Siemens SCALANCE X-200 and X-200IRT Families (Update A)
Cross-site scripting (XSS) vulnerability in the web management interface of Siemens SCALANCE X-200 and X-200IRT switch families. An attacker can inject malicious JavaScript code to steal session cookies and hijack authenticated user sessions, potentially enabling unauthorized access to switch configuration and control. The vulnerability affects SCALANCE X200, X201, X202, X204, X206, X208, X212, X216, X224 models and XF-series variants across firmware versions prior to 5.2.5 (X204/X206/X208/X212/X216/X224) or 5.5.0 (X200/X201/X202/X204IRT/XF/SIPLUS NET models). Siemens has released firmware updates for all affected models.
- Network access to the SCALANCE switch web interface (typically port 80 or 443)
- A valid user must be logged into the web interface and click a malicious link
- The vulnerable switch must be running firmware version before 5.2.5 (X204/X206/X208/X212/X216/X224 families) or before 5.5.0 (X200/X201/X202/X204IRT/XF series)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/bdced2a3-b372-4681-b0eb-c24b62f2c316Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.