A vulnerability has been identified in SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.4.1), SCALANCE X-200RNA switch family (All versions < V3.2.7), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions < V4.1.3). A remote, authenticated attacker with access to the configuration web server could be able to store script code on the web site, if the HRP redundancy option is set. This code could be executed in the web browser of victims visiting this web site (XSS), affecting its confidentiality, integrity and availability. User interaction is required for successful exploitation, as the user needs to visit the manipulated web site. At the stage of publishing this security advisory no public exploitation is known. The vendor has confirmed the vulnerability and provides mitigations to resolve it.

Project Subscriptions

Vendors Products
Siemens Subscribe
Scalance X200 Subscribe
Scalance X200 Firmware Subscribe
Scalance X200 Irt Subscribe
Scalance X200irt Firmware Subscribe
Scalance X300 Subscribe
Scalance X300 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2018-16628 A vulnerability has been identified in SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.4.1), SCALANCE X-200RNA switch family (All versions < V3.2.7), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions < V4.1.3). A remote, authenticated attacker with access to the configuration web server could be able to store script code on the web site, if the HRP redundancy option is set. This code could be executed in the web browser of victims visiting this web site (XSS), affecting its confidentiality, integrity and availability. User interaction is required for successful exploitation, as the user needs to visit the manipulated web site. At the stage of publishing this security advisory no public exploitation is known. The vendor has confirmed the vulnerability and provides mitigations to resolve it.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2024-08-05T05:18:26.218Z

Reserved: 2018-01-02T00:00:00.000Z

Link: CVE-2018-4842

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-06-14T16:29:00.397

Modified: 2024-11-21T04:07:33.950

Link: CVE-2018-4842

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses