CVE-2018-11447

A vulnerability has been identified in SCALANCE M875 (All versions). The web interface on port 443/tcp could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires user interaction by an legitimate user, who must be authenticated to the web interface as administrative user. A successful attack could allow an attacker to interact with the web interface as an administrative user. This could allow the attacker to read or modify the device configuration, or to exploit other vulnerabilities that require authentication as administrative user. At the time of advisory publication no public exploitation of this security vulnerability was known.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:siemens:scalance_m875_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_m875:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:43

Type Values Removed Values Added
References () https://cert-portal.siemens.com/productcert/pdf/ssa-977428.pdf - Third Party Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-977428.pdf - Third Party Advisory

Information

Published : 2018-06-26 18:29

Updated : 2024-11-21 03:43


NVD link : CVE-2018-11447

Mitre link : CVE-2018-11447

CVE.ORG link : CVE-2018-11447


JSON object : View

Products Affected

siemens

  • scalance_m875
  • scalance_m875_firmware
CWE
CWE-121

Stack-based Buffer Overflow

CWE-352

Cross-Site Request Forgery (CSRF)