CVE-2020-15800

9.8 CRITICAL

📋 TL;DR

A heap overflow vulnerability in the webserver of Siemens SCALANCE X-200 and X-300 industrial switches allows remote attackers to crash the webserver by sending specially crafted requests. This affects all versions before specified patches. The vulnerability could disrupt network management interfaces on these industrial networking devices.

💻 Affected Systems

Products:
  • SCALANCE X-200 switch family (incl. SIPLUS NET variants)
  • SCALANCE X-200IRT switch family (incl. SIPLUS NET variants)
  • SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)
Versions: All versions < V5.2.5 for X-200, < V5.5.0 for X-200IRT, < V4.1.0 for X-300
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All affected devices with webserver enabled are vulnerable by default. The webserver is typically enabled for management.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service of the webserver management interface, potentially requiring physical access to restart the device if the webserver fails to recover automatically.

🟠

Likely Case

Temporary disruption of the web-based management interface, requiring the webserver to restart and potentially causing brief management access loss.

🟢

If Mitigated

Minimal impact if devices are patched or isolated from untrusted networks, with only authorized management traffic allowed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and involves sending crafted HTTP requests to the webserver, making exploitation relatively straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V5.2.5 for X-200, V5.5.0 for X-200IRT, V4.1.0 for X-300

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf

Restart Required: Yes

Instructions:

1. Download firmware update from Siemens support portal. 2. Backup current configuration. 3. Upload and apply firmware update via web interface or management tools. 4. Reboot device to complete installation. 5. Verify firmware version after reboot.

🔧 Temporary Workarounds

Disable webserver

all

Disable the vulnerable webserver component if web management is not required

Configure via CLI or management interface to disable HTTP/HTTPS services

Network segmentation

all

Restrict access to switch management interfaces to trusted networks only

Configure firewall rules to allow management access only from specific IP ranges

🧯 If You Can't Patch

  • Isolate affected switches from untrusted networks using VLANs or physical segmentation
  • Implement strict network access controls to limit who can reach the management interfaces

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface or CLI. If version is below patched versions listed above, device is vulnerable.

Check Version:

Via web interface: System Information page. Via CLI: 'show version' or similar command

Verify Fix Applied:

Confirm firmware version matches or exceeds patched versions: V5.2.5+ for X-200, V5.5.0+ for X-200IRT, V4.1.0+ for X-300

📡 Detection & Monitoring

Log Indicators:

  • Webserver crash/restart events
  • Unusual HTTP request patterns to management interface
  • Multiple connection attempts to webserver

Network Indicators:

  • Unusual HTTP traffic to switch management ports (typically 80/443)
  • Crafted HTTP requests with abnormal patterns

SIEM Query:

source_ip="switch_management_ip" AND (http_request CONTAINS "malformed" OR http_status="500")

🔗 References

📤 Share & Export