Siemens SCALANCE X-200 Authentication Bypass Vulnerability
SCALANCE X-200 and X-200IRT industrial Ethernet switches contain an authentication bypass vulnerability (CWE-592) in firmware versions prior to V4.5.0 and V5.1.0 respectively. The vulnerability allows unauthenticated attackers with network access to bypass authentication controls and gain unauthorized access to switch management functions, potentially allowing reconfiguration of network settings, modification of vlan assignments, or disruption of industrial network traffic. No firmware patches are available from Siemens; these are end-of-life product lines.
- Network access to the SCALANCE X-200 switch management interface (typically TCP port 80 or 443)
- The switch must be running vulnerable firmware versions (X-200 <V4.5.0 or X-200IRT <V5.1.0)
- No valid user credentials are required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/1167a958-b0c8-4247-84b3-5e2ba0af62a3Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.