{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T20:24:45.329","vulnerabilities":[{"cve":{"id":"CVE-2018-16555","sourceIdentifier":"productcert@siemens.com","published":"2018-12-13T16:29:00.460","lastModified":"2024-11-21T03:52:58.247","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability has been identified in SCALANCE S602 (All versions < V4.0.1.1), SCALANCE S612 (All versions < V4.0.1.1), SCALANCE S623 (All versions < V4.0.1.1), SCALANCE S627-2M (All versions < V4.0.1.1). The integrated web server could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link. User interaction is required for a successful exploitation. The user must be logged into the web interface in order for the exploitation to succeed. At the stage of publishing this security advisory no public exploitation is known."},{"lang":"es","value":"Se ha identificado una vulnerabilidad en SCALANCE S602 (todas las versiones anteriores a la V4.0.1.1), SCALANCE S612 (todas las versiones anteriores a la V4.0.1.1), SCALANCE S623 (todas las versiones anteriores a la V4.0.1.1), SCALANCE S627-2M (todas las versiones anteriores a la V4.0.1.1). El servidor web integrado podría permitir ataques Cross-Site Scripting (XSS) si los usuarios incautos son engañados para que accedan a un enlace malicioso. Se necesita interacción del usuario para explotar esta vulnerabilidad con éxito. El usuario debe haber iniciado sesión en la interfaz web para que la explotación tenga éxito. En el momento de publicación de este aviso de seguridad, no se conoce ninguna explotación pública."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"productcert@siemens.com","type":"Secondary","description":[{"lang":"en","value":"CWE-80"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:scalance_s602_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"v4.0.1.1","matchCriteriaId":"73E004D9-009E-4051-9B38-76E35EB28B72"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:scalance_s602:-:*:*:*:*:*:*:*","matchCriteriaId":"F4D89D82-C2CE-44DC-A05B-B956F20BF4E3"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:scalance_s612_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"4.0.1.1","matchCriteriaId":"B99D6B28-85DB-4114-B65C-4E5FF867E5A5"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:scalance_s612:-:*:*:*:*:*:*:*","matchCriteriaId":"CA7B48D2-0D17-420D-AAE1-35E5C0BE2924"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:scalance_s623_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"4.0.1.1","matchCriteriaId":"4707AB43-A39A-4101-92E4-369676CFC952"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:scalance_s623:-:*:*:*:*:*:*:*","matchCriteriaId":"F80D9A79-7984-462B-B4B9-6A4429422038"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:scalance_s627-2m_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"4.0.1.1","matchCriteriaId":"55C8AFCD-A9F0-45DE-AC5D-550F2DA2CF3F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:scalance_s627-2m:-:*:*:*:*:*:*:*","matchCriteriaId":"B51B40F8-71D2-4D2D-8EC2-CE154A6D7533"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/105937","source":"productcert@siemens.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-242982.pdf","source":"productcert@siemens.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/105937","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-242982.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}