CVE-2019-13926

A vulnerability has been identified in SCALANCE S602 (All versions >= V3.0 and < V4.1), SCALANCE S612 (All versions >= V3.0 and < V4.1), SCALANCE S623 (All versions >= V3.0 and < V4.1), SCALANCE S627-2M (All versions >= V3.0 and < V4.1). Specially crafted packets sent to port 443/tcp of affected devices could cause a Denial-of-Service condition of the web server. A cold reboot is required to restore the functionality of the device.
References
Link Resource
https://cert-portal.siemens.com/productcert/pdf/ssa-591405.pdf Vendor Advisory
https://www.us-cert.gov/ics/advisories/icsa-20-042-10 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:siemens:scalance_s602_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_s602:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:siemens:scalance_s612_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_s612:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:siemens:scalance_s623_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_s623:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:siemens:scalance_s627-2m_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_s627-2m:-:*:*:*:*:*:*:*

History

05 May 2021, 15:03

Type Values Removed Values Added
References (MISC) https://www.us-cert.gov/ics/advisories/icsa-20-042-10 - (MISC) https://www.us-cert.gov/ics/advisories/icsa-20-042-10 - Third Party Advisory, US Government Resource

22 Apr 2021, 21:15

Type Values Removed Values Added
Summary A vulnerability has been identified in SCALANCE S602 (All versions >= V3.0), SCALANCE S612 (All versions >= V3.0), SCALANCE S623 (All versions >= V3.0), SCALANCE S627-2M (All versions >= V3.0). Specially crafted packets sent to port 443/tcp of affected devices could cause a Denial-of-Service condition of the web server. A cold reboot is required to restore the functionality of the device. A vulnerability has been identified in SCALANCE S602 (All versions >= V3.0 and < V4.1), SCALANCE S612 (All versions >= V3.0 and < V4.1), SCALANCE S623 (All versions >= V3.0 and < V4.1), SCALANCE S627-2M (All versions >= V3.0 and < V4.1). Specially crafted packets sent to port 443/tcp of affected devices could cause a Denial-of-Service condition of the web server. A cold reboot is required to restore the functionality of the device.

Information

Published : 2020-02-11 16:15

Updated : 2023-12-10 13:13


NVD link : CVE-2019-13926

Mitre link : CVE-2019-13926

CVE.ORG link : CVE-2019-13926


JSON object : View

Products Affected

siemens

  • scalance_s623_firmware
  • scalance_s627-2m
  • scalance_s612
  • scalance_s602
  • scalance_s623
  • scalance_s627-2m_firmware
  • scalance_s612_firmware
  • scalance_s602_firmware
CWE
CWE-400

Uncontrolled Resource Consumption