A vulnerability has been identified in SICAM WEB firmware for SICAM A8000 RTUs (All versions < V05.30). The login screen does not sufficiently sanitize input, which enables an attacker to generate specially crafted log messages. If an unsuspecting victim views the log messages via the web browser, these log messages might be interpreted and executed as code by the web application. This Cross-Site-Scripting (XSS) vulnerability might compromize the confidentiality, integrity and availability of the web application.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-370042.pdf | Mitigation Patch Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-370042.pdf | Mitigation Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-370042.pdf - Mitigation, Patch, Vendor Advisory |
Information
Published : 2020-08-14 16:15
Updated : 2024-11-21 05:06
NVD link : CVE-2020-15781
Mitre link : CVE-2020-15781
CVE.ORG link : CVE-2020-15781
JSON object : View
Products Affected
siemens
- sicam_a8000_firmware
- sicam_a8000
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')