Lucene search

K

SCALANCE M875 Security Vulnerabilities

cve
cve

CVE-2018-4861

A vulnerability has been identified in SCALANCE M875 (All versions). An authenticated remote attacker with access to the web interface (443/tcp), could potentially read and download arbitrary files from the device's file system. Successful exploitation requires that the attacker has network access....

4.9CVSS

5AI Score

0.002EPSS

2018-06-26 06:29 PM
22
cve
cve

CVE-2018-11449

A vulnerability has been identified in SCALANCE M875 (All versions). An attacker with access to the local file system might obtain passwords for administrative users. Successful exploitation requires read access to files on the local file system. A successful attack could allow an attacker to...

7.8CVSS

7.1AI Score

0.0004EPSS

2018-06-26 06:29 PM
22
cve
cve

CVE-2018-11448

A vulnerability has been identified in SCALANCE M875 (All versions). The web interface on port 443/tcp could allow a stored Cross-Site Scripting (XSS) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires that the attacker has access to the web....

4.8CVSS

4.8AI Score

0.0004EPSS

2018-06-26 06:29 PM
22
cve
cve

CVE-2018-11447

A vulnerability has been identified in SCALANCE M875 (All versions). The web interface on port 443/tcp could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires user interaction by an legitimate user,....

8.8CVSS

8.7AI Score

0.001EPSS

2018-06-26 06:29 PM
22
cve
cve

CVE-2018-4860

A vulnerability has been identified in SCALANCE M875 (All versions). An authenticated remote attacker with access to the web interface (443/tcp), could execute arbitrary operating system commands. Successful exploitation requires that the attacker has network access to the web interface. The...

7.2CVSS

7.1AI Score

0.003EPSS

2018-06-26 06:29 PM
25
cve
cve

CVE-2018-4859

A vulnerability has been identified in SCALANCE M875 (All versions). An authenticated remote attacker with access to the web interface (443/tcp), could execute arbitrary operating system commands. Successful exploitation requires that the attacker has network access to the web interface. The...

7.2CVSS

7.1AI Score

0.003EPSS

2018-06-26 06:29 PM
20