_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc216-4c_g:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xc216-4c_g_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xc216-4c_g:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc216-4c_g_\(e\/ip\)_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc216-4c_g_\(e\/ip\):-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xc216-4c_g_\(e\/ip\)_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xc216-4c_g_\(e\/ip\):-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc216-4c_g_eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc216-4c_g_eec:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xc216-4c_g_eec_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xc216-4c_g_eec:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc216eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc216eec:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xc216eec_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xc216eec:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc224-4c_g__firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc224-4c_g_:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xc224-4c_g__firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xc224-4c_g_:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc224-4c_g_\(e\/ip\)_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc224-4c_g_\(e\/ip\):-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xc224-4c_g_\(e\/ip\)_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xc224-4c_g_\(e\/ip\):-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc224-4c_g_eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc224-4c_g_eec:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xc224-4c_g_eec_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xc224-4c_g_eec:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc224__firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc224_:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xc224__firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xc224_:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xf201-3p_irt_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xf201-3p_irt:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xf201-3p_irt_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xf201-3p_irt:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xf202-2p_irt_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xf202-2p_irt:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xf202-2p_irt_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xf202-2p_irt:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xf204_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xf204:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xf204_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xf204:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xf204-2_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xf204-2:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xf204-2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xf204-2:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xf204-2ba_dna_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xf204-2ba_dna:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xf204-2ba_dna_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xf204-2ba_dna:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xf204-2ba_irt_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xf204-2ba_irt:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xf204-2ba_irt_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xf204-2ba_irt:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xf204_dna_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xf204_dna:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xf204_dna_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xf204_dna:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xf204irt_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xf204irt:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xf204irt_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xf204irt:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xf206-1_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xf206-1:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xf206-1_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xf206-1:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xf208_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xf208:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xf208_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xf208:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xp208_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xp208:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xp208_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xp208:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xp208_\(eip\)_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xp208_\(eip\):-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xp208_\(eip\)_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xp208_\(eip\):-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xp208eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xp208eec:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xp208eec_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xp208eec:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xp208poe_eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xp208poe_eec:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xp208poe_eec_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xp208poe_eec:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xp216_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xp216:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xp216_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xp216:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xp216_\(eip\)_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xp216_\(eip\):-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xp216_\(eip\)_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xp216_\(eip\):-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xp216eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xp216eec:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xp216eec_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xp216eec:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xp216poe_eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xp216poe_eec:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:siemens:scalance_xp216poe_eec_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.2.5 OR cpe:2.3:h:siemens:scalance_xp216poe_eec:-:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Sep. 14, 2021

    Action Type Old Value New Value
    Changed Description A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All Versions), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0). Devices create a new unique key upon factory reset, except when used with C-PLUG. When used with C-PLUG the devices use the hardcoded private RSA-key shipped with the firmware-image. An attacker could leverage this situation to a man-in-the-middle situation and decrypt previously captured traffic. A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0). Devices create a new unique key upon factory reset, except when used with C-PLUG. When used with C-PLUG the devices use the hardcoded private RSA-key shipped with the firmware-image. An attacker could leverage this situation to a man-in-the-middle situation and decrypt previously captured traffic.
  • CVE Modified by [email protected]

    Feb. 09, 2021

    Action Type Old Value New Value
    Changed Description A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All Versions), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions). Devices create a new unique key upon factory reset, except when used with C-PLUG. When used with C-PLUG the devices use the hardcoded private RSA-key shipped with the firmware-image. An attacker could leverage this situation to a man-in-the-middle situation and decrypt previously captured traffic. A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All Versions), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0). Devices create a new unique key upon factory reset, except when used with C-PLUG. When used with C-PLUG the devices use the hardcoded private RSA-key shipped with the firmware-image. An attacker could leverage this situation to a man-in-the-middle situation and decrypt previously captured traffic.
  • Initial Analysis by [email protected]

