Vulnerabilities > Siemens > Scalance Xr324Wg Firmware
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-12-13 | CVE-2022-46140 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Siemens products Affected devices use a weak encryption scheme to encrypt the debug zip file. | 6.5 |
2022-12-13 | CVE-2022-46142 | Storing Passwords in a Recoverable Format vulnerability in Siemens products Affected devices store the CLI user passwords encrypted in flash memory. | 5.7 |
2022-12-13 | CVE-2022-46143 | Improper Validation of Specified Quantity in Input vulnerability in Siemens products Affected devices do not check the TFTP blocksize correctly. | 2.7 |
2022-08-10 | CVE-2022-36323 | Unspecified vulnerability in Siemens products Affected devices do not properly sanitize an input field. | 9.1 |
2022-08-10 | CVE-2022-36324 | Allocation of Resources Without Limits or Throttling vulnerability in Siemens products Affected devices do not properly handle the renegotiation of SSL/TLS parameters. | 7.5 |
2022-08-10 | CVE-2022-36325 | Unspecified vulnerability in Siemens products Affected devices do not properly sanitize data introduced by an user when rendering the web interface. | 4.8 |
2021-01-12 | CVE-2020-28395 | Use of Hard-coded Cryptographic Key vulnerability in Siemens products A vulnerability has been identified in SCALANCE X-200RNA switch family (All versions < V3.2.7), SCALANCE X-300 switch family (incl. | 5.9 |