First published: Tue Jun 26 2018(Updated: )
A vulnerability has been identified in SCALANCE M875 (All versions). An authenticated remote attacker with access to the web interface (443/tcp), could execute arbitrary operating system commands. Successful exploitation requires that the attacker has network access to the web interface. The attacker must be authenticated as administrative user to exploit the security vulnerability. The vulnerability could allow an attacker to execute arbitrary code on the device. At the time of advisory publication no public exploitation of this security vulnerability was known.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Scalance M875 Firmware | ||
Siemens SCALANCE M875 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-4859 is considered a critical vulnerability due to its potential for remote command execution.
To mitigate CVE-2018-4859, update the Siemens SCALANCE M875 firmware to the latest version provided by Siemens.
The CVE-2018-4859 vulnerability affects all versions of the Siemens SCALANCE M875 devices.
CVE-2018-4859 allows an authenticated remote attacker to execute arbitrary operating system commands.
Exploitation of CVE-2018-4859 requires network access to the web interface of the SCALANCE M875.