CVE-2024-6558

HMS Industrial Networks Anybus-CompactCom 30 Cross-site Scripting

Description

HMS Industrial Networks Anybus-CompactCom 30 products are vulnerable to a XSS attack caused by the lack of input sanitation checks. As a consequence, it is possible to insert HTML code into input fields and store the HTML code. The stored HTML code will be embedded in the page and executed by host browser the next time the page is loaded, enabling social engineering attacks.

Remediation

Workaround:

  • HMS recommends users implement at least one of the following: * Add password protection to all webpages served by the Anybus-CompactCom 30 module. * Disable or add the option to allow the end-user to disable the webserver in the AnybusCompactCom 30. * Make sure these products are used locally within a secure network utilizing proper network infrastructure controls. This will help ensure that unused or unnecessary protocols from unauthorized sources are blocked. * Ensure that control systems and devices are situated behind firewalls, ensuring their isolation from the corporate network. * Replace the Anybus-CompactCom 30 module with a Anybus-CompactCom 40 module. For more information see the associated HMS security advisory https://hmsnetworks.blob.core.windows.net/nlw/docs/default-source/products/cybersecurity/security-advisory/hms-security-advisory-2024-05-17-001---anybus---compactcom-30-xss.pdf .

Category

6.3
CVSS
Severity: Medium
CVSS 4.0 •
CVSS 3.1 •
EPSS 0.10%
Vendor Advisory windows.net
Affected: HMS Industrial Networks Anybus-CompactCom 30
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-6558?
CVE-2024-6558 has been scored as a medium severity vulnerability.
How to fix CVE-2024-6558?
As a workaround for remediating CVE-2024-6558: HMS recommends users implement at least one of the following: * Add password protection to all webpages served by the Anybus-CompactCom 30 module. * Disable or add the option to allow the end-user to disable the webserver in the AnybusCompactCom 30. * Make sure these products are used locally within a secure network utilizing proper network infrastructure controls. This will help ensure that unused or unnecessary protocols from unauthorized sources are blocked. * Ensure that control systems and devices are situated behind firewalls, ensuring their isolation from the corporate network. * Replace the Anybus-CompactCom 30 module with a Anybus-CompactCom 40 module. For more information see the associated HMS security advisory https://hmsnetworks.blob.core.windows.net/nlw/docs/default-source/products/cybersecurity/security-advisory/hms-security-advisory-2024-05-17-001---anybus---compactcom-30-xss.pdf .
Is CVE-2024-6558 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-6558 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-6558?
CVE-2024-6558 affects HMS Industrial Networks Anybus-CompactCom 30.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.