First published: Tue Jun 26 2018(Updated: )
A vulnerability has been identified in SCALANCE M875 (All versions). The web interface on port 443/tcp could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires user interaction by an legitimate user, who must be authenticated to the web interface as administrative user. A successful attack could allow an attacker to interact with the web interface as an administrative user. This could allow the attacker to read or modify the device configuration, or to exploit other vulnerabilities that require authentication as administrative user. At the time of advisory publication no public exploitation of this security vulnerability was known.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Scalance M875 Firmware | ||
Siemens SCALANCE M875 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11447 is a medium-severity vulnerability that allows for Cross-Site Request Forgery (CSRF) attacks.
To mitigate CVE-2018-11447, ensure that the SCALANCE M875 is updated to the latest firmware version provided by Siemens.
An attacker can exploit CVE-2018-11447 to perform unauthorized actions on behalf of a legitimate user through CSRF.
CVE-2018-11447 affects all versions of the Siemens SCALANCE M875 that expose the web interface on port 443/tcp.
CVE-2018-11447 is associated with Cross-Site Request Forgery (CSRF) attacks.