ID

VAR-201404-0430


CVE

CVE-2014-2908


TITLE

Siemens SIMATIC S7-1200 Cross-Site Scripting Vulnerability

Trust: 1.2

sources: IVD: 0ba8a9ea-2352-11e6-abef-000c29c66e3d // IVD: 9d61a1d2-1edb-11e6-abef-000c29c66e3d // IVD: 7d7d5301-463f-11e9-a751-000c29342cb1 // CNVD: CNVD-2014-02659

DESCRIPTION

Cross-site scripting (XSS) vulnerability in the integrated web server on Siemens SIMATIC S7-1200 CPU devices 2.x and 3.x allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Siemens SIMATIC is an automation software in a single engineering environment. A cross-site scripting vulnerability exists in Siemens SIMATIC S7-1200. Because some unspecified input is not properly filtered before being used, an attacker can exploit the vulnerability to execute arbitrary HTML and script code in a user's browser session at the affected site. Siemens SIMATIC S7-1200 is prone to an unspecified cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input before being returned to the user. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. SIMATIC S7-1200 versions 2.x and 3.x are vulnerable. Siemens SIMATIC S7-1200 is a programmable logic controller (PLC) used in small and medium-sized automation systems of Siemens, Germany

Trust: 3.15

sources: NVD: CVE-2014-2908 // JVNDB: JVNDB-2014-002262 // CNVD: CNVD-2014-02659 // BID: 67059 // IVD: 0ba8a9ea-2352-11e6-abef-000c29c66e3d // IVD: 9d61a1d2-1edb-11e6-abef-000c29c66e3d // IVD: 7d7d5301-463f-11e9-a751-000c29342cb1 // VULHUB: VHN-70847 // VULMON: CVE-2014-2908

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 1.2

sources: IVD: 0ba8a9ea-2352-11e6-abef-000c29c66e3d // IVD: 9d61a1d2-1edb-11e6-abef-000c29c66e3d // IVD: 7d7d5301-463f-11e9-a751-000c29342cb1 // CNVD: CNVD-2014-02659

AFFECTED PRODUCTS

vendor:siemensmodel:simatic s7 cpu 1200scope:eqversion:2.0

Trust: 1.6

vendor:siemensmodel:simatic s7 cpu 1200scope:eqversion:3.0

Trust: 1.6

vendor:siemensmodel:simatic s7 cpu 1200scope:eqversion:3.0.2

Trust: 1.6

vendor:siemensmodel:simatic s7 cpu 1215cscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic s7 cpu 1217cscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic s7 cpu 1212cscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic s7 cpu-1211cscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic s7 cpu 1214cscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic s7-1200 cpu 1211cscope: - version: -

