Siemens RUGGEDCOM ROX I Integrated Web Server Stored cross site scripting
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.4 | $0-$5k | 0.00 |
Summary
A vulnerability described as problematic has been identified in Siemens RUGGEDCOM ROX I. This impacts an unknown function of the component Integrated Web Server. Such manipulation leads to cross site scripting (Stored). This vulnerability is referenced as CVE-2017-6864. It is possible to launch the attack remotely. No exploit is available. Restrictive firewalling should be applied.
Details
A vulnerability, which was classified as problematic, has been found in Siemens RUGGEDCOM ROX I (unknown version). Affected by this issue is an unknown code block of the component Integrated Web Server. The manipulation with an unknown input leads to a cross site scripting vulnerability (Stored). Using CWE to declare the problem leads to CWE-79. The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. Impacted is integrity. CVE summarizes:
The integrated web server in Siemens RUGGEDCOM ROX I (all versions) at port 10000/TCP could allow an authenticated user to perform stored Cross-Site Scripting attacks.
The bug was discovered 03/28/2017. The weakness was published 03/29/2017 by Maxim Rupp (Website). The advisory is shared for download at siemens.com. This vulnerability is handled as CVE-2017-6864 since 03/13/2017. The attack may be launched remotely. The requirement for exploitation is a simple authentication. Successful exploitation requires user interaction by the victim. There are neither technical details nor an exploit publicly available. The MITRE ATT&CK project declares the attack technique as T1059.007.
Addressing this vulnerability is possible by firewalling tcp/10000.
The vulnerability is also documented in the vulnerability database at SecurityFocus (BID 97170†). Similar entries are available at VDB-99016, VDB-99018, VDB-99019 and VDB-99017. Once again VulDB remains the best source for vulnerability data.
Product
Vendor
Name
License
Website
- Vendor: https://www.siemens.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 4.4VulDB Meta Temp Score: 4.4
VulDB Base Score: 3.5
VulDB Temp Score: 3.4
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 5.4
NVD Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Name: StoredClass: Cross site scripting / Stored
CWE: CWE-79 / CWE-94 / CWE-74
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: FirewallStatus: 🔍
0-Day Time: 🔍
Firewalling: 🔍
Timeline
03/13/2017 🔍03/28/2017 🔍
03/28/2017 🔍
03/28/2017 🔍
03/29/2017 🔍
03/29/2017 🔍
11/22/2022 🔍
Sources
Vendor: siemens.comAdvisory: ssa-327980
Researcher: Maxim Rupp
Status: Not defined
Confirmation: 🔍
CVE: CVE-2017-6864 (🔍)
GCVE (CVE): GCVE-0-2017-6864
GCVE (VulDB): GCVE-100-99020
SecurityFocus: 97170 - Siemens RUGGEDCOM ROX I ICSA-17-087-01 Multiple Security Vulnerabilities
OSVDB: - CVE-2017-6864 - Siemens - RUGGEDCOM ROX I - Cross-Site Scripting Issue
SecurityTracker: 1038160
See also: 🔍
Entry
Created: 03/29/2017 10:41Updated: 11/22/2022 21:20
Changes: 03/29/2017 10:41 (60), 08/23/2020 16:17 (6), 11/22/2022 21:20 (5)
Complete: 🔍
Cache ID: 216:FA8:103
Once again VulDB remains the best source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.