Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2013-5709
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
The authentication implementation in the web server on Siemens SCALANCE X-200 switches with firmware before 5.0.0 does not use a sufficient source of entropy for generating values of random numbers, which makes it easier for remote attackers to hijack sessions by predicting a value..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 8.3/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 8.5/10
- Confidentiality Impact
- Partial
- Availability Impact
- Complete
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:o:siemens:scalance_x-200_series_firmware:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:siemens:scalance_x-200_series_firmware:4.3:*:*:*:* |
Yes
|
- | ||
cpe:2.3:h:siemens:scalance_x-200:-:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:h:siemens:scalance_x-200rna:-:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:h:siemens:scalance_x200-4p_irt:-:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:h:siemens:scalance_x201-3p_irt:-:-:pro:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:h:siemens:scalance_x201-3p_irt:-:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:h:siemens:scalance_x202-2irt:-:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:h:siemens:scalance_x202-2p_irt:-:-:pro:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:h:siemens:scalance_x202-2p_irt:-:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:h:siemens:scalance_x204irt:-:-:pro:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:h:siemens:scalance_x204irt:-:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:h:siemens:scalance_xf-200:-:*:*:*:*:*:*:* |
Yes
|
- |