Vulnerability Details CVE-2022-25753
A vulnerability has been identified in SCALANCE X302-7 EEC (230V), SCALANCE X302-7 EEC (230V, coated), SCALANCE X302-7 EEC (24V), SCALANCE X302-7 EEC (24V, coated), SCALANCE X302-7 EEC (2x 230V), SCALANCE X302-7 EEC (2x 230V, coated), SCALANCE X302-7 EEC (2x 24V), SCALANCE X302-7 EEC (2x 24V, coated), SCALANCE X304-2FE, SCALANCE X306-1LD FE, SCALANCE X307-2 EEC (230V), SCALANCE X307-2 EEC (230V, coated), SCALANCE X307-2 EEC (24V), SCALANCE X307-2 EEC (24V, coated), SCALANCE X307-2 EEC (2x 230V), SCALANCE X307-2 EEC (2x 230V, coated), SCALANCE X307-2 EEC (2x 24V), SCALANCE X307-2 EEC (2x 24V, coated), SCALANCE X307-3, SCALANCE X307-3, SCALANCE X307-3LD, SCALANCE X307-3LD, SCALANCE X308-2, SCALANCE X308-2, SCALANCE X308-2LD, SCALANCE X308-2LD, SCALANCE X308-2LH, SCALANCE X308-2LH, SCALANCE X308-2LH+, SCALANCE X308-2LH+, SCALANCE X308-2M, SCALANCE X308-2M, SCALANCE X308-2M PoE, SCALANCE X308-2M PoE, SCALANCE X308-2M TS, SCALANCE X308-2M TS, SCALANCE X310, SCALANCE X310, SCALANCE X310FE, SCALANCE X310FE, SCALANCE X320-1 FE, SCALANCE X320-1-2LD FE, SCALANCE X408-2, SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M TS (24V), SCALANCE XR324-12M TS (24V), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M PoE (230V, ports on front), SCALANCE XR324-4M PoE (230V, ports on rear), SCALANCE XR324-4M PoE (24V, ports on front), SCALANCE XR324-4M PoE (24V, ports on rear), SCALANCE XR324-4M PoE TS (24V, ports on front), SIPLUS NET SCALANCE X308-2. The handling of arguments such as IP addresses in the CLI of affected devices is prone to buffer overflows. This could allow an authenticated remote attacker to execute arbitrary code on the device.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.046
EPSS Ranking 88.7%
CVSS Severity
CVSS v3 Score 8.8
CVSS v2 Score 6.5
Products affected by CVE-2022-25753
-
cpe:2.3:h:siemens:scalance_x302-7eec:-
-
cpe:2.3:h:siemens:scalance_x304-2fe:-
-
cpe:2.3:h:siemens:scalance_x306-1ldfe:-
-
cpe:2.3:h:siemens:scalance_x307-2eec:-
-
cpe:2.3:h:siemens:scalance_x307-3:-
-
cpe:2.3:h:siemens:scalance_x307-3ld:-
-
cpe:2.3:h:siemens:scalance_x308-2:-
-
cpe:2.3:h:siemens:scalance_x308-2ld:-
-
cpe:2.3:h:siemens:scalance_x308-2lh+:-
-
cpe:2.3:h:siemens:scalance_x308-2lh:-
-
cpe:2.3:h:siemens:scalance_x308-2m:-
-
cpe:2.3:h:siemens:scalance_x308-2m_poe:-
-
cpe:2.3:h:siemens:scalance_x308-2m_ts:-
-
cpe:2.3:h:siemens:scalance_x310:-
-
cpe:2.3:h:siemens:scalance_x310fe:-
-
cpe:2.3:h:siemens:scalance_x320-1-2ldfe:-
-
cpe:2.3:h:siemens:scalance_x320-1fe:-
-
cpe:2.3:h:siemens:scalance_x408-2:-
-
cpe:2.3:h:siemens:scalance_xr324-12m:-
-
cpe:2.3:h:siemens:scalance_xr324-12m_ts:-
-
cpe:2.3:h:siemens:scalance_xr324-4m_eec:-
-
cpe:2.3:h:siemens:scalance_xr324-4m_poe:-
-
cpe:2.3:h:siemens:scalance_xr324-4m_poe_ts:-
-
cpe:2.3:h:siemens:siplus_net_scalance_x308-2:-
-
cpe:2.3:o:siemens:scalance_x302-7eec_firmware:-
-
cpe:2.3:o:siemens:scalance_x304-2fe_firmware:-
-
cpe:2.3:o:siemens:scalance_x306-1ldfe_firmware:-
-
cpe:2.3:o:siemens:scalance_x307-2eec_firmware:-
-
cpe:2.3:o:siemens:scalance_x307-3_firmware:-
-
cpe:2.3:o:siemens:scalance_x307-3ld_firmware:-
-
cpe:2.3:o:siemens:scalance_x308-2_firmware:-
-
cpe:2.3:o:siemens:scalance_x308-2ld_firmware:-
-
cpe:2.3:o:siemens:scalance_x308-2lh+_firmware:-
-
cpe:2.3:o:siemens:scalance_x308-2lh_firmware:-
-
cpe:2.3:o:siemens:scalance_x308-2m_firmware:-
-
cpe:2.3:o:siemens:scalance_x308-2m_poe_firmware:-
-
cpe:2.3:o:siemens:scalance_x308-2m_ts_firmware:-
-
cpe:2.3:o:siemens:scalance_x310_firmware:-
-
cpe:2.3:o:siemens:scalance_x310fe_firmware:-
-
cpe:2.3:o:siemens:scalance_x320-1-2ldfe_firmware:*
-
cpe:2.3:o:siemens:scalance_x320-1fe_firmware:-
-
cpe:2.3:o:siemens:scalance_x408-2_firmware:-
-
cpe:2.3:o:siemens:scalance_x408-2_firmware:4.1.3
-
cpe:2.3:o:siemens:scalance_xr324-12m_firmware:-
-
cpe:2.3:o:siemens:scalance_xr324-12m_firmware:4.1.0
-
cpe:2.3:o:siemens:scalance_xr324-12m_ts_firmware:-
-
cpe:2.3:o:siemens:scalance_xr324-12m_ts_firmware:4.1.0
-
cpe:2.3:o:siemens:scalance_xr324-4m_eec_firmware:-
-
cpe:2.3:o:siemens:scalance_xr324-4m_eec_firmware:4.1.0
-
cpe:2.3:o:siemens:scalance_xr324-4m_poe_firmware:-
-
cpe:2.3:o:siemens:scalance_xr324-4m_poe_firmware:4.1.0
-
cpe:2.3:o:siemens:scalance_xr324-4m_poe_ts_firmware:-
-
cpe:2.3:o:siemens:scalance_xr324-4m_poe_ts_firmware:4.1.0
-
cpe:2.3:o:siemens:siplus_net_scalance_x308-2_firmware:*