A vulnerability has been identified in SIMATIC S7-1200 CPU family version 4 (All versions < V4.2.3). The web interface could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires user interaction by a legitimate user, who must be authenticated to the web interface. A successful attack could allow an attacker to trigger actions via the web interface that the legitimate user is allowed to perform. This could allow the attacker to read or modify parts of the device configuration.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/105542 | Third Party Advisory VDB Entry |
https://cert-portal.siemens.com/productcert/pdf/ssa-507847.pdf | Vendor Advisory |
http://www.securityfocus.com/bid/105542 | Third Party Advisory VDB Entry |
https://cert-portal.siemens.com/productcert/pdf/ssa-507847.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/105542 - Third Party Advisory, VDB Entry | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-507847.pdf - Vendor Advisory |
Information
Published : 2018-10-10 17:29
Updated : 2024-11-21 03:48
NVD link : CVE-2018-13800
Mitre link : CVE-2018-13800
CVE.ORG link : CVE-2018-13800
JSON object : View
Products Affected
siemens
- simatic_s7-1200_v4
- simatic_s7-1200_v4_firmware
CWE
CWE-352
Cross-Site Request Forgery (CSRF)