Siemens SCALANCE M875 Cross-site Scripting (CVE-2018-11448)

medium Tenable OT Security Plugin ID 501010


The remote OT asset is affected by a vulnerability.


A vulnerability has been identified in SCALANCE M875 (All versions).
The web interface on port 443/tcp could allow a stored Cross-Site Scripting (XSS) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires that the attacker has access to the web interface of an affected device. The attacker must be authenticated as administrative user on the web interface. Afterwards, a legitimate user must access the web interface. A successful attack could allow an attacker to execute malicious code in the browser of a legitimate user. At the time of advisory publication no public exploitation of this security vulnerability was known.

This plugin only works with Tenable.ot.
Please visit for more information.


Refer to the vendor advisory.

See Also

Plugin Details

Severity: Medium

ID: 501010

Version: 1.3

Type: remote

Family: Tenable.ot

Published: 4/11/2023

Updated: 2/20/2024

Supported Sensors: Nessus

Risk Information


Risk Factor: Low

Score: 3.0


Risk Factor: Low

Base Score: 3.5

Temporal Score: 2.6

Vector: CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS Score Source: CVE-2018-11448


Risk Factor: Medium

Base Score: 4.8

Temporal Score: 4.2

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:siemens:scalance_m875_firmware:-

Required KB Items: Tenable.ot/Siemens

Exploit Ease: No known exploits are available

Patch Publication Date: 6/26/2018

Vulnerability Publication Date: 6/26/2018

Reference Information

CVE: CVE-2018-11448

CWE: 79