A vulnerability has been identified in SCALANCE M875 (All versions). The web interface on port 443/tcp could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires user interaction by an legitimate user, who must be authenticated to the web interface as administrative user. A successful attack could allow an attacker to interact with the web interface as an administrative user. This could allow the attacker to read or modify the device configuration, or to exploit other vulnerabilities that require authentication as administrative user. At the time of advisory publication no public exploitation of this security vulnerability was known.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-977428.pdf | Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-977428.pdf | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-977428.pdf - Third Party Advisory |
Information
Published : 2018-06-26 18:29
Updated : 2024-11-21 03:43
NVD link : CVE-2018-11447
Mitre link : CVE-2018-11447
CVE.ORG link : CVE-2018-11447
JSON object : View
Products Affected
siemens
- scalance_m875
- scalance_m875_firmware