Vulnerability Description
A vulnerability has been identified in SIMATIC S7-1200 CPU family version 4 (All versions < V4.2.3). The web interface could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires user interaction by a legitimate user, who must be authenticated to the web interface. A successful attack could allow an attacker to trigger actions via the web interface that the legitimate user is allowed to perform. This could allow the attacker to read or modify parts of the device configuration.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Siemens | Simatic S7-1200 V4 Firmware | < 4.2.3 |
| Siemens | Simatic S7-1200 V4 | - |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/105542Third Party AdvisoryVDB Entry
- https://cert-portal.siemens.com/productcert/pdf/ssa-507847.pdfVendor Advisory
- http://www.securityfocus.com/bid/105542Third Party AdvisoryVDB Entry
- https://cert-portal.siemens.com/productcert/pdf/ssa-507847.pdfVendor Advisory
FAQ
What is CVE-2018-13800?
CVE-2018-13800 is a vulnerability with a CVSS score of 7.3 (HIGH). A vulnerability has been identified in SIMATIC S7-1200 CPU family version 4 (All versions < V4.2.3). The web interface could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is...
How severe is CVE-2018-13800?
CVE-2018-13800 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-13800?
Check the references section above for vendor advisories and patch information. Affected products include: Siemens Simatic S7-1200 V4 Firmware, Siemens Simatic S7-1200 V4.