Trust: 0.8

vendor:siemensmodel:simatic s7-1200 cpu 1212cscope: - version: -

Trust: 0.8

vendor:siemensmodel:simatic s7-1200 cpu 1214cscope: - version: -

Trust: 0.8

vendor:siemensmodel:simatic s7-1200 cpu 1215cscope: - version: -

Trust: 0.8

vendor:siemensmodel:simatic s7-1200 cpu 1217cscope: - version: -

Trust: 0.8

vendor:siemensmodel:simatic s7-1200 cpuscope:eqversion:2.x

Trust: 0.8

vendor:siemensmodel:simatic s7-1200 cpuscope:eqversion:3.x

Trust: 0.8

vendor:simatic s7 cpu 1200model: - scope:eqversion:2.0

Trust: 0.6

vendor:simatic s7 cpu 1200model: - scope:eqversion:3.0

Trust: 0.6

vendor:simatic s7 cpu 1200model: - scope:eqversion:3.0.2

Trust: 0.6

vendor:simatic s7 cpu 1211cmodel: - scope:eqversion: -

Trust: 0.6

vendor:simatic s7 cpu 1212cmodel: - scope:eqversion: -

Trust: 0.6

vendor:simatic s7 cpu 1214cmodel: - scope:eqversion: -

Trust: 0.6

vendor:simatic s7 cpu 1215cmodel: - scope:eqversion: -

Trust: 0.6

vendor:simatic s7 cpu 1217cmodel: - scope:eqversion: -

Trust: 0.6

vendor:siemensmodel:simatic s7-1200scope:eqversion:2.x

Trust: 0.6

vendor:siemensmodel:simatic s7-1200scope:eqversion:3.x

Trust: 0.6

vendor:siemensmodel:simatic s7-1200scope:eqversion:3.0.1

Trust: 0.3

vendor:siemensmodel:simatic s7-1200scope:eqversion:3.0.0

Trust: 0.3

vendor:siemensmodel:simatic s7-1200scope:eqversion:3.0

Trust: 0.3

vendor:siemensmodel:simatic s7-1200scope:eqversion:2.0.3

Trust: 0.3

vendor:siemensmodel:simatic s7-1200scope:eqversion:2.0.2

Trust: 0.3

vendor:siemensmodel:simatic s7-1200scope:neversion:4.0

Trust: 0.3

sources: IVD: 0ba8a9ea-2352-11e6-abef-000c29c66e3d // IVD: 9d61a1d2-1edb-11e6-abef-000c29c66e3d // IVD: 7d7d5301-463f-11e9-a751-000c29342cb1 // CNVD: CNVD-2014-02659 // BID: 67059 // JVNDB: JVNDB-2014-002262 // CNNVD: CNNVD-201404-505 // NVD: CVE-2014-2908

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-2908
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-2908
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2014-02659
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201404-505
value: MEDIUM

Trust: 0.6

IVD: 0ba8a9ea-2352-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

IVD: 9d61a1d2-1edb-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

IVD: 7d7d5301-463f-11e9-a751-000c29342cb1
value: MEDIUM

Trust: 0.2

VULHUB: VHN-70847
value: MEDIUM

Trust: 0.1

VULMON: CVE-2014-2908
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-2908
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2014-02659
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 0ba8a9ea-2352-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 9d61a1d2-1edb-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 7d7d5301-463f-11e9-a751-000c29342cb1
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-70847
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: 0ba8a9ea-2352-11e6-abef-000c29c66e3d // IVD: 9d61a1d2-1edb-11e6-abef-000c29c66e3d // IVD: 7d7d5301-463f-11e9-a751-000c29342cb1 // CNVD: CNVD-2014-02659 // VULHUB: VHN-70847 // VULMON: CVE-2014-2908 // JVNDB: JVNDB-2014-002262 // CNNVD: CNNVD-201404-505 // NVD: CVE-2014-2908

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-70847 // JVNDB: JVNDB-2014-002262 // NVD: CVE-2014-2908

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201404-505

TYPE

Cross-site scripting

Trust: 0.6

sources: IVD: 0ba8a9ea-2352-11e6-abef-000c29c66e3d // IVD: 9d61a1d2-1edb-11e6-abef-000c29c66e3d // IVD: 7d7d5301-463f-11e9-a751-000c29342cb1

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-002262

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-70847 // VULMON: CVE-2014-2908

PATCH

title:SSA-892012url:http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-892012.pdf

Trust: 0.8

title:Patch for Siemens SIMATIC S7-1200 Cross-Site Scripting Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/45201

Trust: 0.6

sources: CNVD: CNVD-2014-02659 // JVNDB: JVNDB-2014-002262

EXTERNAL IDS

db:NVDid:CVE-2014-2908

Trust: 4.1

db:ICS CERTid:ICSA-14-114-02

Trust: 2.9

db:SIEMENSid:SSA-892012

Trust: 2.1

db:CNNVDid:CNNVD-201404-505

Trust: 1.3

db:CNVDid:CNVD-2014-02659

Trust: 1.2

db:SECUNIAid:58173

Trust: 1.2

db:EXPLOIT-DBid:44687

Trust: 1.2

db:BIDid:67059

Trust: 1.0

db:JVNDBid:JVNDB-2014-002262

Trust: 0.8

db:OSVDBid:106255

Trust: 0.6

db:IVDid:0BA8A9EA-2352-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:9D61A1D2-1EDB-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:7D7D5301-463F-11E9-A751-000C29342CB1

