CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

siemens

scalance_xc206-2g_poe_eec_firmware

10 known vulnerabilities · sorted by CVSS score

CVE-2020-25226
CRITICAL9.8

A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0). The web server of the affected devices contains a vulnerability that may lead to a buffer overflow condition. An attacker could cause this condition on the webserver by sending a specially crafted request. The webserver could stop and not recover anymore.

siemens / scalance_x200-4pirt_firmware+65
Network
Published Jan 12, 2021
CVE-2020-15800
CRITICAL9.8

A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions < V4.1.0). The webserver of the affected devices contains a vulnerability that may lead to a heap overflow condition. An attacker could cause this condition on the webserver by sending specially crafted requests. This could stop the webserver temporarily.

siemens / scalance_x200-4pirt_firmware+65
Network
Published Jan 12, 2021
CVE-2022-36323
CRITICAL9.1

Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell.

siemens / scalance_m-800_firmware+89
Network
Published Aug 10, 2022
CVE-2022-36324
HIGH7.5

Affected devices do not properly handle the renegotiation of SSL/TLS parameters. This could allow an unauthenticated remote attacker to bypass the TCP brute force prevention and lead to a denial of service condition for the duration of the attack.

siemens / scalance_m-800_firmware+83
Network
Published Aug 10, 2022
CVE-2022-36325
MEDIUM6.8

Affected devices do not properly sanitize data introduced by an user when rendering the web interface. This could allow an authenticated remote attacker with administrative privileges to inject code and lead to a DOM-based XSS.

siemens / scalance_m-800_firmware+89
Network
Published Aug 10, 2022
CVE-2020-15799
MEDIUM6.5

A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0). The vulnerability could allow an unauthenticated attacker to reboot the device over the network by using special urls from integrated web server of the affected products.

siemens / scalance_x200-4pirt_firmware+65
Network
Published Jan 12, 2021
CVE-2022-46140
MEDIUM6.5

Affected devices use a weak encryption scheme to encrypt the debug zip file. This could allow an authenticated attacker to decrypt the contents of the file and retrieve debug information about the system.

siemens / ruggedcom_rm1224_lte\(4g\)_eu_firmware+100
Network
Published Dec 13, 2022
CVE-2020-28391
MEDIUM5.9

A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.5), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.5.0), SCALANCE X-200RNA switch family (All versions < V3.2.7). Devices create a new unique key upon factory reset, except when used with C-PLUG. When used with C-PLUG the devices use the hardcoded private RSA-key shipped with the firmware-image. An attacker could leverage this situation to a man-in-the-middle situation and decrypt previously captured traffic.

siemens / scalance_x200-4pirt_firmware+65
Network
Published Jan 12, 2021
CVE-2022-46142
MEDIUM5.7

Affected devices store the CLI user passwords encrypted in flash memory. Attackers with physical access to the device could retrieve the file and decrypt the CLI user passwords.

siemens / ruggedcom_rm1224_lte\(4g\)_eu_firmware+100
Physical
Published Dec 13, 2022
CVE-2022-46143
LOW2.7

Affected devices do not check the TFTP blocksize correctly. This could allow an authenticated attacker to read from an uninitialized buffer that potentially contains previously allocated data.

siemens / ruggedcom_rm1224_lte\(4g\)_eu_firmware+100
Network
Published Dec 13, 2022