First published: Fri Jun 15 2018(Updated: )
A vulnerability has been identified in SCALANCE M875 (All versions). An authenticated remote attacker with access to the web interface (443/tcp), could execute arbitrary operating system commands. Successful exploitation requires that the attacker has network access to the web interface. The attacker must be authenticated as administrative user to exploit the security vulnerability. The vulnerability could allow an attacker to execute arbitrary code on the device. At the time of advisory publication no public exploitation of this security vulnerability was known.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SCALANCE M875 | ||
Siemens Scalance M875 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-4860 is classified as a critical vulnerability due to the potential for arbitrary command execution by an authenticated attacker.
To fix CVE-2018-4860, update the SCALANCE M875 firmware to the latest version provided by Siemens.
All versions of the Siemens SCALANCE M875 that have the web interface exposed are vulnerable to CVE-2018-4860.
Only authenticated remote attackers with network access to the web interface can exploit CVE-2018-4860.
Exploitation of CVE-2018-4860 can allow an attacker to execute arbitrary operating system commands on the affected device.