CVE-2022-26648 (scalance_x200-4p_irt_firmware, scalance_x201-3p_irt_firmware, scalance_x201-3p_irt_pro_firmware, scalance_x202-2irt_firmware, scalance_x202-2p_irt_firmware, scalance_x202-2p_irt_pro_firmware, scalance_x204-2_firmware, scalance_x204-2fm_firmware, scalance_x204-2ld_firmware, scalance_x204-2ld_ts_firmware, scalance_x204-2ts_firmware, scalance_x204irt_firmware, scalance_x204irt_pro_firmware, scalance_x206-1_firmware, scalance_x206-1ld_firmware, scalance_x208_firmware, scalance_x208_pro_firmware, scalance_x212-2_firmware, scalance_x212-2ld_firmware, scalance_x216_firmware, scalance_x224_firmware, scalance_xf201-3p_irt_firmware, scalance_xf202-2p_irt_firmware, scalance_xf204-2_firmware, scalance_xf204-2ba_irt_firmware, scalance_xf204_firmware, scalance_xf204irt_firmware, scalance_xf206-1_firmware, scalance_xf208_firmware)

CVE-2022-26648 (scalance_x200-4p_irt_firmware, scalance_x201-3p_irt_firmware, scalance_x201-3p_irt_pro_firmware, scalance_x202-2irt_firmware, scalance_x202-2p_irt_firmware, scalance_x202-2p_irt_pro_firmware, scalance_x204-2_firmware, scalance_x204-2fm_firmware, scalance_x204-2ld_firmware, scalance_x204-2ld_ts_firmware, scalance_x204-2ts_firmware, scalance_x204irt_firmware, scalance_x204irt_pro_firmware, scalance_x206-1_firmware, scalance_x206-1ld_firmware, scalance_x208_firmware, scalance_x208_pro_firmware, scalance_x212-2_firmware, scalance_x212-2ld_firmware, scalance_x216_firmware, scalance_x224_firmware, scalance_xf201-3p_irt_firmware, scalance_xf202-2p_irt_firmware, scalance_xf204-2_firmware, scalance_xf204-2ba_irt_firmware, scalance_xf204_firmware, scalance_xf204irt_firmware, scalance_xf206-1_firmware, scalance_xf208_firmware)

A vulnerability has been identified in SCALANCE X200-4P IRT (All versions), SCALANCE X200-4P IRT (All versions), SCALANCE X201-3P IRT (All versions), SCALANCE X201-3P IRT (All versions), SCALANCE X201-3P IRT PRO (All versions), SCALANCE X201-3P IRT PRO (All versions), SCALANCE X202-2IRT (All versions), SCALANCE X202-2IRT (All versions), SCALANCE X202-2P IRT (All versions), SCALANCE X202-2P IRT (All versions), SCALANCE X202-2P IRT PRO (All versions), SCALANCE X202-2P IRT PRO (All versions), SCALANCE X204-2 (All versions < V5.2.6), SCALANCE X204-2FM (All versions < V5.2.6), SCALANCE X204-2LD (All versions < V5.2.6), SCALANCE X204-2LD TS (All versions < V5.2.6), SCALANCE X204-2TS (All versions < V5.2.6), SCALANCE X204IRT (All versions), SCALANCE X204IRT (All versions), SCALANCE X204IRT PRO (All versions), SCALANCE X204IRT PRO (All versions), SCALANCE X206-1 (All versions < V5.2.6), SCALANCE X206-1LD (All versions < V5.2.6), SCALANCE X208 (All versions < V5.2.6), SCALANCE X208PRO (All versions < V5.2.6), SCALANCE X212-2 (All versions < V5.2.6), SCALANCE X212-2LD (All versions < V5.2.6), SCALANCE X216 (All versions < V5.2.6), SCALANCE X224 (All versions < V5.2.6), SCALANCE XF201-3P IRT (All versions), SCALANCE XF202-2P IRT (All versions), SCALANCE XF204 (All versions < V5.2.6), SCALANCE XF204-2 (All versions < V5.2.6), SCALANCE XF204-2BA IRT (All versions), SCALANCE XF204IRT (All versions), SCALANCE XF204IRT (All versions), SCALANCE XF206-1 (All versions < V5.2.6), SCALANCE XF208 (All versions < V5.2.6). Affected devices do not properly validate the GET parameter XNo of incoming HTTP requests. This could allow an unauthenticated remote attacker to crash affected devices.Read More