Siemens SCALANCE X Switches (Update A)
Cross-site scripting (XSS) vulnerabilities exist in the web server of SCALANCE X switches. An attacker could inject malicious scripts that execute when an administrator accesses the switch web interface, potentially leading to credential theft or unauthorized configuration changes. Affected switch families include X-200, X-200IRT, X-200RNA, and X-300 (including SIPLUS NET variants and X-408 models) running firmware versions prior to the fixed versions listed. Siemens recommends updating to patched firmware and protecting network access to the web management interface.
- Network access to the switch web interface (TCP port 80 or 443)
- A valid administrator must be tricked into clicking a malicious link or visiting a compromised page while authenticated to the switch
- The switch firmware must be running a vulnerable version
Patching may require device reboot — plan for process interruption
/api/v1/advisories/9b083a9f-ee5e-49bf-8036-c03a303a08ffGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.