    Jan. 20, 2021

    Action Type Old Value New Value
    Added CVSS V2 NIST (AV:N/AC:M/Au:N/C:P/I:N/A:N)
    Added CVSS V3.1 NIST AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
    Changed Reference Type https://cert-portal.siemens.com/productcert/pdf/ssa-274900.pdf No Types Assigned https://cert-portal.siemens.com/productcert/pdf/ssa-274900.pdf Vendor Advisory
    Changed Reference Type https://us-cert.cisa.gov/ics/advisories/icsa-21-012-02 No Types Assigned https://us-cert.cisa.gov/ics/advisories/icsa-21-012-02 Vendor Advisory
    Added CWE NIST CWE-798
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_x200-4pirt_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_x200-4pirt:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_x201-3pirt_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_x201-3pirt:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_x202-2irt_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_x202-2irt:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_x202-2pirt_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_x202-2pirt:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_x202-2pirt_siplus_net_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_x202-2pirt_siplus_net:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_x204irt_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_x204irt:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_x307-3_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_x307-3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_x307-3ld_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_x307-3ld:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_x308-2_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_x308-2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_x308-2ld_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_x308-2ld:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_x308-2lh_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_x308-2lh:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_x308-2lh\+_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_x308-2lh\+:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_x308-2m_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_x308-2m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_x308-2m_ts_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_x308-2m_ts:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_x310_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_x310:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_x310fe_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_x310fe:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_x320-1fe_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_x320-1fe:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_x320-3ldfe_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_x320-3ldfe:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xb205-3_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xb205-3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xb205-3ld_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xb205-3ld:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xb208_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xb208:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xb213-3_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xb213-3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xb213-3ld_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xb213-3ld:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xb216_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xb216:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc206-2_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc206-2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc206-2g_poe__firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc206-2g_poe_:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc206-2g_poe_eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc206-2g_poe_eec:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc206-2sfp_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc206-2sfp:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc206-2sfp_eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc206-2sfp_eec:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc206-2sfp_g_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc206-2sfp_g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc206-2sfp_g_\(e\/ip\)_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc206-2sfp_g_\(e\/ip\):-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc206-2sfp_g_eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc206-2sfp_g_eec:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc208_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc208:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc208eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc208eec:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc208g_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc208g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc208g_\(e\/ip\)_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc208g_\(e\/ip\):-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc208g_eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc208g_eec:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc208g_poe_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc208g_poe:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc216_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc216:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc216-4c_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc216-4c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc216-4c_g_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc216-4c_g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc216-4c_g_\(e\/ip\)_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc216-4c_g_\(e\/ip\):-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc216-4c_g_eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc216-4c_g_eec:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc216eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc216eec:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc224-4c_g__firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc224-4c_g_:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc224-4c_g_\(e\/ip\)_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc224-4c_g_\(e\/ip\):-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc224-4c_g_eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc224-4c_g_eec:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xc224__firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xc224_:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xf201-3p_irt_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xf201-3p_irt:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xf202-2p_irt_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xf202-2p_irt:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xf204_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xf204:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xf204-2_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xf204-2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xf204-2ba_dna_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xf204-2ba_dna:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xf204-2ba_irt_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xf204-2ba_irt:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xf204_dna_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xf204_dna:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xf204irt_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xf204irt:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xf206-1_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xf206-1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xf208_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xf208:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xp208_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xp208:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xp208_\(eip\)_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xp208_\(eip\):-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xp208eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xp208eec:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xp208poe_eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xp208poe_eec:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xp216_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xp216:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xp216_\(eip\)_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xp216_\(eip\):-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xp216eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xp216eec:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:scalance_xp216poe_eec_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:scalance_xp216poe_eec:-:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Jan. 14, 2021

    Action Type Old Value New Value
    Added Reference https://us-cert.cisa.gov/ics/advisories/icsa-21-012-02 [No Types Assigned]
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2020-28391 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2020-28391 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.10 }} -0.00%

score

0.40389

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability