CVE-2022-26649

9.6 CRITICAL

📋 TL;DR

This vulnerability affects multiple Siemens SCALANCE industrial network switches. An unauthenticated remote attacker can send specially crafted HTTP GET requests to crash affected devices, causing denial of service. All listed SCALANCE X200, X201, X202, X204, X206, X208, X212, X216, X224, XF201, XF202, XF204, XF206, and XF208 devices with firmware versions below specified thresholds are vulnerable.

💻 Affected Systems

Products:
  • SCALANCE X200-4P IRT
  • SCALANCE X201-3P IRT
  • SCALANCE X201-3P IRT PRO
  • SCALANCE X202-2IRT
  • SCALANCE X202-2P IRT
  • SCALANCE X202-2P IRT PRO
  • SCALANCE X204-2
  • SCALANCE X204-2FM
  • SCALANCE X204-2LD
  • SCALANCE X204-2LD TS
  • SCALANCE X204-2TS
  • SCALANCE X204IRT
  • SCALANCE X204IRT PRO
  • SCALANCE X206-1
  • SCALANCE X206-1LD
  • SCALANCE X208
  • SCALANCE X208PRO
  • SCALANCE X212-2
  • SCALANCE X212-2LD
  • SCALANCE X216
  • SCALANCE X224
  • SCALANCE XF201-3P IRT
  • SCALANCE XF202-2P IRT
  • SCALANCE XF204
  • SCALANCE XF204-2
  • SCALANCE XF204-2BA IRT
  • SCALANCE XF204IRT
  • SCALANCE XF206-1
  • SCALANCE XF208
Versions: All versions below V5.5.2 for IRT models, below V5.2.6 for non-IRT models
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: HTTP interface must be enabled (default in many configurations). Vulnerability affects URI validation in HTTP GET requests.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device crash requiring physical reboot, disrupting industrial network operations and potentially causing production downtime in critical infrastructure environments.

🟠

Likely Case

Denial of service affecting network connectivity for connected industrial devices, requiring manual intervention to restore functionality.

🟢

If Mitigated

Minimal impact if devices are patched, network segmented, and not directly exposed to untrusted networks.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation allows attackers from anywhere on the internet to crash devices if HTTP interface is exposed.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this to disrupt industrial network operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unauthenticated remote exploitation with simple HTTP requests. No authentication required. Exploitation likely requires network access to HTTP interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V5.5.2 for IRT models, V5.2.6 for non-IRT models

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-310038.pdf

Restart Required: Yes

Instructions:

1. Download firmware update from Siemens Industrial Security website. 2. Backup current configuration. 3. Upload firmware to device via web interface or management software. 4. Apply update. 5. Reboot device. 6. Verify firmware version.

🔧 Temporary Workarounds

Disable HTTP Interface

all

Disable HTTP web interface if not required for operations

Configure via web interface: System > Security > HTTP/HTTPS > Disable HTTP

Network Segmentation

all

Restrict network access to SCALANCE management interfaces

Configure firewall rules to block external access to port 80/tcp on SCALANCE devices

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SCALANCE devices from untrusted networks
  • Disable HTTP interface entirely and use alternative management methods (CLI, SNMP, proprietary protocols)

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface (System > Device Information) or CLI (show version). Compare against patched versions.

Check Version:

Web interface: System > Device Information. CLI: show version

Verify Fix Applied:

Confirm firmware version is V5.5.2 or higher for IRT models, V5.2.6 or higher for non-IRT models. Test HTTP interface functionality.

📡 Detection & Monitoring

Log Indicators:

  • Device crash/reboot logs
  • HTTP request logs showing malformed URIs
  • Connection drops in network monitoring

Network Indicators:

  • Unusual HTTP traffic to SCALANCE devices on port 80
  • Multiple HTTP GET requests with unusual URI patterns
  • Sudden loss of connectivity to SCALANCE devices

SIEM Query:

source="scalance_logs" AND (event_type="crash" OR event_type="reboot") OR http_uri CONTAINS "malformed_pattern"

🔗 References

📤 Share & Export