CVE-2022-26380

7.5 HIGH

📋 TL;DR

This vulnerability affects Siemens SCALANCE industrial network switches. It allows attackers to trigger device reboots by sending specially crafted SNMP requests that exploit improper validation of SNMP keys. Organizations using affected SCALANCE switches in industrial control systems are at risk.

💻 Affected Systems

Products:
  • SCALANCE X302-7 EEC
  • SCALANCE X304-2FE
  • SCALANCE X306-1LD FE
  • SCALANCE X307-2 EEC
  • SCALANCE X307-3
  • SCALANCE X307-3LD
  • SCALANCE X308-2
  • SCALANCE X308-2LD
  • SCALANCE X308-2LH
  • SCALANCE X308-2LH+
  • SCALANCE X308-2M
  • SCALANCE X308-2M PoE
  • SCALANCE X308-2M TS
  • SCALANCE X310
  • SCALANCE X310FE
  • SCALANCE X320-1 FE
  • SCALANCE X320-1-2LD FE
  • SCALANCE X408-2
  • SCALANCE XR324-12M
  • SCALANCE XR324-12M TS
  • SCALANCE XR324-4M EEC
  • SCALANCE XR324-4M PoE
  • SIPLUS NET SCALANCE X308-2
Versions: All versions prior to V4.1
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All listed SCALANCE switch models with firmware versions before V4.1 are vulnerable when SNMP is enabled.

📦 What is this software?

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to SNMP service (UDP port 161). No authentication is required if SNMP is configured with default or weak community strings.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V4.1 or later

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-836527.pdf

Restart Required: Yes

Instructions:

1. Download firmware V4.1 or later from Siemens Industrial Network Support
2. Backup current configuration
3. Upload new firmware via web interface or TFTP
4. Reboot device after firmware update
5. Restore configuration if needed

🔧 Temporary Workarounds

Disable SNMP

all

Completely disable SNMP service on affected devices if not required for monitoring.

Web Interface: Configuration > SNMP > Disable SNMP
CLI: no snmp-server enable

Restrict SNMP Access

all

Limit SNMP access to trusted management networks using firewall rules.

Web Interface: Security > Firewall > Add rule to block UDP 161 from untrusted networks
CLI: ip access-list extended SNMP-ACL; deny udp any any eq snmp; permit ip any any

🧯 If You Can't Patch

  • Segment affected switches in isolated network zones with strict firewall rules blocking SNMP from untrusted networks.
  • Implement network monitoring to detect anomalous SNMP traffic patterns and potential exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface (System > Device Information) or CLI (show version). If version is below V4.1 and SNMP is enabled, device is vulnerable.

Check Version:

show version

Verify Fix Applied:

Confirm firmware version is V4.1 or higher and test SNMP functionality with legitimate queries to ensure proper validation.

📡 Detection & Monitoring

Log Indicators:

  • Multiple SNMP requests from single source followed by device reboot events
  • SNMP error logs showing invalid OID requests

Network Indicators:

  • UDP port 161 traffic from unexpected sources
  • SNMP requests with unusual OID patterns

SIEM Query:

source_port:161 AND (event_type:reboot OR device_status:down) WITHIN 5 MINUTES

🔗 References

📤 Share & Export