Siemens SCALANCE X Products (Update B)
SCALANCE X-200, X-200IRT, and X-300 managed switches contain buffer and heap overflow vulnerabilities in their web server. An unauthenticated attacker on the network can send a crafted request to trigger a reboot or denial-of-service condition. Affected products are SCALANCE X-200 switches (including SIPLUS NET variants) with firmware below v5.2.5, SCALANCE X-200IRT switches (including SIPLUS NET variants) with firmware below v5.5.0, and SCALANCE X-300 switches (including X408 and SIPLUS NET variants) with firmware below v4.1.0.
- Network access to the switch's HTTPS port (443/TCP)
- No credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/b1f11924-d0a1-404a-a2e3-3181fcb9fc9eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.