PatchSiren cyber security CVE debrief
CVE-2017-2683 Siemens CVE debrief
CVE-2017-2683 is a high-severity persistent cross-site scripting issue in Siemens RUGGEDCOM NMS. The vulnerability is described as affecting the web application on ports 8080/TCP and 8081/TCP, where a non-privileged user could inject persistent script content and potentially gain administrative permissions. The issue was published on 2017-02-27 and is classified as CWE-79.
- Vendor
- Siemens
- Product
- CVE-2017-2683
- CVSS
- HIGH 8.2
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-27
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-27
- Advisory updated
- 2026-05-13
Who should care
Administrators and operators of Siemens RUGGEDCOM NMS, especially teams responsible for OT/industrial network management systems exposed on TCP ports 8080 and 8081. Security teams should also care if the application is reachable by multiple users or integrated into shared administrative workflows.
Technical summary
NVD classifies the flaw as CWE-79 (Improper Neutralization of Input During Web Page Generation). The NVD CVSS v3.0 vector is AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N, indicating network reachability, low attack complexity, no privileges required, and a user-interaction requirement. The CVE description states that a non-privileged user of Siemens RUGGEDCOM NMS could perform a persistent XSS attack, potentially leading to administrative permissions. Source data also shows a version-scope discrepancy: the description says affected versions are < V1.2, while the NVD CPE range lists vulnerability coverage through 2.0.2; confirm exact remediation scope with the vendor advisory before change planning.
Defensive priority
High. The combination of network exposure, no privileges required, and potential administrative impact makes this important to remediate promptly, particularly in environments where the management interface is reachable by untrusted users or broader internal networks.
Recommended defensive actions
- Upgrade Siemens RUGGEDCOM NMS to a fixed version per Siemens guidance and verify the exact affected range against the vendor advisory.
- Restrict access to the management web application on TCP ports 8080 and 8081 to trusted administrative networks only.
- Review and remove any untrusted or suspicious content entered into user-facing fields in the management interface.
- Use the Siemens security advisory and the ICS-CERT advisory to confirm remediation steps and affected versions before deployment.
- After remediation, verify that administrative accounts and sessions have not been abused through injected content.
Evidence notes
Primary evidence comes from the NVD record for CVE-2017-2683 and the Siemens-referenced vendor/ICS advisories listed in NVD references. The CVE description states a persistent XSS issue in RUGGEDCOM NMS on 8080/TCP and 8081/TCP, with possible administrative permission impact. NVD also records CWE-79 and a CVSS v3.0 vector of AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N. The source corpus contains a scope discrepancy between the textual description (< V1.2) and the NVD CPE range (through 2.0.2).
Official resources
-
CVE-2017-2683 CVE record
CVE.org
-
CVE-2017-2683 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
- Source reference
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
- Source reference
Publicly disclosed in the CVE record on 2017-02-27. The record was later modified on 2026-05-13, but that modified date should not be treated as the original issue date.