The Siemens web application RUGGEDCOM NMS < V1.2 on port 8080/TCP and 8081/TCP could allow a remote attacker to perform a Cross-Site Request Forgery (CSRF) attack, potentially allowing an attacker to execute administrative operations, provided the targeted user has an active session and is induced to trigger a malicious request.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-363881.pdf | vendor advisory |
https://ics-cert.us-cert.gov/advisories/ICSA-17-059-01 | third party advisory us government resource |
http://www.securitytracker.com/id/1037958 | vdb entry |
http://www.securityfocus.com/bid/96458 | third party advisory vdb entry |