A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.60), POWER METER SICAM Q100 (All versions < V2.60), POWER METER SICAM Q100 (All versions < V2.60), POWER METER SICAM Q100 (All versions < V2.60). The web interface of the affected devices are vulnerable to Cross-Site Request Forgery attacks. By tricking an authenticated victim user to click a malicious link, an attacker could perform arbitrary actions on the device on behalf of the victim user.
                
            References
                    Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
History
                    21 Nov 2024, 08:01
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://cert-portal.siemens.com/productcert/pdf/ssa-480095.pdf - | |
| References | () https://cert-portal.siemens.com/productcert/pdf/ssa-887249.pdf - Patch, Vendor Advisory | |
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 4.3  | 
09 Jan 2024, 10:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.60), POWER METER SICAM Q100 (All versions < V2.60), POWER METER SICAM Q100 (All versions < V2.60), POWER METER SICAM Q100 (All versions < V2.60). The web interface of the affected devices are vulnerable to Cross-Site Request Forgery attacks. By tricking an authenticated victim user to click a malicious link, an attacker could perform arbitrary actions on the device on behalf of the victim user. | 
12 Dec 2023, 12:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
|
| Summary | A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.60), POWER METER SICAM Q100 (All versions < V2.60). The web interface of the affected devices are vulnerable to Cross-Site Request Forgery attacks. By tricking an authenticated victim user to click a malicious link, an attacker could perform arbitrary actions on the device on behalf of the victim user. | 
26 Jun 2023, 17:40
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-352 | |
| CPE | cpe:2.3:o:siemens:q200_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:q200:-:*:*:*:*:*:*:*  | 
|
| References | (MISC) https://cert-portal.siemens.com/productcert/pdf/ssa-887249.pdf - Patch, Vendor Advisory | |
| First Time | 
        
        Siemens q200
         Siemens q200 Firmware Siemens  | 
|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 8.8  | 
13 Jun 2023, 09:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-06-13 09:15
Updated : 2024-11-21 08:01
NVD link : CVE-2023-30901
Mitre link : CVE-2023-30901
CVE.ORG link : CVE-2023-30901
JSON object : View
Products Affected
                siemens
- q200
 - q200_firmware
 
CWE
                
                    
                        
                        CWE-352
                        
            Cross-Site Request Forgery (CSRF)
