Siemens Web Server of SCALANCE X200 (Update A)
Multiple SCALANCE X-200 industrial Ethernet switches contain buffer overflow vulnerabilities in the web server component (CWE-122, CWE-121). An attacker could remotely execute arbitrary code on the device by sending a specially crafted request to the web server (ports 80/HTTP or 443/HTTPS) without requiring authentication. This affects SCALANCE X200, X201, X202, X204, X206, X208, X212, X216, X224 series and XF-series models with firmware versions below 5.5.1 (for IRT variants) or 5.2.5 (for non-IRT variants).
- Network access to the SCALANCE X-200 web server on port 80 (HTTP) or port 443 (HTTPS)
- Device must be running a vulnerable firmware version (below 5.5.1 for IRT models, below 5.2.5 for non-IRT models)
- No authentication credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/0caa18be-f514-4e55-a019-cab348bf10c6Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.