First published: Wed Apr 17 2019(Updated: )
A vulnerability has been identified in CP 1604 (All versions), CP 1616 (All versions). The integrated configuration web server of the affected CP devices could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires user interaction by a legitimate user. A successful attack could allow an attacker to trigger actions via the web interface that the legitimate user is allowed to perform. At the time of advisory publication no public exploitation of this vulnerability was known.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Simatic CP 1604 Firmware | <=2.8 | |
Siemens Simatic CP 1604 | ||
Siemens Simatic CP 1616 Firmware | <=2.8 | |
Siemens CP 1616 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-13810 has been rated as a high severity vulnerability due to its potential for Cross-Site Request Forgery attacks.
To mitigate CVE-2018-13810, ensure that you apply security patches provided by Siemens for the affected CP 1604 and CP 1616 firmware versions.
CVE-2018-13810 affects all versions of Siemens CP 1604 and CP 1616 firmware up to version 2.8.
CVE-2018-13810 enables Cross-Site Request Forgery (CSRF) attacks if users are tricked into clicking malicious links.
If exploitation of CVE-2018-13810 is suspected, users should immediately review device configurations and consider removing network access until patches are applied.