PatchSiren

PatchSiren cyber security CVE debrief

CVE-2017-2683 Siemens CVE debrief

CVE-2017-2683 is a high-severity persistent cross-site scripting issue in Siemens RUGGEDCOM NMS. The vulnerability is described as affecting the web application on ports 8080/TCP and 8081/TCP, where a non-privileged user could inject persistent script content and potentially gain administrative permissions. The issue was published on 2017-02-27 and is classified as CWE-79.

Vendor
Siemens
Product
CVE-2017-2683
CVSS
HIGH 8.2
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-27
Original CVE updated
2026-05-13
Advisory published
2017-02-27
Advisory updated
2026-05-13

Who should care

Administrators and operators of Siemens RUGGEDCOM NMS, especially teams responsible for OT/industrial network management systems exposed on TCP ports 8080 and 8081. Security teams should also care if the application is reachable by multiple users or integrated into shared administrative workflows.

Technical summary

NVD classifies the flaw as CWE-79 (Improper Neutralization of Input During Web Page Generation). The NVD CVSS v3.0 vector is AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N, indicating network reachability, low attack complexity, no privileges required, and a user-interaction requirement. The CVE description states that a non-privileged user of Siemens RUGGEDCOM NMS could perform a persistent XSS attack, potentially leading to administrative permissions. Source data also shows a version-scope discrepancy: the description says affected versions are < V1.2, while the NVD CPE range lists vulnerability coverage through 2.0.2; confirm exact remediation scope with the vendor advisory before change planning.

Defensive priority

High. The combination of network exposure, no privileges required, and potential administrative impact makes this important to remediate promptly, particularly in environments where the management interface is reachable by untrusted users or broader internal networks.

Recommended defensive actions

  • Upgrade Siemens RUGGEDCOM NMS to a fixed version per Siemens guidance and verify the exact affected range against the vendor advisory.
  • Restrict access to the management web application on TCP ports 8080 and 8081 to trusted administrative networks only.
  • Review and remove any untrusted or suspicious content entered into user-facing fields in the management interface.
  • Use the Siemens security advisory and the ICS-CERT advisory to confirm remediation steps and affected versions before deployment.
  • After remediation, verify that administrative accounts and sessions have not been abused through injected content.

Evidence notes

Primary evidence comes from the NVD record for CVE-2017-2683 and the Siemens-referenced vendor/ICS advisories listed in NVD references. The CVE description states a persistent XSS issue in RUGGEDCOM NMS on 8080/TCP and 8081/TCP, with possible administrative permission impact. NVD also records CWE-79 and a CVSS v3.0 vector of AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N. The source corpus contains a scope discrepancy between the textual description (< V1.2) and the NVD CPE range (through 2.0.2).

Official resources

Publicly disclosed in the CVE record on 2017-02-27. The record was later modified on 2026-05-13, but that modified date should not be treated as the original issue date.