Siemens SCALANCE S-600 (Update B)
The SCALANCE S-600 family switches (S602, S612, S623, S627-2M) running firmware versions 3.0 through 4.0 contain web application vulnerabilities (CWE-80 Cross-Site Scripting, CWE-400 Uncontrolled Resource Consumption) in the management interface. These vulnerabilities allow remote attackers to conduct denial-of-service attacks against the switch or perform cross-site scripting attacks via the administrative web interface. Successful exploitation could render the switch unavailable or allow an attacker to execute actions in the administrator's browser context, potentially leading to unauthorized configuration changes or credential theft.
- Network reachability to the SCALANCE S-600 web management interface (HTTP/HTTPS)
- For XSS exploitation, the administrator must click a malicious link or visit a compromised page while managing the device
Patching may require device reboot — plan for process interruption
/api/v1/advisories/dd383f63-9438-4ac9-9513-79dfb845b6c7Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.