Vulnerability Details : CVE-2020-28391
A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0), SCALANCE X-200RNA switch family (All versions < V3.2.7). Devices create a new unique key upon factory reset, except when used with C-PLUG. When used with C-PLUG the devices use the hardcoded private RSA-key shipped with the firmware-image. An attacker could leverage this situation to a man-in-the-middle situation and decrypt previously captured traffic.
Products affected by CVE-2020-28391
- cpe:2.3:o:siemens:scalance_xf201-3p_irt_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xf202-2p_irt_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xf204_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xf204-2_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xf204-2ba_irt_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xf206-1_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xf208_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_x200-4pirt_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_x201-3pirt_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_x202-2irt_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_x202-2pirt_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_x202-2pirt_siplus_net_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_x204irt_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_x307-3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_x307-3ld_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_x308-2_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_x308-2ld_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_x308-2lh_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_x308-2lh\+_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_x308-2m_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_x308-2m_ts_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_x310_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_x310fe_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_x320-1fe_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_x320-3ldfe_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xb205-3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xb205-3ld_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xb208_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xb213-3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xb213-3ld_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xb216_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xc206-2_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xc206-2g_poe__firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xc206-2g_poe_eec_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xc206-2sfp_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xc206-2sfp_eec_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xc206-2sfp_g_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xc206-2sfp_g_\(e\/ip\)_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xc206-2sfp_g_eec_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xc208_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xc208eec_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xc208g_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xc208g_\(e\/ip\)_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xc208g_eec_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xc208g_poe_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xc216_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xc216-4c_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xc216-4c_g_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xc216-4c_g_\(e\/ip\)_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xc216-4c_g_eec_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xc216eec_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xc224-4c_g__firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xc224-4c_g_\(e\/ip\)_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xc224-4c_g_eec_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xc224__firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xf204-2ba_dna_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xf204_dna_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xf204irt_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xp208_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xp208_\(eip\)_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xp208eec_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xp208poe_eec_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xp216_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xp216_\(eip\)_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xp216eec_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:scalance_xp216poe_eec_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-28391
0.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 32 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-28391
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:N/A:N |
8.6
|
2.9
|
NIST | |
5.9
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
2.2
|
3.6
|
NIST |
CWE ids for CVE-2020-28391
-
The product uses a hard-coded, unchangeable cryptographic key.Assigned by: productcert@siemens.com (Primary)
-
The product contains hard-coded credentials, such as a password or cryptographic key.Assigned by: nvd@nist.gov (Secondary)
References for CVE-2020-28391
-
https://cert-portal.siemens.com/productcert/pdf/ssa-274900.pdf
Vendor Advisory
-
https://us-cert.cisa.gov/ics/advisories/icsa-21-012-02
Siemens SCALANCE X Switches | CISAThird Party Advisory;US Government Resource;Vendor Advisory
Jump to