Vulnerability Description
The Siemens web application RUGGEDCOM NMS < V1.2 on port 8080/TCP and 8081/TCP could allow a remote attacker to perform a Cross-Site Request Forgery (CSRF) attack, potentially allowing an attacker to execute administrative operations, provided the targeted user has an active session and is induced to trigger a malicious request.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Siemens | Ruggedcom Network Management Software | <= 2.0.2 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/96458Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1037958
- http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-363881.pdfVendor Advisory
- https://ics-cert.us-cert.gov/advisories/ICSA-17-059-01Third Party AdvisoryUS Government Resource
- http://www.securityfocus.com/bid/96458Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1037958
- http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-363881.pdfVendor Advisory
- https://ics-cert.us-cert.gov/advisories/ICSA-17-059-01Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2017-2682?
CVE-2017-2682 is a vulnerability with a CVSS score of 8.8 (HIGH). The Siemens web application RUGGEDCOM NMS < V1.2 on port 8080/TCP and 8081/TCP could allow a remote attacker to perform a Cross-Site Request Forgery (CSRF) attack, potentially allowing an attacker to ...
How severe is CVE-2017-2682?
CVE-2017-2682 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-2682?
Check the references section above for vendor advisories and patch information. Affected products include: Siemens Ruggedcom Network Management Software.