First published: Mon Feb 27 2017(Updated: )
A non-privileged user of the Siemens web application RUGGEDCOM NMS < V1.2 on port 8080/TCP and 8081/TCP could perform a persistent Cross-Site Scripting (XSS) attack, potentially resulting in obtaining administrative permissions.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Ruggedcom NMS | <=2.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2683 has been classified as a medium severity vulnerability due to the potential for a non-privileged user to execute a persistent XSS attack.
To fix CVE-2017-2683, upgrade the Siemens Ruggedcom NMS software to version 1.2 or later.
Any non-privileged user of the Siemens Ruggedcom NMS versions prior to 1.2 is affected by CVE-2017-2683.
Exploitation of CVE-2017-2683 could allow an attacker to perform Cross-Site Scripting attacks, potentially leading to the compromise of administrative permissions.
The vulnerable versions of Siemens Ruggedcom NMS for CVE-2017-2683 are versions prior to 1.2, specifically up to 2.0.2.