{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-28395","assignerOrgId":"cec7a2ec-15b4-4faf-bd53-b40f371f3a77","assignerShortName":"siemens","dateUpdated":"2024-08-04T16:33:59.028Z","dateReserved":"2020-11-10T00:00:00.000Z","datePublished":"2021-01-12T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"cec7a2ec-15b4-4faf-bd53-b40f371f3a77","shortName":"siemens","dateUpdated":"2022-12-13T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"A vulnerability has been identified in SCALANCE X-200RNA switch family (All versions < V3.2.7), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions < V4.1.0). Devices do not create a new unique private key after factory reset. An attacker could leverage this situation to a man-in-the-middle situation and decrypt previously captured traffic."}],"affected":[{"vendor":"Siemens","product":"SCALANCE X-200RNA switch family","versions":[{"version":"All versions < V3.2.7","status":"affected"}]},{"vendor":"Siemens","product":"SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)","versions":[{"version":"All versions < V4.1.0","status":"affected"}]}],"references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-274900.pdf"},{"url":"https://us-cert.cisa.gov/ics/advisories/icsa-21-012-02"}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-321: Use of Hard-coded Cryptographic Key","cweId":"CWE-321"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T16:33:59.028Z"},"title":"CVE Program Container","references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-274900.pdf","tags":["x_transferred"]},{"url":"https://us-cert.cisa.gov/ics/advisories/icsa-21-012-02","tags":["x_transferred"]}]}]}}