First published: Tue Oct 09 2018(Updated: )
A vulnerability has been identified in ROX II (All versions < V2.12.1). An authenticated attacker with a high-privileged user account access via SSH could circumvent restrictions in place and execute arbitrary operating system commands. Successful exploitation requires that the attacker has network access to the SSH interface in on port 22/tcp. The attacker must be authenticated to exploit the vulnerability. The vulnerability could allow an attacker to execute arbitrary code on the device.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens ROX II Firmware | <2.12.1 | |
Siemens ROX |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-13802 is considered a high-severity vulnerability due to the potential for arbitrary command execution by an authenticated attacker.
To remediate CVE-2018-13802, upgrade ROX II to version 2.12.1 or later.
CVE-2018-13802 affects high-privileged user accounts that can access the system via SSH.
An attacker exploiting CVE-2018-13802 could execute arbitrary operating system commands on the affected system.
All versions of ROX II prior to version 2.12.1 are vulnerable to CVE-2018-13802.