First published: Thu Jan 03 2019(Updated: )
Pluto Safety PLC Gateway Ethernet devices in ABB GATE-E1 and GATE-E2 all versions allows an unauthenticated attacker using the administrative web interface to insert an HTML/Javascript payload into any of the device properties, which may allow an attacker to display/execute the payload in a visitor browser.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
ABB Gate-e1 Firmware | ||
ABB Gate-e1 Firmware | ||
ABB Gate-e2 | ||
ABB Gate-e2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-18997 has a severity rating that indicates a significant risk due to potential unauthorized access and manipulation of device properties.
To fix CVE-2018-18997, ensure that your ABB GATE-E1 and GATE-E2 devices are updated to the latest firmware versions provided by ABB.
CVE-2018-18997 allows attackers to insert potentially malicious HTML/JavaScript payloads through the administrative web interface.
ABB GATE-E1 and GATE-E2 device users are affected by CVE-2018-18997 across all firmware versions.
Yes, CVE-2018-18997 can be exploited remotely by an unauthenticated attacker accessing the device's administrative web interface.