A vulnerability has been identified in SCALANCE S602 (All versions >= V3.0 and < V4.1), SCALANCE S612 (All versions >= V3.0 and < V4.1), SCALANCE S623 (All versions >= V3.0 and < V4.1), SCALANCE S627-2M (All versions >= V3.0 and < V4.1). Specially crafted packets sent to port 443/tcp of affected devices could cause a Denial-of-Service condition of the web server. A cold reboot is required to restore the functionality of the device.
                
            References
                    | Link | Resource | 
|---|---|
| https://cert-portal.siemens.com/productcert/pdf/ssa-591405.pdf | Vendor Advisory | 
| https://www.us-cert.gov/ics/advisories/icsa-20-042-10 | Third Party Advisory US Government Resource | 
Configurations
                    Configuration 1 (hide)
| AND | 
                                
                                
 
  | 
                        
Configuration 2 (hide)
| AND | 
                                
                                
 
  | 
                        
Configuration 3 (hide)
| AND | 
                                
                                
 
  | 
                        
Configuration 4 (hide)
| AND | 
                                
                                
 
  | 
                        
Information
                Published : 2020-02-11 08:15
Updated : 2021-05-05 08:03
NVD link : CVE-2019-13926
Mitre link : CVE-2019-13926
JSON object : View
CWE
                
                    
                        
                        CWE-400
                        
            Uncontrolled Resource Consumption
Products Affected
                siemens
- scalance_s627-2m_firmware
 - scalance_s602_firmware
 - scalance_s612_firmware
 - scalance_s623
 - scalance_s623_firmware
 - scalance_s612
 - scalance_s627-2m
 - scalance_s602
 


