The integrated web server on Siemens SCALANCE M-800 and S615 modules with firmware before 4.02 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/93115 | |
http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-342135.pdf | Vendor Advisory |
https://ics-cert.us-cert.gov/advisories/ICSA-16-271-01 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/93115 | |
http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-342135.pdf | Vendor Advisory |
https://ics-cert.us-cert.gov/advisories/ICSA-16-271-01 | Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 02:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/93115 - | |
References | () http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-342135.pdf - Vendor Advisory | |
References | () https://ics-cert.us-cert.gov/advisories/ICSA-16-271-01 - Third Party Advisory, US Government Resource |
Information
Published : 2016-09-29 10:59
Updated : 2024-11-21 02:57
NVD link : CVE-2016-7090
Mitre link : CVE-2016-7090
CVE.ORG link : CVE-2016-7090
JSON object : View
Products Affected
siemens
- scalance_m-800
- scalance_s615
- scalance_s615_firmware
- scalance_m-800_firmware
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor