First published: Tue Jun 26 2018(Updated: )
A vulnerability has been identified in SCALANCE M875 (All versions). An authenticated remote attacker with access to the web interface (443/tcp), could potentially read and download arbitrary files from the device's file system. Successful exploitation requires that the attacker has network access to the web interface. The attacker must be authenticated as administrative user to exploit the security vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SCALANCE M875 | ||
Siemens Scalance M875 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-4861 has been classified as a high severity vulnerability due to its potential for unauthorized access to sensitive data.
To remediate CVE-2018-4861, it is recommended to restrict access to the web interface and apply any available firmware updates from Siemens.
CVE-2018-4861 affects all versions of the Siemens SCALANCE M875 devices accessing the web interface.
CVE-2018-4861 is related to an authenticated remote file access attack that can lead to unauthorized file downloads.
Exploitation of CVE-2018-4861 can result in unauthorized access to sensitive files on the SCALANCE M875 device.