Siemens

Scalance M875 Firmware

6 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.42%
  • Published 26.06.2018 18:29:01
  • Last modified 21.11.2024 04:07:36

A vulnerability has been identified in SCALANCE M875 (All versions). An authenticated remote attacker with access to the web interface (443/tcp), could potentially read and download arbitrary files from the device's file system. Successful exploitati...

  • EPSS 0.17%
  • Published 26.06.2018 18:29:00
  • Last modified 21.11.2024 03:43:23

A vulnerability has been identified in SCALANCE M875 (All versions). The web interface on port 443/tcp could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation ...

  • EPSS 0.22%
  • Published 26.06.2018 18:29:00
  • Last modified 21.11.2024 03:43:23

A vulnerability has been identified in SCALANCE M875 (All versions). The web interface on port 443/tcp could allow a stored Cross-Site Scripting (XSS) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation ...

  • EPSS 0.12%
  • Published 26.06.2018 18:29:00
  • Last modified 21.11.2024 03:43:23

A vulnerability has been identified in SCALANCE M875 (All versions). An attacker with access to the local file system might obtain passwords for administrative users. Successful exploitation requires read access to files on the local file system. A s...

  • EPSS 1.12%
  • Published 26.06.2018 18:29:00
  • Last modified 21.11.2024 04:07:36

A vulnerability has been identified in SCALANCE M875 (All versions). An authenticated remote attacker with access to the web interface (443/tcp), could execute arbitrary operating system commands. Successful exploitation requires that the attacker ha...

  • EPSS 1.12%
  • Published 26.06.2018 18:29:00
  • Last modified 21.11.2024 04:07:36

A vulnerability has been identified in SCALANCE M875 (All versions). An authenticated remote attacker with access to the web interface (443/tcp), could execute arbitrary operating system commands. Successful exploitation requires that the attacker ha...