Siemens SCALANCE X-200RNA Switch Devices
SCALANCE X204RNA Ethernet switch devices contain multiple vulnerabilities in input validation, resource handling, and session management. Versions before 3.2.7 are affected. The vulnerabilities allow remote attackers to cause denial of service, extract sensitive configuration data or credentials, or hijack authenticated user sessions to the management interface. The device management web interface (ports 80/443) and SNMP service (port 161) are the primary attack vectors. No public exploits are known at this time.
- Network access to the SCALANCE X204RNA switch
- Access to at least one of: ports 80/TCP, 443/TCP, 161/UDP, or 22/TCP
- No authentication required for some vulnerabilities
- User interaction may be required for session hijacking attacks
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c3734ba6-7060-4f4e-b911-06c09be34063Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.