First published: Thu Dec 13 2018(Updated: )
A vulnerability has been identified in SCALANCE S602 (All versions < V4.0.1.1), SCALANCE S612 (All versions < V4.0.1.1), SCALANCE S623 (All versions < V4.0.1.1), SCALANCE S627-2M (All versions < V4.0.1.1). The integrated web server could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link. User interaction is required for a successful exploitation. The user must be logged into the web interface in order for the exploitation to succeed. At the stage of publishing this security advisory no public exploitation is known.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Scalance S602 Firmware | <v4.0.1.1 | |
Siemens SCALANCE S602 | ||
Siemens Scalance S612 Firmware | <4.0.1.1 | |
Siemens SCALANCE S612 | ||
Siemens Scalance S623 Firmware | <4.0.1.1 | |
Siemens SCALANCE S623 | ||
Siemens Scalance S627-2m Firmware | <4.0.1.1 | |
Siemens SCALANCE S627-2M |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-16555.
The severity rating of CVE-2018-16555 is medium.
The SCALANCE S602, SCALANCE S612, SCALANCE S623, and SCALANCE S627-2M (versions prior to V4.0.1.1) are affected by this vulnerability.
This vulnerability can lead to Cross-Site Scripting (XSS) attacks.
You can find more information about CVE-2018-16555 in the following references: [Link 1](http://www.securityfocus.com/bid/105937), [Link 2](https://cert-portal.siemens.com/productcert/pdf/ssa-242982.pdf).