製品・ソフトウェアに関する情報
SCALANCE M875 におけるクロスサイトスクリプティングの脆弱性
Title SCALANCE M875 におけるクロスサイトスクリプティングの脆弱性
Summary

SCALANCE M875 には、クロスサイトスクリプティングの脆弱性が存在します。

Possible impacts 情報を取得される、および情報を改ざんされる可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date June 12, 2018, midnight
Registration Date Sept. 6, 2018, 4:59 p.m.
Last Update Sept. 6, 2018, 4:59 p.m.
CVSS3.0 : 警告
Score 4.8
Vector CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
CVSS2.0 : 注意
Score 3.5
Vector AV:N/AC:M/Au:S/C:N/I:P/A:N
Affected System
シーメンス
SCALANCE M875 ファームウェア 全てのバージョン
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
1 [2018年09月06日]
  掲載
Sept. 6, 2018, 4:59 p.m.

NVD Vulnerability Information
CVE-2018-11448
Summary

A vulnerability has been identified in SCALANCE M875 (All versions). The web interface on port 443/tcp could allow a stored Cross-Site Scripting (XSS) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires that the attacker has access to the web interface of an affected device. The attacker must be authenticated as administrative user on the web interface. Afterwards, a legitimate user must access the web interface. A successful attack could allow an attacker to execute malicious code in the browser of a legitimate user. At the time of advisory publication no public exploitation of this security vulnerability was known.

Publication Date June 27, 2018, 3:29 a.m.
Registration Date March 1, 2021, 6:46 p.m.
Last Update Nov. 21, 2024, 12:43 p.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:o:siemens:scalance_m875_firmware:-:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:siemens:scalance_m875:-:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List