ID

VAR-201806-1407


CVE

CVE-2018-11447


TITLE

SIEMENS SCALANCE M875 Cross-Site Request Forgery Vulnerability

Trust: 1.4

sources: IVD: e2f33010-39ab-11e9-a579-000c29342cb1 // CNVD: CNVD-2018-11396 // CNNVD: CNNVD-201806-871

DESCRIPTION

A vulnerability has been identified in SCALANCE M875 (All versions). The web interface on port 443/tcp could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires user interaction by an legitimate user, who must be authenticated to the web interface as administrative user. A successful attack could allow an attacker to interact with the web interface as an administrative user. This could allow the attacker to read or modify the device configuration, or to exploit other vulnerabilities that require authentication as administrative user. At the time of advisory publication no public exploitation of this security vulnerability was known. SCALANCE M875 Contains a cross-site request forgery vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SCALANCEM Industrial Routers are used for secure remote access to factories via mobile networks, such as GPRS or UMTS, with integrated security features of the firewall to prevent unauthorized access and VPNs to protect data transmission. SIEMENSSCALANCEM875 has a cross-site request forgery vulnerability. Siemens SCALANCE M875 is an industrial-grade mobile wireless router product of Siemens

Trust: 2.43

sources: NVD: CVE-2018-11447 // JVNDB: JVNDB-2018-007057 // CNVD: CNVD-2018-11396 // IVD: e2f33010-39ab-11e9-a579-000c29342cb1 // VULHUB: VHN-121307

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

category:['ICS']sub_category: -

Trust: 0.2

sources: IVD: e2f33010-39ab-11e9-a579-000c29342cb1 // CNVD: CNVD-2018-11396

AFFECTED PRODUCTS

vendor:siemensmodel:scalance m875scope:eqversion: -

Trust: 2.4

vendor:siemensmodel:scalance m875scope: - version: -

Trust: 0.6

vendor:scalance m875model: - scope:eqversion: -

Trust: 0.2

sources: IVD: e2f33010-39ab-11e9-a579-000c29342cb1 // CNVD: CNVD-2018-11396 // JVNDB: JVNDB-2018-007057 // CNNVD: CNNVD-201806-871 // NVD: CVE-2018-11447

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-11447
value: HIGH

Trust: 1.0

NVD: CVE-2018-11447
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-11396
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201806-871
value: HIGH

Trust: 0.6

IVD: e2f33010-39ab-11e9-a579-000c29342cb1
value: HIGH

Trust: 0.2

VULHUB: VHN-121307
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-11447
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-11396
severity: HIGH
baseScore: 7.6
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: e2f33010-39ab-11e9-a579-000c29342cb1
severity: HIGH
baseScore: 7.6
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-121307
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-11447
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: e2f33010-39ab-11e9-a579-000c29342cb1 // CNVD: CNVD-2018-11396 // VULHUB: VHN-121307 // JVNDB: JVNDB-2018-007057 // CNNVD: CNNVD-201806-871 // NVD: CVE-2018-11447

PROBLEMTYPE DATA

problemtype:CWE-352

Trust: 1.9

problemtype:CWE-121

Trust: 1.0

sources: VULHUB: VHN-121307 // JVNDB: JVNDB-2018-007057 // NVD: CVE-2018-11447

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201806-871

TYPE

cross-site request forgery

Trust: 0.6

sources: CNNVD: CNNVD-201806-871

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-007057

PATCH

title:SSA-977428url:https://cert-portal.siemens.com/productcert/pdf/ssa-977428.pdf

Trust: 0.8

title:SIEMENSSCALANCEM875 cross-site request forgery vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/131847

Trust: 0.6

title:Siemens SCALANCE M875 Fixes for cross-site request forgery vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80919

Trust: 0.6

sources: CNVD: CNVD-2018-11396 // JVNDB: JVNDB-2018-007057 // CNNVD: CNNVD-201806-871

EXTERNAL IDS

db:NVDid:CVE-2018-11447

Trust: 3.3

db:SIEMENSid:SSA-977428

Trust: 2.3

db:CNNVDid:CNNVD-201806-871

Trust: 0.9

db:CNVDid:CNVD-2018-11396

Trust: 0.8

db:JVNDBid:JVNDB-2018-007057

Trust: 0.8

db:IVDid:E2F33010-39AB-11E9-A579-000C29342CB1

Trust: 0.2

db:VULHUBid:VHN-121307

Trust: 0.1

sources: IVD: e2f33010-39ab-11e9-a579-000c29342cb1 // CNVD: CNVD-2018-11396 // VULHUB: VHN-121307 // JVNDB: JVNDB-2018-007057 // CNNVD: CNNVD-201806-871 // NVD: CVE-2018-11447

REFERENCES

url:https://cert-portal.siemens.com/productcert/pdf/ssa-977428.pdf

Trust: 2.3

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-11447

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-11447

Trust: 0.8

sources: CNVD: CNVD-2018-11396 // VULHUB: VHN-121307 // JVNDB: JVNDB-2018-007057 // CNNVD: CNNVD-201806-871 // NVD: CVE-2018-11447

SOURCES

db:IVDid:e2f33010-39ab-11e9-a579-000c29342cb1
db:CNVDid:CNVD-2018-11396
db:VULHUBid:VHN-121307
db:JVNDBid:JVNDB-2018-007057
db:CNNVDid:CNNVD-201806-871
db:NVDid:CVE-2018-11447

LAST UPDATE DATE

2024-11-23T22:00:28.438000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-11396date:2018-06-13T00:00:00
db:VULHUBid:VHN-121307date:2019-10-09T00:00:00
db:JVNDBid:JVNDB-2018-007057date:2018-09-06T00:00:00
db:CNNVDid:CNNVD-201806-871date:2019-10-17T00:00:00
db:NVDid:CVE-2018-11447date:2024-11-21T03:43:23.243

SOURCES RELEASE DATE

db:IVDid:e2f33010-39ab-11e9-a579-000c29342cb1date:2018-06-13T00:00:00
db:CNVDid:CNVD-2018-11396date:2018-06-13T00:00:00
db:VULHUBid:VHN-121307date:2018-06-26T00:00:00
db:JVNDBid:JVNDB-2018-007057date:2018-09-06T00:00:00
db:CNNVDid:CNNVD-201806-871date:2018-06-13T00:00:00
db:NVDid:CVE-2018-11447date:2018-06-26T18:29:00.650