First published: Thu Dec 12 2019(Updated: )
A vulnerability has been identified in EN100 Ethernet module DNP3 variant (All versions), EN100 Ethernet module IEC 61850 variant (All versions < V4.37), EN100 Ethernet module IEC104 variant (All versions), EN100 Ethernet module Modbus TCP variant (All versions), EN100 Ethernet module PROFINET IO variant (All versions). The web interface could allow Cross-Site Scripting (XSS) attacks if an attacker is able to modify content of particular web pages, causing the application to behave in unexpected ways for legitimate users. Successful exploitation does not require for an attacker to be authenticated to the web interface. This could allow the attacker to read or modify contents of the web application. At the time of advisory publication no public exploitation of this security. vulnerability was known.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens EN100 Ethernet Module DNP3 Firmware | ||
Siemens EN100 Ethernet Module IEC 61850 | <4.37 | |
Siemens EN100 Ethernet Module with Firmware variant IEC104 | ||
Siemens EN100 Ethernet Module with MODBUS TCP Firmware | ||
Siemens EN100 Ethernet module PROFINET IO Firmware | ||
siemens EN100 Ethernet module DNP3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-13943.
The severity of CVE-2019-13943 is medium.
All versions of Siemens En100 Ethernet module with firmware variants DNP3 TCP, IEC 61850 (up to exclusive version 4.37), IEC104, Modbus TCP, and PROFINET IO are affected by CVE-2019-13943.
The CWE ID for CVE-2019-13943 is CWE-79.
You can find more information about CVE-2019-13943 at the following references: [Reference 1](https://cert-portal.siemens.com/productcert/pdf/ssa-418979.pdf) and [Reference 2](https://www.us-cert.gov/ics/advisories/icsa-19-344-07).