First published: Thu Jun 14 2018(Updated: )
A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.3), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.4.1), SCALANCE X-200RNA switch family (All versions < V3.2.7), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions < V4.1.3). The integrated configuration web server of the affected devices could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link. User interaction is required for a successful exploitation. The user must be logged into the web interface in order for the exploitation to succeed. At the stage of publishing this security advisory no public exploitation is known. The vendor has confirmed the vulnerability and provides mitigations to resolve it.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Scalance X300 Firmware | ||
Siemens Scalance X300 | ||
Siemens Scalance X-200 Irt Firmware | <5.4.1 | |
Siemens Scalance X-200 Irt | ||
Siemens Scalance X-200 Firmware | <5.2.3 | |
Siemens SCALANCE X-200 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2018-4848.
The affected software for this vulnerability includes SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.3), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.4.1), SCALANCE X-200RNA switch family (All versions < V3.2.7), and SCALANCE X-300 switch family (incl. X...
The severity of CVE-2018-4848 is medium.
The Common Weakness Enumeration (CWE) ID for this vulnerability is CWE-79 and CWE-80.
You can find more information about this vulnerability on the following references: http://www.securityfocus.com/bid/104494 and https://cert-portal.siemens.com/productcert/pdf/ssa-480829.pdf