Vulnerability Name:

CVE-2015-1049 (CCN-100725)

Assigned:2015-02-02
Published:2015-02-02
Updated:2020-02-10
Summary:The web server on Siemens SCALANCE X-200IRT switches with firmware before 5.2.0 allows remote attackers to hijack sessions via unspecified vectors.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-20
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2015-1049

Source: CCN
Type: BID-72512
Siemens SCALANCE X-200IRT CVE- 2015-1049 User Impersonation Vulnerability

Source: CCN
Type: Siemens Security Advisory SSA-954136
User Impersonation Vulnerability in SCALANCE X-200IRT Switch Family

Source: CONFIRM
Type: Vendor Advisory
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-954136.pdf

Source: CONFIRM
Type: UNKNOWN
https://cert-portal.siemens.com/productcert/pdf/ssa-954136.pdf

Source: XF
Type: UNKNOWN
scalancex-cve20151049-session-hijacking(100725)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:siemens:scalance_x-200_series_firmware:*:*:*:*:*:*:*:* (Version <= 5.1.1)
  • AND
  • cpe:/h:siemens:scalance_x201-3p_irt_pro:*:*:*:*:*:*:*:*
  • OR cpe:/h:siemens:scalance_x201-3pirt:*:*:*:*:*:*:*:*
  • OR cpe:/h:siemens:scalance_x202-2irt:*:*:*:*:*:*:*:*
  • OR cpe:/h:siemens:scalance_x202-2p_irt:*:*:*:*:*:*:*:*
  • OR cpe:/h:siemens:scalance_x202-2p_irt_pro:*:*:*:*:*:*:*:*
  • OR cpe:/h:siemens:scalance_x202-4p_irt:*:*:*:*:*:*:*:*
  • OR cpe:/h:siemens:scalance_x204irt:*:*:*:*:*:*:*:*
  • OR cpe:/h:siemens:scalance_x204irt_pro:*:*:*:*:*:*:*:*
  • OR cpe:/h:siemens:scalance_xf204irt:*:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/h:siemens:scalance_x200-4p_irt:-:*:*:*:*:*:*:*
  • OR cpe:/h:siemens:scalance_x201-3p_irt:-:*:*:*:*:*:*:*
  • OR cpe:/h:siemens:scalance_x202-2irt:*:*:*:*:*:*:*:*
  • OR cpe:/h:siemens:scalance_x202-2p_irt:*:*:*:*:*:*:*:*
  • OR cpe:/h:siemens:scalance_x204irt:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    siemens scalance x-200 series firmware *
    siemens scalance x201-3p irt pro *
    siemens scalance x201-3pirt *
    siemens scalance x202-2irt *
    siemens scalance x202-2p irt *
    siemens scalance x202-2p irt pro *
    siemens scalance x202-4p irt *
    siemens scalance x204irt *
    siemens scalance x204irt pro *
    siemens scalance xf204irt *
    siemens scalance x200-4p irt -
    siemens scalance x201-3p irt -
    siemens scalance x202-2irt *
    siemens scalance x202-2p irt *
    siemens scalance x204irt *