Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-16555


A vulnerability has been identified in SCALANCE S602 (All versions < V4.0.1.1), SCALANCE S612 (All versions < V4.0.1.1), SCALANCE S623 (All versions < V4.0.1.1), SCALANCE S627-2M (All versions < V4.0.1.1). The integrated web server could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link. User interaction is required for a successful exploitation. The user must be logged into the web interface in order for the exploitation to succeed. At the stage of publishing this security advisory no public exploitation is known.


Published

2018-12-13T16:29:00.460

Last Modified

2024-11-21T03:52:58.247

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 5.4 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:S/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: SINGLE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

6.8

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-80
  • Type: Primary
    CWE-79

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System siemens scalance_s602_firmware < v4.0.1.1 Yes
Hardware siemens scalance_s602 - No
Operating System siemens scalance_s612_firmware < 4.0.1.1 Yes
Hardware siemens scalance_s612 - No
Operating System siemens scalance_s623_firmware < 4.0.1.1 Yes
Hardware siemens scalance_s623 - No
Operating System siemens scalance_s627-2m_firmware < 4.0.1.1 Yes
Hardware siemens scalance_s627-2m - No

References