Multiple Vulnerabilities in Siemens SCALANCE Products
Indian - Computer Emergency Response Team (cert-in.org.in)
Severity Rating: HIGH
Systems Affected
SCALANCE W1750D (JP) (6GK5750-2HX01-1AD0)
SCALANCE W1750D (ROW) (6GK5750-2HX01-1AA0)
SCALANCE W1750D (USA) (6GK5750-2HX01-1AB0)
Overview
Multiple vulnerabilities have been reported in Siemens SCALANCE products which could allow an attacker to inject commands or exploit buffer overflow to execute arbitrary code, perform Cross Site Scripting attacks and cause denial of service condition on the targeted system.
Description
These vulnerabilities exist in Siemens SCALANCE Products due to uncontrolled resource consumption, buffer overflow errors, improper neutralization of input during web page generation, improper neutralization of special elements used in a command and improper input validation.
Successful exploitation of these vulnerabilities could allow an attacker to inject commands or exploit buffer overflow to execute arbitrary code, perform Cross Site Scripting attacks and cause denial of service condition on the targeted system.
Workaround
CVE-2022-37885, CVE-2022-37886, CVE-2022-37887, CVE-2022-37888, CVE-2022-37889: Enable CPSec via the cluster-security command.
CVE-2022-37890, CVE-2022-37891, CVE-2022-37892, CVE-2022-37895, CVE-2022-37896: Restrict the web-based management interface to a dedicated layer 2 segment/VLAN and/or control the interface by firewall policies at layer 3 and above.
CVE-2022-37893: Restrict the command line interface to a dedicated layer 2 segment/VLAN and/or control the interface by firewall policies at layer 3 and above.
Vendor Information
Siemens
References
Siemens
CVE Name
CVE-2002-20001
CVE-2022-37885
CVE-2022-37886
CVE-2022-37887
CVE-2022-37888
CVE-2022-37889
CVE-2022-37890
CVE-2022-37891
CVE-2022-37892
CVE-2022-37893
CVE-2022-37894
CVE-2022-37895
CVE-2022-37896