This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.
The remote Siemens SCALANCE S612 firewall is affected by multiple
The Siemens SCALANCE S612 firewall device has a firmware version that
is greater than 2.1 and prior to 22.214.171.124. It is, therefore, affected
by the following vulnerabilities :
- A brute-force weakness exists due to a failure to
enforce time delays between failed login attempts. This
allows a remote attacker to perform rapid, multiple
authentication attempts within a short time frame.
- A stack-based buffer overflow vulnerability exists in
the Profinet DCP protocol implementation due to a
failure to correctly handle unexpected input. A remote
attacker, using a specially crafted DCP frame, can crash
the DCP protocol stack, resulting in a denial of service
condition or possible arbitrary code execution.
See also :
Upgrade to firmware release 126.96.36.199 or later.
Risk factor :
Critical / CVSS Base Score : 10.0