Trust: 0.2

db:PACKETSTORMid:147813

Trust: 0.1

db:VULHUBid:VHN-70847

Trust: 0.1

db:VULMONid:CVE-2014-2908

Trust: 0.1

sources: IVD: 0ba8a9ea-2352-11e6-abef-000c29c66e3d // IVD: 9d61a1d2-1edb-11e6-abef-000c29c66e3d // IVD: 7d7d5301-463f-11e9-a751-000c29342cb1 // CNVD: CNVD-2014-02659 // VULHUB: VHN-70847 // VULMON: CVE-2014-2908 // BID: 67059 // JVNDB: JVNDB-2014-002262 // CNNVD: CNNVD-201404-505 // NVD: CVE-2014-2908

REFERENCES

url:http://ics-cert.us-cert.gov/advisories/icsa-14-114-02

Trust: 3.0

url:http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-892012.pdf

Trust: 2.1

url:https://www.exploit-db.com/exploits/44687/

Trust: 1.3

url:https://cert-portal.siemens.com/productcert/pdf/ssa-892012.pdf

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2908

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2908

Trust: 0.8

url:http://secunia.com/advisories/58173/

Trust: 0.6

url:http://osvdb.com/show/osvdb/106255

Trust: 0.6

url:http://secunia.com/advisories/58173

Trust: 0.6

url:http://support.automation.siemens.com/ww/view/en/86567043

Trust: 0.3

url:http://www.siemens.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/79.html

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=34142

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2014-02659 // VULHUB: VHN-70847 // VULMON: CVE-2014-2908 // BID: 67059 // JVNDB: JVNDB-2014-002262 // CNNVD: CNNVD-201404-505 // NVD: CVE-2014-2908

CREDITS

Ralf Spenneberg, Hendrik Schwartke, and Maik Brüggemann from OpenSource Training

Trust: 0.3

sources: BID: 67059

SOURCES

db:IVDid:0ba8a9ea-2352-11e6-abef-000c29c66e3d
db:IVDid:9d61a1d2-1edb-11e6-abef-000c29c66e3d
db:IVDid:7d7d5301-463f-11e9-a751-000c29342cb1
db:CNVDid:CNVD-2014-02659
db:VULHUBid:VHN-70847
db:VULMONid:CVE-2014-2908
db:BIDid:67059
db:JVNDBid:JVNDB-2014-002262
db:CNNVDid:CNNVD-201404-505
db:NVDid:CVE-2014-2908

LAST UPDATE DATE

2025-04-13T23:26:55.222000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-02659date:2014-04-28T00:00:00
db:VULHUBid:VHN-70847date:2018-05-25T00:00:00
db:VULMONid:CVE-2014-2908date:2018-05-25T00:00:00
db:BIDid:67059date:2014-04-24T00:00:00
db:JVNDBid:JVNDB-2014-002262date:2014-04-28T00:00:00
db:CNNVDid:CNNVD-201404-505date:2014-04-28T00:00:00
db:NVDid:CVE-2014-2908date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:IVDid:0ba8a9ea-2352-11e6-abef-000c29c66e3ddate:2014-04-28T00:00:00
db:IVDid:9d61a1d2-1edb-11e6-abef-000c29c66e3ddate:2014-04-28T00:00:00
db:IVDid:7d7d5301-463f-11e9-a751-000c29342cb1date:2014-04-28T00:00:00
db:CNVDid:CNVD-2014-02659date:2014-04-28T00:00:00
db:VULHUBid:VHN-70847date:2014-04-25T00:00:00
db:VULMONid:CVE-2014-2908date:2014-04-25T00:00:00
db:BIDid:67059date:2014-04-24T00:00:00
db:JVNDBid:JVNDB-2014-002262date:2014-04-28T00:00:00
db:CNNVDid:CNNVD-201404-505date:2014-04-28T00:00:00
db:NVDid:CVE-2014-2908date:2014-04-25T05:12:07.847