All the vulnerabilites related to Siemens AG - SCALANCE S602, SCALANCE S612, SCALANCE S623, SCALANCE S627-2M
cve-2018-16555
Vulnerability from cvelistv5
Published
2018-12-13 16:00
Modified
2024-08-05 10:24
Severity ?
EPSS score ?
Summary
A vulnerability has been identified in SCALANCE S602 (All versions < V4.0.1.1), SCALANCE S612 (All versions < V4.0.1.1), SCALANCE S623 (All versions < V4.0.1.1), SCALANCE S627-2M (All versions < V4.0.1.1). The integrated web server could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link. User interaction is required for a successful exploitation. The user must be logged into the web interface in order for the exploitation to succeed. At the stage of publishing this security advisory no public exploitation is known.
References
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-242982.pdf | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/105937 | vdb-entry, x_refsource_BID |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:24:32.846Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-242982.pdf" }, { "name": "105937", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105937" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SCALANCE S602, SCALANCE S612, SCALANCE S623, SCALANCE S627-2M", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "SCALANCE S602 : All versions \u003c V4.0.1.1" }, { "status": "affected", "version": "SCALANCE S612 : All versions \u003c V4.0.1.1" }, { "status": "affected", "version": "SCALANCE S623 : All versions \u003c V4.0.1.1" }, { "status": "affected", "version": "SCALANCE S627-2M : All versions \u003c V4.0.1.1" } ] } ], "datePublic": "2018-12-13T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SCALANCE S602 (All versions \u003c V4.0.1.1), SCALANCE S612 (All versions \u003c V4.0.1.1), SCALANCE S623 (All versions \u003c V4.0.1.1), SCALANCE S627-2M (All versions \u003c V4.0.1.1). The integrated web server could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link. User interaction is required for a successful exploitation. The user must be logged into the web interface in order for the exploitation to succeed. At the stage of publishing this security advisory no public exploitation is known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-80", "description": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-14T10:57:02", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-242982.pdf" }, { "name": "105937", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105937" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2018-16555", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SCALANCE S602, SCALANCE S612, SCALANCE S623, SCALANCE S627-2M", "version": { "version_data": [ { "version_value": "SCALANCE S602 : All versions \u003c V4.0.1.1" }, { "version_value": "SCALANCE S612 : All versions \u003c V4.0.1.1" }, { "version_value": "SCALANCE S623 : All versions \u003c V4.0.1.1" }, { "version_value": "SCALANCE S627-2M : All versions \u003c V4.0.1.1" } ] } } ] }, "vendor_name": "Siemens AG" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SCALANCE S602 (All versions \u003c V4.0.1.1), SCALANCE S612 (All versions \u003c V4.0.1.1), SCALANCE S623 (All versions \u003c V4.0.1.1), SCALANCE S627-2M (All versions \u003c V4.0.1.1). The integrated web server could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link. User interaction is required for a successful exploitation. The user must be logged into the web interface in order for the exploitation to succeed. At the stage of publishing this security advisory no public exploitation is known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-242982.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-242982.pdf" }, { "name": "105937", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105937" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2018-16555", "datePublished": "2018-12-13T16:00:00", "dateReserved": "2018-09-06T00:00:00", "dateUpdated": "2024-08-05T10:24:32.846Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }