This content is restricted.
Brief
Summary:
A vulnerability has been identified in Siemens RUGGEDCOM APE1808, an application hosting platform, affecting four different versions. The vulnerabilities include:
1. Cross-Site Scripting (XSS): Allows a malicious authenticated administrator to store a JavaScript payload using the web interface.
2. Improper Privilege Management: Enables an authenticated read-only administrator to revoke active XML API keys from the firewall and disrupt XML API usage.
3. Truncation of Security-Related Information: Allows remote attackers to bypass integrity checks, omitting security features.
4. Insufficient Session Expiration: Web sessions in the management interface do not expire, allowing unauthorized access.
The affected versions are all versions of Siemens RUGGEDCOM APE1808 with Palo Alto Networks Virtual NGFW configured. The vulnerabilities have a CVSS score ranging from 4.8 to 8.2, indicating a high severity. Siemens has released patch and update information, and users are advised to apply the recommended mitigations to reduce risk. Additionally, users are encouraged to implement defensive measures, perform proper impact analysis, and assess risk before deploying defensive measures.
Highlights content goes here...
This content is restricted.