Belden Hirschmann GECKO (Update A)
Hirschmann GECKO Lite Managed switches contain multiple vulnerabilities in the web management interface: path traversal (CWE-22) allows reading arbitrary files, server-side request forgery (CWE-918) enables unauthorized remote actions, cross-site request forgery (CWE-352) can trick administrators into issuing commands, and information disclosure (CWE-200) leaks configuration data. An attacker with network access to the management interface can intercept, modify, or extract configuration without authentication. Version 2.0.00 and earlier are affected.
- Network access to the Hirschmann GECKO Lite switch management interface (typically HTTP port 80 or 443)
- User (administrator or operator) must be logged in or visiting the switch interface in their browser for CSRF exploitation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/8802f016-0d45-4557-adad-f8f0bba4ab90Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.