CVE-2024-6558

HMS Industrial Networks Anybus-CompactCom 30 products are vulnerable to a XSS attack caused by the lack of input sanitation checks. As a consequence, it is possible to insert HTML code into input fields and store the HTML code. The stored HTML code will be embedded in the page and executed by host browser the next time the page is loaded, enabling social engineering attacks.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:hms-networks:anybus_compactcom_30_module_ethernet\/ip_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:hms-networks:anybus_compactcom_30_module_ethernet\/ip:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:hms-networks:anybus_compactcom_30_module_usb_without_housing_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:hms-networks:anybus_compactcom_30_module_usb_without_housing:-:*:*:*:*:*:*:*

History

21 Nov 2024, 09:49

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 6.1
v2 : unknown
v3 : 6.3
References () https://hmsnetworks.blob.core.windows.net/nlw/docs/default-source/products/cybersecurity/security-advisory/hms-security-advisory-2024-05-17-001---anybus---compactcom-30-xss.pdf - Mitigation, Vendor Advisory () https://hmsnetworks.blob.core.windows.net/nlw/docs/default-source/products/cybersecurity/security-advisory/hms-security-advisory-2024-05-17-001---anybus---compactcom-30-xss.pdf - Mitigation, Vendor Advisory
References () https://www.cisa.gov/news-events/ics-advisories/icsa-24-193-20 - Third Party Advisory, US Government Resource () https://www.cisa.gov/news-events/ics-advisories/icsa-24-193-20 - Third Party Advisory, US Government Resource

13 Aug 2024, 13:53

Type Values Removed Values Added
CPE cpe:2.3:h:hms-networks:anybus_compactcom_30_module_usb_without_housing:-:*:*:*:*:*:*:*
cpe:2.3:h:hms-networks:anybus_compactcom_30_module_ethernet\/ip:-:*:*:*:*:*:*:*
cpe:2.3:o:hms-networks:anybus_compactcom_30_module_ethernet\/ip_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:hms-networks:anybus_compactcom_30_module_usb_without_housing_firmware:-:*:*:*:*:*:*:*
First Time Hms-networks anybus Compactcom 30 Module Ethernet\/ip Firmware
Hms-networks anybus Compactcom 30 Module Ethernet\/ip
Hms-networks
Hms-networks anybus Compactcom 30 Module Usb Without Housing Firmware
Hms-networks anybus Compactcom 30 Module Usb Without Housing
References () https://hmsnetworks.blob.core.windows.net/nlw/docs/default-source/products/cybersecurity/security-advisory/hms-security-advisory-2024-05-17-001---anybus---compactcom-30-xss.pdf - () https://hmsnetworks.blob.core.windows.net/nlw/docs/default-source/products/cybersecurity/security-advisory/hms-security-advisory-2024-05-17-001---anybus---compactcom-30-xss.pdf - Mitigation, Vendor Advisory
References () https://www.cisa.gov/news-events/ics-advisories/icsa-24-193-20 - () https://www.cisa.gov/news-events/ics-advisories/icsa-24-193-20 - Third Party Advisory, US Government Resource
CVSS v2 : unknown
v3 : 6.3
v2 : unknown
v3 : 6.1

26 Jul 2024, 12:38

Type Values Removed Values Added
Summary
  • (es) Los productos Anybus-CompactCom 30 de HMS Industrial Networks son vulnerables a un ataque XSS causado por la falta de controles sanitarios de entrada. Como consecuencia, es posible insertar código HTML en los campos de entrada y almacenar el código HTML. El código HTML almacenado se incrustará en la página y el navegador host lo ejecutará la próxima vez que se cargue la página, lo que permitirá ataques de ingeniería social.

25 Jul 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-25 20:15

Updated : 2024-11-21 09:49


NVD link : CVE-2024-6558

Mitre link : CVE-2024-6558

CVE.ORG link : CVE-2024-6558


JSON object : View

Products Affected

hms-networks

  • anybus_compactcom_30_module_usb_without_housing_firmware
  • anybus_compactcom_30_module_ethernet\/ip_firmware
  • anybus_compactcom_30_module_ethernet\/ip
  • anybus_compactcom_30_module_usb_without_housing
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')