Siemens has recommendations and a migration path to handle resource exhaustion and cross-site scripting vulnerabilities in its SCALANCE S-600 Firewall, according to a report with CISA.

These vulnerabilities could allow a remote attacker to conduct denial-of-service or cross-site scripting attacks. User interaction is required for a successful exploitation of the cross-site-scripting attack. Melih Berk Ekşioğlu reported some of these vulnerabilities to Siemens.

The following versions of SCALANCE S-600, suffer from the issues:

  • SCALANCE S602, all versions v3.0 or higher
  • SCALANCE S612, all versions v3.0 or higher
  • SCALANCE S623, all versions v3.0 or higher
  • SCALANCE S627-2M, all versions v3.0 or higher
  • In one vulnerability, the integrated configuration web server of the affected devices could allow cross-site scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link.

    Schneider Bold

    CVE-2019-6585 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 4.7.

    In addition, specially crafted packets sent to Port 443/TCP of affected devices could cause a denial-of-service condition of the web server.

    CVE-2019-13925 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 7.5.

    Also, specially crafted packets sent to Port 443/TCP of affected devices could cause a denial-of-service condition of the web server. A cold reboot is required to restore the functionality of the device.

    CVE-2019-13926 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 7.5.

    The product sees use mainly in the information technology sector. It also sees action on a global basis.

    No known public exploits specifically target these vulnerabilities.

    For SCALANCE S602 v3.0, Siemens recommends only accessing links from trusted sources in the browser you use to access the SCALANCE S administration website.

    For SCALANCE S612, all versions v3.0 or higher, SCALANCE S623, all versions v3.0 or higher, and SCALANCE S627-2M, all versions v3.0 or higher, Siemens recommends migrating to SCALANCE SC-600 Industrial Security Appliances.

    For more information on these vulnerabilities and associated software updates, please see Siemens security advisory SSA-591405.

    Pin It on Pinterest

    Share This